Fast Steganalysis Method for VoIP Streams

10/31/2019 ∙ by Hao Yang, et al. ∙ 0

In this letter, we present a novel and extremely fast steganalysis method of Voice over IP (VoIP) streams, driven by the need for a quick and accurate detection of possible steganography in VoIP streams. We firstly analyzed the correlations in carriers. To better exploit the correlation in code-words, we mapped vector quantization code-words into a semantic space. In order to achieve high detection efficiency, only one hidden layer is utilized to extract the correlations between these code-words. Finally, based on the extracted correlation features, we used the softmax classifier to categorize the input stream carriers. To boost the performance of this proposed model, we incorporate a simple knowledge distillation framework into the training process. Experimental results show that the proposed method achieves state-of-the-art performance both in detection accuracy and efficiency. In particular, the processing time of this method on average is only about 0.05% when sample length is as short as 0.1s, attaching strong practical value to online serving of steganography monitor.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

Steganography is an efficient way to hide secret messages into seemingly innocent carriers without perceptible distortions, and hence it is popularly employed to achieve covert communications. On the contrary, steganalysis aims to distinguish stego objects (objects containing a secret message) from cover objects. VoIP is a real-time service which enables users to make phone calls anywhere through IP data networks. With the popularity of instant messaging tools such as Wechat, Skype and Snapchat, the network traffic of VoIP increased sharply. It has been widely reported that VoIP was an excellent scheme for covert communication since it possesses many particular characteristic, such as instantaneity, a large mass of carrier data, high covert bandwidth and flexible conversation length [17, 9, 18, 11]. Despite being studied, practical online steganalysis tools for VoIP streams are still rare because most proposed method can not balance the detection accuracy and efficiency. Thus, it is crucial to develop a fast and efficient steganalysis tool of VoIP stream for online system.

Steganography in VoIP streams can be carried out in network protocol and payload field [11, 20, 5]. Compared with embedding secret data into network protocol, the latter one can achieve higher concealment [11]. In order to reduce bandwidth consumption, VoIP often integrated low-bit-rate compressed speech coding standards such as G.729 and G.723.1. Quantization Index Modulation (QIM) [5] make it possible to integrate secret data into low-bit-rate speech [12]. QIM based steganography incorporates information hiding mainly by introducing QIM algorithm to segment and encode the codebooks in the process of speech quantization which achieves high concealment and is hard to detect [18, 12].

Steganalysis of digital audio always follows the same pattern: directly extracting statistical features from the carrier and then conducting classification. Mel Frequency Cepstrum Coefficient (MFCC), Markov transition features and other combined features like high order moment of carriers are the main focus

[14, 7, 15]

. The classification module adopted mostly was support Vector Machine (SVM) classifier. Speech steganalysis follows the same intuition but pays more attention to correlation features between code-words and frames

[16]

. Researchers always extract handcraft features based on prior knowledge. Although this is simple and fast, these method performs poorly in detection accuracy. Recently, many architectures of neural networks such as Recurrent Neural Networks (RNNs) and Convolutional Neural Networks (CNNs) have been further studied to model a different level of correlations and they achieved the best results most recently

[16, 19, 1]

. However, most of these deep learning based models have high requirement both in storage resource and in computation capacity, making it hard for real-time serving, which poses a great threat to the security of cyberspace. Thus, in this letter, we propose a light weight and high efficient steganalysis scheme to tackle this problem.

Ii Problem Definition

Information-theoretic model for steganography was proposed by Cachin in [4]. Given a message , one can “embed” into the given cover carrier which conforms to distribution with the embedding function and then produces modified carrier which conforms to distribution . The goal of steganography is to reduce the differences in statistical distribution of carriers before and after steganography as much as possible, which can be expressed as:

(1)

On the contrary, steganalysis should make full use of the differences between cover and stego carrier and judge whether there were extra messages embeded in the given carrier. Given a sample , steganalysis can be taken as a map . where means that is detected as cover and otherwise as stego.

In VoIP stream, speech frames were first converted to Line Spectrum Frequency (LSF) coefficients. And the LSFs are encoded by Vector Quantization (VQ). Take a low bit rate codec G.729 as an example, the quantized LSF coefficients in each frame are described by a quantization codeword set using codebooks , and , respectively. Steganography scheme such as QIM will have impact on the statistical distribution of these code-words. Thus, in this paper, we adopt the quantized LSF codeword as a clue for steganalysis of VoIP stream. In the application scenario, we can utilize sliding detection window [10] to collect one or several continuous packets each time to construct these quantized LSF coefficients sequences for steganalysis. Assume that the sample window size is , quantized LSF codewords can be expressed as , where represents -th speech frame. Our goal is to construct an end-to-end model to predict a label for a given carrier. In the experiment, we can get many labeled samples from dataset such as , where is the total sample number in dataset and is the true label of an sample.

Iii Proposed Method

Fig. 1: Proposed Light Weight Correlation Extraction Scheme

Iii-a Correlation Analysis

There are corresponding relationships between text and speech [3]. Given a speech sequence

as input, we can get an estimate of the corresponding text sequence

in the following way:

(2)

where is taken as an acoustic model and as a language model. Because of the dependency in speech sequence, word sequence and corresponding relationship between acoustic model and language model exists in Equation 2, code-words and frames in compressed speech have strong correlation.

Define as the -th codeword at frame in sequence , for G.729 and G.723, . When all codewords are uncorrelated, their appearances are independent. Therefore, we have:

(3)

When there are correlations between code-words and , the value of two sides in Equation 3 become different. The difference between two sides of the Equation 3 indicates degree of correlation. Specificly, larger imbalance of the two sides indicates stronger correlation. In addition to explicit correlation in code-word, implicit correlation such as word correlation also exist but is difficult to model. One possible way is to map the code-words to a continuous semantic space. Recently, many remarkable results have proved that neural networks have the ability to map things like words into a continuous semantic space by self-learning with plenty of data [6, 13]. Thus, we utilized this mechanism for further study and explored semantic correlations in different levels by analyzing the distribution of these code-word vectors.

Iii-B Correlation Extraction and Classification

Input of correlation extraction module is quantized LSF coefficients sequence

. At the start of correlation extraction process, we firstly map the vector quantilization code-word with a dense vector, which contains more abundant information than its original code-word. The mapping process is based on an embedding matrix

, which can be expressed as follows:

(4)

where is the size of quantization code-books , is the embedding dimension and the -th row indicates the -th code-word in . Thus, we can convert vector quantilization codewords to a one-hot vector based on the value of the quantization codeword. Then, we can directly get a dense vector as follows:

(5)

After the transformation, the representation of the -th frame can be denoted as:

(6)

where is the concatenation operator. The sequence was flatted to one dimension vector for further correlation analysis, where .

With these dense representations, we construct our correlation extraction process based on a hidden layer. Specificly, we used a weight matrix

to calculate the probability that this speech carrier contains covert information:

(7)

where and are respectively learned weight matrix and bias. The dimension of the output vector is 2. Finally, we add a softmax classifier to the output layer to calculate the possible probability of each category:

(8)

The output value reflects the probability that our model believes that the input sequence contains confidential messages. We can set a detection threshold, like 0.5, and then the final detection result can be expressed as

(9)

Iii-C Trainning Framework

The trainning process of the proposed model followed a supervised framework and incorporated knowledge distillation (kd) [8] to improve the performance. Knowledge distillation was a framework proposed by Hinton to compress a large model into a simplified model that can improve the performance of the latter one. The framework uses a teacher-student setting where the student learns from both the ground-truth labels (hard labels) and the soft labels provided by the teacher. The probability mass associated with each class in the soft-labels allows the student to learn more information about the label similarities form a given sample.

In our setting, in order to accelerate the detection efficiency, the proposed model is designed as simple as possible. Thus, it is essential to utilized this framework in the training process of the proposed model. In this paper, we designed a teacher model which contains three Fully Connected (FC) layers to capture correlation in the sequence. Parameters in this teacher model are learned by minimizing the log loss for all training samples in the following manner:

(10)

where is the total number of samples. Our key idea is to train the proposed (student) model with the resulting distribution in Equation 10 rather than the ground truth labels. Denote the label generated from teacher model as

, the new loss function for the student model can be set as:

(11)

The framework of this training process is presented in Figure 2.

Fig. 2: Proposed Trainning Framework to Improve the Performance of Light Weight Correlation Extraction Scheme

Iv Experiments and analysis

Our experiments are based on a dataset111https://github.com/fjxmlzn/RNN-SM that has been published by Lin [16]. This dataset has more than 100 hours of speech data and includes speaks both in Chinese and in English. Since different languages have different characteristics, we test the speech in different languages separately. In the experiment, we used a low-bit-rate speech codec G.729 to compress and encode the original audio. Steganography algorithm we adopted was a representative steganography scheme CNV-QIM [18]. In addition, in order to test the detection performance, we cut the speech into clips with different lengths. In addition, we generated speech samples embedded with different embedding rates to test the models’ adaptation to various embedding rates. Embedding rate is defined as the ratio of the number of embedded bits to the whole embedding capacity. Embedding positions are chosen randomly.

In the training process, we divided the entire sample set into training set, validation set, and test set according to a ratio of 8:1:1. In the experiment, model hyperparameters were selected via cross-validation. In particular, the embedding size

is 64. When the sample length is 0.1s, total number of frames in sliding window is 10. the number of hidden layer in proposed model is 1. The number of hidden layers in teacher model is 3 and the dimensions in last two layers are 128 and 64. We used adam [2]

as our learning algorithm to optimize the model parameters. Our code is implemented by Keras

222https://keras.io/. The training and testing environment for the experiments is: Inter(R) Xeon(R) CPU E5-2683 v3 2.00 GHz and GeForce GTX 1080 GPU for accelerating.

To validate the performance of our model, we chose several different representative steganalysis algorithms as our baseline models [15, 19, 16]. Li [15] constructed a model called the Quantization codeword correlation network (QCCN) based on split VQ codeword from adjacent speech frames to capture correlation and build a high-performance detector with the support vector machine (SVM) classifier. Lin [16] pointed out four types of correlation between code-words and frames and proposed a codeword correlation model, which is based on the recurrent neural network (RNN). Authors in [19] indicated a proper way to take advantage of two main deep learning architectures CNN and RNN and propose a novel CNN-LSTM model to detect steganography in VoIP streams, which achieves the state-of-the-art performance.

Besides, metrics used to evaluate the performance of different models in experiments are detection accuracy and inference time. Detection accuracy is defined as the ratio of the number of samples that are correctly classified to the total number of samples.

Iv-a Time Efficiency

We mainly compare our proposed method with several previous models that automatically extract correlations. The results of the experiment are shown in the Table I and Figure LABEL:fig:trainning. From the results, it is obvious that as the length of the sample becomes longer, the detection time will continue to increase, but the detection time of our algorithm rises slowest. Moreover, our algorithm’s detection performances at different sample lengths are significantly higher than other methods. When the sample length is 1s, the detection efficiency of our model is 20 times more than that of the other two models. Even if the sample length is 0.1s, inference time of proposed model is about 0.05 milliseconds and is only 1/10 of the previous model, which shows strong practical value for online serving.

Method Sample Length(ms)
100 300 500 700 1000
Lin [16] 0.5844 1.3551 2.1233 3.1001 4.1647
Yang [19] 0.5964 1.3495 2.0242 2.7008 3.7536
Ours 0.0517 0.0837 0.1001 0.1225 0.1626
TABLE I: Efficiency Test of Different Models

Iv-B Detection Accuracy

Language Method Embedding Rates (%)
10 20 30 40 50
Chinese Li [15] 51.85 58.15 66.25 71.10 77.40
Lin [16] 57.04 67.29 75.41 82.05 86.13
Yang [19] 58.65 67.89 75.51 79.16 85.84
Ours (no kd) 59.69 69.80 77.80 84.32 89.21
Ours 60.67 70.18 78.31 84.59 89.47
English Li [15] 52.30 58.10 63.05 72.90 76.30
Lin [16] 57.18 66.42 76.74 81.00 88.25
Yang [19] 58.78 68.06 76.56 82.70 87.07
Ours (no kd) 59.84 69.88 77.71 84.06 88.99
Ours 60.53 70.32 78.01 84.44 89.25
TABLE II: Detection Accuracy of 0.3s Samples under Low Embedding Rates
Language Method Sample Length (s)
0.1 0.3 0.5 0.7 1.0
Chinese Li [15] 54.17 58.15 61.19 62.33 65.67
Lin [16] 58.03 67.29 72.01 75.08 77.49
Yang [19] 58.46 67.89 73.81 74.59 77.36
Ours (no kd) 61.99 69.80 74.45 78.12 81.64
Ours 62.27 70.18 74.76 78.44 82.06
English Li [15] 57.29 58.10 61.49 63.48 66.06
Lin [16] 57.18 66.79 73.02 77.32 80.11
Yang [19] 58.67 68.06 75.06 76.94 79.01
Ours (no kd) 61.74 69.88 74.44 77.68 81.87
Ours 62.27 70.32 74.89 78.25 82.31
TABLE III: Detection Accuray of 20% Embedding Rate under Short Samples

Sample duration and embedding rate are the two most important factors affecting detection performance. In a practical application scenario, two communication parties always adopt a low embedding rate strategy and communicate in a short period of time to reduce the probability of being detected. Thus, our experiments tested the performance at low embedding rates and short durations, respectively. As can be seen from the table, our model performs well at different embedding rates and different durations. In addition, it can be seen from the experiments that this proposed model utilized knowledge distillation performs better than the model that adopt commonly used training methods. Thus, we can draw the conclusion that the training framework using knowledge distillation has important value for modeling other real-time steganalysis problem.

V Conclusion

In this paper, we present a novel and extremely fast steganalysis method of VoIP streams, driven by the need for a quick and accurate detection of possible steganography in stream media. Despite simple structure in exploring the correlation in the carrier, it achieves the state-of-the-art performance both in detection accuracy and efficiency. Especially, the average processing time of this proposed method is only about when the sample length is as short as 0.1s, making it have strong practical value for online serving of steganography monitor. Thus, the proposed correlation extraction scheme and training framework can serve as a guide for other researchers in exploring real time steganalysis, since the solution has the potential to address similar runtime efficiency problems in online systems.

References

  • [1] C. B, L. W, and L. H (2017) Audio steganalysis with convolutional neural network. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 85–90. Cited by: §I.
  • [2] J. L. Ba (2014) Adam: amethod for stochastic optimization. In 3rd Int. Conf. Learn. Representations, Cited by: §IV.
  • [3] L. T. Bosch (2003) Emotions, speech and the asr framework. Speech Communication 40 (1), pp. 213–225. Cited by: §III-A.
  • [4] C. Cachin (2004) An information-theoretic model for steganography. 192 (1), pp. 306–318. Cited by: §II.
  • [5] Chen,B, Wornell, and G.W. (2002) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47 (4), pp. 1423–1443. Cited by: §I.
  • [6] J. Devlin, M. Chang, K. Lee, and K. Toutanova (2018) Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805. Cited by: §III-A.
  • [7] J. Dittmann, D. Hesse, and R. Hillert (2005) Steganography and steganalysis in voice-over ip scenarios: operational aspects and first experiences with a new steganalysis tool set. In Security, Steganography, & Watermarking of Multimedia Contents VII, Cited by: §I.
  • [8] G. Hinton, O. Vinyals, and J. Dean (2015) Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531. Cited by: §III-C.
  • [9] Y. F. Huang, S. Tang, and J. Yuan (2011-06) Steganography in inactive frames of voip streams encoded by source codec. IEEE Transactions on Information Forensics and Security 6 (2), pp. 296–306. External Links: Document, ISSN Cited by: §I.
  • [10] Y. F. Huang, S. Tang, and Y. Zhang (2011) Detection of covert voice-over internet protocol communications using sliding window-based steganalysis. Iet Communications 5 (7), pp. 929–936. Cited by: §II.
  • [11] Y. Huang, C. Liu, S. Tang, and S. Bai (2012) Steganography integration into a low-bit rate speech codec. IEEE Transactions on Information Forensics & Security 7 (6), pp. 1865–1875. Cited by: §I, §I.
  • [12] T. Hui, L. Jin, and S. Li (2014) Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimedia Systems 20 (2), pp. 143–154. Cited by: §I.
  • [13] A. Joulin, E. Grave, P. Bojanowski, T. Mikolov, A. Joulin, E. Grave, P. Bojanowski, T. Mikolov, A. Joulin, and E. Grave (2016) Bag of tricks for efficient text classification. Cited by: §III-A.
  • [14] C. Kraetzer and J. Dittmann (2007) Mel-cepstrum-based steganalysis for voip steganography. In Security, Steganography, & Watermarking of Multimedia Contents IX, Cited by: §I.
  • [15] S. Li, Y. Jia, and C. C. J. Kuo (2017) Steganalysis of qim steganography in low-bit-rate speech signals. IEEE/ACM Transactions on Audio Speech & Language Processing 25 (99), pp. 1–1. Cited by: §I, TABLE II, TABLE III, §IV.
  • [16] Z. Lin, Y. Huang, and J. Wang (2018) RNN-sm: fast steganalysis of voip streams using recurrent neural network. IEEE Transactions on Information Forensics & Security PP (99), pp. 1–1. Cited by: §I, TABLE I, TABLE II, TABLE III, §IV, §IV.
  • [17] L. Liu, M. Li, Q. Li, and Y. Liang (2008-08) Perceptually transparent information hiding in g.729 bitstream. In 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Vol. , pp. 406–409. External Links: Document, ISSN Cited by: §I.
  • [18] B. Xiao, Y. Huang, and S. Tang (2008) An approach to information hiding in low bit-rate speech stream. In Global Telecommunications Conference, 2008. IEEE GLOBECOM, pp. 1–5. Cited by: §I, §I, §IV.
  • [19] H. Yang, Z. Yang, and Y. Huang (2019) Steganalysis of voip streams with cnn-lstm network. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 204–209. Cited by: §I, TABLE I, TABLE II, TABLE III, §IV.
  • [20] S. Zander, G. J. Armitage, and P. Branch (2007) Covert channels and countermeasures in computer network protocols. IEEE Communications Surveys & Tutorials 9 (3), pp. 44–57. Cited by: §I.