{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T23:09:43Z","timestamp":1720393783064},"reference-count":34,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p>The calibrated matrix of the second-order difference of the pitch delay (C-MSDPD) feature has been proven to be effective in detecting steganography based on pitch delay. In this article, a new steganalysis scheme based on multiple statistical features of pitch delay is present. Analyzing the principle of the adaptive multi-rate (AMR) codec, the pitch delay values in the same frame is divided into groups, in each of which, a pitch delay has a closer correlation with the other ones. To depict the characteristic of the pitch delay, two new types of statistical features are adopted in this article. The new features and C-MSDPD feature are together employed to train a classifier based on support vector machine (SVM). The experimental result shows that, the proposed scheme outperforms the existing one at different embedding bit rates and with different speech lengths.<\/jats:p>","DOI":"10.4018\/ijdcf.2019100105","type":"journal-article","created":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T10:10:22Z","timestamp":1569579022000},"page":"66-81","source":"Crossref","is-referenced-by-count":4,"title":["Steganalysis of AMR Based on Statistical Features of Pitch Delay"],"prefix":"10.4018","volume":"11","author":[{"given":"Yanpeng","family":"Wu","sequence":"first","affiliation":[{"name":"Xiamen Meiya Pico Information Co., Ltd., Xiamen, China"}]},{"given":"Huiji","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xiamen Meiya Pico Information Co., Ltd., Xiamen, China"}]},{"given":"Yi","family":"Sun","sequence":"additional","affiliation":[{"name":"Xiamen Meiya Pico Information Co., Ltd., Xiamen, China"}]},{"given":"Minghui","family":"Chen","sequence":"additional","affiliation":[{"name":"Xiamen Meiya Pico Information Co., Ltd., Xiamen, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2019100105-0","unstructured":"Bas, P. (2010). Using high-dimensional image models to perform highly undetectable steganography. Paper presented atInternational Conference on Information Hiding, Calgary, Canada."},{"key":"IJDCF.2019100105-1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555281"},{"key":"IJDCF.2019100105-2","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.148"},{"key":"IJDCF.2019100105-3","unstructured":"Ekudden, E., Hagen, R., Johansson, I., & Svedberg, J. (1999, June). The adaptive multi-rate speech coder. Paper presented at1999 IEEE Workshop on Speech Coding Proceedings, Porvoo, Finland."},{"key":"IJDCF.2019100105-4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"IJDCF.2019100105-5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"IJDCF.2019100105-6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4518532"},{"key":"IJDCF.2019100105-7","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"IJDCF.2019100105-8","year":"2016","journal-title":"Digital Cellular Telecommunications System (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Mandatory Speech Codec Speech Processing Functions; Adaptive Multi-Rate (AMR) Speech Codec; Transcoding Functions (3GPP TS 26.090 version 13.0.0 Release 13)\u201d, Technical Report TR 126 090"},{"key":"IJDCF.2019100105-9","doi-asserted-by":"publisher","DOI":"10.1121\/1.391349"},{"key":"IJDCF.2019100105-10","doi-asserted-by":"crossref","unstructured":"Holub, V., & Fridrich, J. (2013). Digital image steganography using universal distortion. Paper presented at the1st ACM workshop on information hiding and multimedia security, Montpellier, France.","DOI":"10.1145\/2482513.2482514"},{"key":"IJDCF.2019100105-11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218599"},{"issue":"2","key":"IJDCF.2019100105-12","first-page":"357","article-title":"Key distribution over the covert communication based on VoIP.","volume":"20","author":"Y.Huang","year":"2011","journal-title":"Chinese Journal of Electronics"},{"key":"IJDCF.2019100105-13","doi-asserted-by":"publisher","DOI":"10.1145\/2961053"},{"key":"IJDCF.2019100105-14","doi-asserted-by":"crossref","unstructured":"Li, S., Jia, Y., & Kuo, C. C. J. (2017). Steganalysis of qim steganography in low-bit-rate speech signals. IEEE\/ACM Transactions on Audio Speech & Language Processing, 25(5), 1011-1022.","DOI":"10.1109\/TASLP.2017.2676356"},{"key":"IJDCF.2019100105-15","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.C1100374"},{"issue":"10","key":"IJDCF.2019100105-16","first-page":"2107","article-title":"Detection of pitch modulation information hiding based on codebook correlation network.","volume":"37","author":"S. B.Li","year":"2014","journal-title":"Chinese Journal of Computers"},{"key":"IJDCF.2019100105-17","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-015-0315-6"},{"key":"IJDCF.2019100105-18","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2017.7965617"},{"key":"IJDCF.2019100105-19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2759-2"},{"key":"IJDCF.2019100105-20","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543587"},{"key":"IJDCF.2019100105-21","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9245-y"},{"key":"IJDCF.2019100105-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.05.003"},{"key":"IJDCF.2019100105-23","doi-asserted-by":"crossref","unstructured":"Miao, H., Huang, L., Shen, Y., Lu, X., & Chen, Z. (2013, October). Steganalysis of Compressed Speech Based on Markov and Entropy. Paper presented atInternational workshop on digital watermarking, Auckland, New Zealand.","DOI":"10.1007\/978-3-662-43886-2_5"},{"key":"IJDCF.2019100105-24","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"IJDCF.2019100105-25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2421322"},{"key":"IJDCF.2019100105-26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636087"},{"key":"IJDCF.2019100105-27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"IJDCF.2019100105-28","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0302-8"},{"key":"IJDCF.2019100105-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.11.013"},{"key":"IJDCF.2019100105-30","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2015.01.026"},{"issue":"3","key":"IJDCF.2019100105-31","first-page":"545","article-title":"Speech information hiding in g.729.","volume":"15","author":"Z.Wu","year":"2006","journal-title":"Chinese Journal of Electronics"},{"key":"IJDCF.2019100105-32","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.375"},{"issue":"6","key":"IJDCF.2019100105-33","first-page":"1774","article-title":"Steganography for low bit-rate speech based on pitch period prediction.","volume":"32","author":"S.Yan","year":"2015","journal-title":"Jisuanji Yingyong Yanjiu"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=238885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:02:13Z","timestamp":1651838533000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019100105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":34,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019100105","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}