Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

[HTML][HTML] Steganography and steganalysis in voice over IP: A review

Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …

AHCM: Adaptive Huffman code map** for audio steganography based on psychoacoustic model

X Yi, K Yang, X Zhao, Y Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Most current audio steganographic methods are content non-adaptive which have poor
security and low embedding capacity. This paper proposes a generalized adaptive Huffman …

Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams

Y Hu, Y Huang, Z Yang, Y Huang - Neurocomputing, 2021 - Elsevier
This paper considers a new task of detecting heterogeneous parallel steganography (HPS)
on streaming media. This task is to detect the existence of the confidential messages hidden …

Detection of multiple steganography methods in compressed speech based on code element embedding, Bi-LSTM and CNN with attention mechanisms

S Li, J Wang, P Liu, M Wei, Q Yan - IEEE/ACM Transactions on …, 2021 - ieeexplore.ieee.org
Steganographic algorithms in low-bit-rate compressed speech bring convenience to realize
covert communication, meanwhile result in safety issues. The existing steganalysis methods …

Separable convolution network with dual-stream pyramid enhanced strategy for speech steganalysis

Y Qiu, H Tian, H Li, CC Chang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Steganography based on fixed codebook has become one of the most important branches
of speech steganography due to its high imperceptibility and having the largest available …

STFF-SM: Steganalysis model based on spatial and temporal feature fusion for speech streams

H Tian, Y Qiu, W Mazurczyk, H Li… - IEEE/ACM Transactions …, 2022 - ieeexplore.ieee.org
The real-time detection of speech steganography in Voice-over-Internet-Protocol (VoIP)
scenarios remains an open problem, as it requires steganalysis methods to perform for low …

Multi-Agent Deep Learning for the Detection of Multiple Speech Steganography Methods

C Sun, H Tian, P Tian, H Li… - IEEE/ACM Transactions on …, 2024 - ieeexplore.ieee.org
The ability to detect multiple steganographic methods in speech streams is an important
prerequisite for steganalysis methods to move from theory to practical application, but it is …

Securing IoT data using steganography: A practical implementation approach

F Djebbar - Electronics, 2021 - mdpi.com
Adding network connectivity to any “thing” can certainly provide great value, but it also
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …

Message-driven generative music steganography using midi-gan

Z Su, G Zhang, Z Shi, D Hu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Generative steganography has become a popular research topic in the field of generative AI,
including generative image and synthetic speech steganography. However, music files have …