Steganalysis of Compressed Speech Based on Association Rule Mining

被引:1
|
作者
Gao, Feipeng
Yang, Jie [1 ]
Xu, Peng
机构
[1] Zhejiang A&F Univ, Jiyang Coll, Shaoxing 311800, Peoples R China
关键词
Speech coding; Steganography; Speech processing; Itemsets; Indexes; Correlation; Speech codecs; Compressed speech; steganography; steganalysis; association rule mining; quantization index modulation; QUANTIZATION INDEX MODULATION; STEGANOGRAPHY;
D O I
10.1109/ACCESS.2022.3209703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, steganography based on compressed speech streams is gathering more and more attention. Meanwhile, it poses a huge threat to cyber security. As a counter technique, steganalysis can detect whether an illegal secret message is embedded in a compressed speech. To further improve the detection performance of current methods, a novel steganalysis method based on codeword association rule mining (CARM) is proposed in this paper. Firstly, we analyzed the spatiotemporal relationships between codewords in compressed speech. Secondly, the steganography-sensitivity codeword association rule base in training set was built based on the confidence change of codeword association rules before and after steganography. Thirdly, the steganography characteristic index and the corresponding dynamic partition threshold in validation set were computed to determine whether the compressed speech segment contains covert communication or not. Finally, comprehensive experiments were conducted to evaluate the performance of the proposed CARM steganalysis method under various conditions, including different association rule patterns, whether to use dynamic partition threshold, different embedding rates, different speech lengths, etc. The experimental results verify that CARM can achieve better performance than the comparison methods. In addition, the detection accuracy of CARM method can be improved significantly by using dynamic partition threshold at low embedding rates.
引用
收藏
页码:103337 / 103348
页数:12
相关论文
共 50 条
  • [31] Data mining association rule algorithm based on Hadoop
    Huang Suyu
    PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2015), 2015, : 349 - 352
  • [32] Research on multidimensional association rule mining based on OLAP
    Xiao, Ss
    Zhou, Zl
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 1264 - 1268
  • [33] Mining association rule efficiently based on data warehouse
    Chen, XH
    Lai, BC
    Luo, D
    JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY, 2003, 10 (04): : 375 - 380
  • [34] Research of Association Rule Algorithm based on Data Mining
    Song, Changxin
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2016, : 23 - 26
  • [36] Mining association rule efficiently based on data warehouse
    Xiao-hong Chen
    Bang-chuan Lai
    Ding Luo
    Journal of Central South University of Technology, 2003, 10 : 375 - 380
  • [37] Association rule mining algorithm based on Privacy preserving
    Sun Wei
    Wang Yonggui
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 140 - 143
  • [38] Product portfolio identification based on association rule mining
    Jiao, JX
    Zhang, YY
    COMPUTER-AIDED DESIGN, 2005, 37 (02) : 149 - 172
  • [39] A TSP based algorithm for mining fuzzy association rule
    Qiang, Yu
    Hu Yunfa
    Li, Xu
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (01): : 127 - 129
  • [40] Method for IP geolocation based on association rule mining
    School of Computer Science, Beijing University of Posts and Telecommunications, Beijing
    100876, China
    Dongnan Daxue Xuebao, 4 (657-662): : 657 - 662