{"id":"https://openalex.org/W4205241294","doi":"https://doi.org/10.1109/tdsc.2022.3141121","title":"A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet","display_name":"A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet","publication_year":2022,"publication_date":"2022-01-07","ids":{"openalex":"https://openalex.org/W4205241294","doi":"https://doi.org/10.1109/tdsc.2022.3141121"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3141121","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3141121","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101499462","display_name":"Yanzhen Ren","orcid":"https://orcid.org/0000-0003-0799-5082"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanzhen Ren","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036584151","display_name":"Dengkai Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dengkai Liu","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100731335","display_name":"Chenyu Liu","orcid":"https://orcid.org/0000-0002-3654-1824"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenyu Liu","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027756585","display_name":"Qiaochu Xiong","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiaochu Xiong","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074852104","display_name":"Jianming Fu","orcid":"https://orcid.org/0000-0002-4639-5824"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianming Fu","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056155495","display_name":"Lina Wang","orcid":"https://orcid.org/0000-0001-8085-1312"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101499462"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":2.3481,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.89629914,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"20","issue":"1","first_page":"665","last_page":"679"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8404415845870972},{"id":"https://openalex.org/keywords/spectrogram","display_name":"Spectrogram","score":0.8070684671401978},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7996692657470703},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7469160556793213},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5685299634933472},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5554606318473816},{"id":"https://openalex.org/keywords/audio-signal","display_name":"Audio signal","score":0.5378128290176392},{"id":"https://openalex.org/keywords/modified-discrete-cosine-transform","display_name":"Modified discrete cosine transform","score":0.5059239268302917},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4992647171020508},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4378291368484497},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4284519851207733},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.42354023456573486},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4129719138145447},{"id":"https://openalex.org/keywords/speech-coding","display_name":"Speech coding","score":0.4016527533531189},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.09270656108856201}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8404415845870972},{"id":"https://openalex.org/C45273575","wikidata":"https://www.wikidata.org/wiki/Q578970","display_name":"Spectrogram","level":2,"score":0.8070684671401978},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7996692657470703},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7469160556793213},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5685299634933472},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5554606318473816},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.5378128290176392},{"id":"https://openalex.org/C28726691","wikidata":"https://www.wikidata.org/wiki/Q1268231","display_name":"Modified discrete cosine transform","level":5,"score":0.5059239268302917},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4992647171020508},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4378291368484497},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4284519851207733},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.42354023456573486},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4129719138145447},{"id":"https://openalex.org/C13895895","wikidata":"https://www.wikidata.org/wiki/Q3270773","display_name":"Speech coding","level":2,"score":0.4016527533531189},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.09270656108856201},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3141121","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3141121","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G381375632","display_name":null,"funder_award_id":"2020BAB018","funder_id":"https://openalex.org/F4320335792","funder_display_name":"Hubei Technological Innovation Special Fund"},{"id":"https://openalex.org/G6899305262","display_name":null,"funder_award_id":"2021BAA034","funder_id":"https://openalex.org/F4320335792","funder_display_name":"Hubei Technological Innovation Special Fund"},{"id":"https://openalex.org/G8184826122","display_name":null,"funder_award_id":"61872275","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8397513479","display_name":null,"funder_award_id":"62172306","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335792","display_name":"Hubei Technological Innovation Special Fund","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1599141734","https://openalex.org/W1976155975","https://openalex.org/W1989755262","https://openalex.org/W1993490956","https://openalex.org/W2004932860","https://openalex.org/W2009130368","https://openalex.org/W2012995369","https://openalex.org/W2021036171","https://openalex.org/W2040299224","https://openalex.org/W2043370778","https://openalex.org/W2046180645","https://openalex.org/W2050128407","https://openalex.org/W2065379506","https://openalex.org/W2073274365","https://openalex.org/W2081564928","https://openalex.org/W2121465628","https://openalex.org/W2134527668","https://openalex.org/W2148808559","https://openalex.org/W2153635508","https://openalex.org/W2185690471","https://openalex.org/W2194775991","https://openalex.org/W2297834140","https://openalex.org/W2316482621","https://openalex.org/W2322622188","https://openalex.org/W2371300693","https://openalex.org/W2403211215","https://openalex.org/W2416075718","https://openalex.org/W2514127746","https://openalex.org/W2565257220","https://openalex.org/W2621048556","https://openalex.org/W2734981382","https://openalex.org/W2736261471","https://openalex.org/W2737334161","https://openalex.org/W2738179953","https://openalex.org/W2738304944","https://openalex.org/W2739185626","https://openalex.org/W2761700536","https://openalex.org/W2789773147","https://openalex.org/W2809615303","https://openalex.org/W2888845754","https://openalex.org/W2892948265","https://openalex.org/W2914224456","https://openalex.org/W2937834740","https://openalex.org/W2960868440","https://openalex.org/W2961527004","https://openalex.org/W2981556606","https://openalex.org/W6635882926","https://openalex.org/W6638667902","https://openalex.org/W7052803895"],"related_works":["https://openalex.org/W2978563117","https://openalex.org/W4220747575","https://openalex.org/W2064665753","https://openalex.org/W2105458961","https://openalex.org/W2037059691","https://openalex.org/W2135904135","https://openalex.org/W2565123265","https://openalex.org/W2112852877","https://openalex.org/W2772926198","https://openalex.org/W1967066785"],"abstract_inverted_index":{"Given":[0],"the":[1,19,69,91,95,104,107,119,130,138,150,160,175,194,199,203,220,228,241],"popularity":[2],"of":[3,15,82,94,159,222],"audio":[4,9,24,57,74,96,216,230,257,264],"and":[5,34,60,123,152,191,207,212,243],"video":[6],"applications,":[7],"compressed":[8,23,73],"has":[10],"become":[11],"an":[12],"important":[13],"carrier":[14],"covert":[16],"communication":[17],"on":[18,52,149],"Internet.":[20],"Many":[21],"novel":[22],"steganography":[25,50,87,146,204,237],"schemes":[26,147,182,205,238],"have":[27],"emerged":[28],"that":[29,80,137,166,233],"offer":[30],"good":[31],"hiding":[32],"capability":[33],"aural":[35],"concealment.":[36],"In":[37],"this":[38,225,251],"paper,":[39],"a":[40,86],"universal":[41],"steganalysis":[42,231,258],"scheme":[43,88,140,162,232],"called":[44],"MultiSpecNet":[45],"is":[46,79,115,141,163,198,209,227],"proposed":[47,101,139,161,249],"to":[48,110,117,128,256],"detect":[49,235],"based":[51,148],"multiple":[53,236],"embedding":[54,154,245],"domains":[55],"(advanced":[56],"coding":[58],"(AAC)":[59],"MPEG-1":[61],"Audio":[62],"Layer":[63],"III":[64],"(MP3)),":[65],"which":[66],"are":[67,126],"currently":[68],"two":[70],"most":[71],"popular":[72,211],"standards.":[75],"The":[76,100,133,156,247],"basic":[77],"idea":[78],"modification":[81],"either":[83],"domain":[84],"by":[85,168,202],"will":[89],"change":[90],"time-frequency":[92],"relationship":[93],"signal":[97,217],"after":[98],"decoding.":[99],"approach":[102],"adopts":[103],"spectrogram":[105],"as":[106,174],"input":[108],"feature":[109,121,131],"extract":[111],"richer":[112],"information.":[113],"DeepResNet":[114,177],"used":[116,127],"learn":[118],"distinguishing":[120],"representations,":[122],"multiscale":[124],"spectrograms":[125,173],"enrich":[129],"diversity.":[132],"experimental":[134],"results":[135],"show":[136],"effective":[142,213],"at":[143],"detecting":[144],"different":[145],"AAC":[151,244],"MP3":[153,242],"domains.":[155,246],"detection":[157],"accuracy":[158],"higher":[164],"than":[165,181],"achieved":[167],"other":[169,260],"state-of-the-art":[170],"schemes.":[171],"Using":[172],"input,":[176],"achieves":[178],"better":[179],"performance":[180],"using":[183],"quantized":[184,195],"modified":[185,201],"discrete":[186],"cosine":[187],"transform":[188],"(MDCT)":[189],"coefficients":[190],"mel-spectrogram,":[192],"although":[193],"MDCT":[196],"coefficient":[197],"parameter":[200],"directly":[206],"mel-spectrogram":[208],"very":[210],"for":[214,259,263],"general":[215],"analysis.":[218],"To":[219],"best":[221],"our":[223],"knowledge,":[224],"work":[226],"first":[229],"can":[234,253],"in":[239,250],"both":[240],"method":[248],"paper":[252],"be":[254],"extended":[255],"codecs":[261],"or":[262],"forensics":[265],"purposes.":[266]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
