[1] JOHNSON M K,LYU S,FARID H. Steganalysis of recorded speech[C]//Proceedings of the SPIE 5681, Security, Steganography,and Watermarking of Multimedia Contents Ⅶ. Bellingham,WA:SPIE,2005:664-672. [2] KRAETZER C,DITTMANN J. Mel-cepstrum-based steganalysis for VoIP steganography[C]//Proceedings of the SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents Ⅸ. Bellingham,WA:SPIE,2007:No. 650505. [3] LIU Q,SUNG A H,QIAO M. Temporal derivative-based spectrum and Mel-cepstrum audio steganalysis[J]. IEEE Transactions on Information Forensics and Security,2009,4(3):359-368. [4] LIU Q,SUNG A H,QIAO M. Derivative-based audio steganalysis[J]. ACM Transactions on Multimedia Computing, Communications,and Applications,2011,7(3):No. 18. [5] GEETHA S,ISHWARYA N,KAMARAJ N. Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm[J]. Expert Systems with Applications, 2010,37(12):7469-7482. [6] 王昱洁, 杨萍, 蒋薇薇. 一种基于MDCT量化系数统计特征的AAC音频隐写分析方法[J]. 合肥工业大学学报(自然科学版), 2015,38(10):1348-1352,1409.(WANG Y J,YANG P,JIANG W W. A steganalysis method of AAC audio based on statistical features of MDCT quantized coefficients[J]. Journal of Hefei University of Technology(Natural Science),2015,38(10):1348-1352,1409.) [7] 王昱洁, 蒋薇薇. 基于模糊C均值聚类与单类支持向量机的音频隐写分析方法[J]. 计算机应用,2016,36(3):647-652. (WANG Y J,J W W. Audio steganalysis method based on fuzzy Cmeans clustering and one class support vector machine[J]. Journal of Computer Applications,2016,36(3):647-652.) [8] HAN C,XUE R,ZHANG R,et al. A new audio steganalysis method based on linear prediction[J]. Multimedia Tools and Applications,2018,77(12):15431-15455. [9] REN Y,XIONG Q,WANG L. A steganalysis scheme for AAC audio based on MDCT difference between intra and inter frame[C]//Proceedings of the 2017 International Workshop on Digital Watermarking,LNCS 10431. Cham:Springer,2017:217-231. [10] CHEN B,LUO W,LI H. Audio steganalysis with convolutional neural network[C]//Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM, 2017:85-90. [11] LIN Y, WANG R, YAN D, et al. Audio steganalysis with improved convolutional neural network[C]//Proceedings of the 7th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM,2019:210-215. [12] WANG Y,YANG K,YI X,et al. CNN-based steganalysis of MP3 steganography in entropy code domain[C]//Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM,2018:55-65. [13] YANG H,YANG Z,HUANG Y. Steganalysis of VoIP streams with CNN-LSTM network[C]//Proceedings of the 7th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM,2019:204-209. [14] FILLER T, JUDAS J, FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security,2011,6(3):920-935. [15] CHEN T, GUESTRIN C. XGBoost:a scalable tree boosting system[C]//Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM,2016:785-794. [16] SRIVASTAVA N, HINTON G, KRIZHEVSKY A, et al. Dropout:a simple way to prevent neural networks from overfitting[J]. Journal of Machine Learning Research,2014,15(56):1929-1958. [17] YE J,NI J,YI Y. Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security,2017,12(11):2545-2557. [18] HE K,ZHANG X,REN S,et al. Deep residual learning for image recognition[C]//Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE, 2016:770-778. [19] GAROFOLO J S,LAMEL L F,FISHER W M,et al. DARPA TIMIT:acoustic-phonetic continuous speech corpus:NISTIR4930[R]. Gaithersburg, MD:National Institute of Standards and Technology,1993. [20] LUO W,LI H,YAN Q,et al. Improved audio steganalytic feature and its applications in audio forensics[J]. ACM Transactions on Multimedia Computing, Communications, and Applications, 2018,14(2):No. 43. |