Skip to main content
Top

2014 | OriginalPaper | Chapter

Steganalysis of Compressed Speech Based on Markov and Entropy

Authors : Haibo Miao, Liusheng Huang, Yao Shen, Xiaorong Lu, Zhili Chen

Published in: Digital-Forensics and Watermarking

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Compressed domain based steganography (CDBS) is a kind of relatively new and secure audio steganography. Up to date, there is little research on the steganalysis against this kind of audio steganography. In this paper, we introduce two methods to detect various CDBS on ACELP speech. One is the Markov method and the other is the entropy method. Both methods are based on the observation that the steganography behavior has certain effects on the relationship among the pulses in the same track. The Markov transition probabilities are utilized to evaluate the interrelationships between adjacent pulses and entropy is employed to measure the “disorder” of combined pulse distributions. First, Markov transition probabilities, joint entropy and conditional entropy features of the track pulses are extracted; a support vector machine (SVM) is then applied to the features for discovering the existence of hidden data in compressed speech signals, respectively. Some famous CDBS methods on ACELP encoded speech are considered. Experimental results have proven the effectiveness of the two methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding - a survey. Proc. IEEE Spec. Issue Prot. Multimed. Content 87(7), 1062–1078 (1999) Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding - a survey. Proc. IEEE Spec. Issue Prot. Multimed. Content 87(7), 1062–1078 (1999)
2.
go back to reference Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)CrossRef Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)CrossRef
3.
go back to reference Liu, Q., Sung, A.H., Qiao, M.: Derivative-based audio steganalysis. ACM Trans. Multimed. Comput. Commun. Appl. 7(3), 1–19 (2011)CrossRef Liu, Q., Sung, A.H., Qiao, M.: Derivative-based audio steganalysis. ACM Trans. Multimed. Comput. Commun. Appl. 7(3), 1–19 (2011)CrossRef
4.
go back to reference Scott A. Moskowitz, Marc Cooperman.M.S.A., C. M.: Steganographic method and device. USA Patent (1997) Scott A. Moskowitz, Marc Cooperman.M.S.A., C. M.: Steganographic method and device. USA Patent (1997)
5.
go back to reference Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996)CrossRef Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996)CrossRef
6.
go back to reference Lee, C., Moallemi, K., Warren, R.: Method and apparatus for transporting auxiliary data in audio signals. USA Patent (1998) Lee, C., Moallemi, K., Warren, R.: Method and apparatus for transporting auxiliary data in audio signals. USA Patent (1998)
7.
go back to reference Lee, S.-K., Ho, Y.-S.: Digital audio watermarking in the cepstrum domain. IEEE Trans. Consum. Electron. 46(3), 744–750 (2000)CrossRefMathSciNet Lee, S.-K., Ho, Y.-S.: Digital audio watermarking in the cepstrum domain. IEEE Trans. Consum. Electron. 46(3), 744–750 (2000)CrossRefMathSciNet
8.
go back to reference Gruhl, D., Bender, W., Lu, A.: Echo hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 295–315. Springer, Heidelberg (1996)CrossRef Gruhl, D., Bender, W., Lu, A.: Echo hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 295–315. Springer, Heidelberg (1996)CrossRef
9.
go back to reference Gopalan, K., Wenndt, S., Noga, A., Haddad, D., Adams, S.: Covert speech communication via cover speech by tone insertion. In: Proceedings of the 2003 IEEE Aerospace Conference, Big Sky, MT (2003) Gopalan, K., Wenndt, S., Noga, A., Haddad, D., Adams, S.: Covert speech communication via cover speech by tone insertion. In: Proceedings of the 2003 IEEE Aerospace Conference, Big Sky, MT (2003)
10.
go back to reference Gopalan, K., Wenndt, S.: Audio Steganography for covert data transmission by imperceptible tone insertion. In: Proceedings of the IASTED International Conference on Communication Systems and Applications, Banff, Canada (2004) Gopalan, K., Wenndt, S.: Audio Steganography for covert data transmission by imperceptible tone insertion. In: Proceedings of the IASTED International Conference on Communication Systems and Applications, Banff, Canada (2004)
11.
go back to reference Miao, H., Huang, L., Chen, Z., Yang, W., Al-hawbani, A.: A new scheme for covert communication via 3G encoded speech. Comput. Electr. Eng. 38(6), 1490–1501 (2012)CrossRef Miao, H., Huang, L., Chen, Z., Yang, W., Al-hawbani, A.: A new scheme for covert communication via 3G encoded speech. Comput. Electr. Eng. 38(6), 1490–1501 (2012)CrossRef
12.
go back to reference Wu, Z., Yang, W.: Speech information hiding in G.729. Chin. J. Electron. 15(3), 545–549 (2006) Wu, Z., Yang, W.: Speech information hiding in G.729. Chin. J. Electron. 15(3), 545–549 (2006)
13.
go back to reference Lu, Z.M., Yan, B.: Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst. E88-D(2), 330–334 (2005) Lu, Z.M., Yan, B.: Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst. E88-D(2), 330–334 (2005)
14.
go back to reference Geiser, B., Vary, P.: Backwards compatible wideband telephony in mobile networks: CELP watermarking and bandwidth extension. In: Proceedings of ICASSP, Honolulu, Hawai’i, USA (2007) Geiser, B., Vary, P.: Backwards compatible wideband telephony in mobile networks: CELP watermarking and bandwidth extension. In: Proceedings of ICASSP, Honolulu, Hawai’i, USA (2007)
15.
go back to reference Geiser, B., Vary, P.: High rate data hiding in ACELP speech codec. In: Proceedings of ICASSP, Caesars Palace, Las Vegas, Nevada, USA (2008) Geiser, B., Vary, P.: High rate data hiding in ACELP speech codec. In: Proceedings of ICASSP, Caesars Palace, Las Vegas, Nevada, USA (2008)
16.
go back to reference Kraetzer, C., Dittmann, J.: Pros and cons of mel-cepstrum based audio steganalysis using SVM classification. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 359–377. Springer, Heidelberg (2008)CrossRef Kraetzer, C., Dittmann, J.: Pros and cons of mel-cepstrum based audio steganalysis using SVM classification. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 359–377. Springer, Heidelberg (2008)CrossRef
17.
go back to reference Zeng, W., Ai, H., Hu, R.: A novel steganalysis algorithm of phase coding in audio signal. In: Proceedings of the International Conference on Advanced Language Processing and Web Information Technology, pp. 261–264 (2007) Zeng, W., Ai, H., Hu, R.: A novel steganalysis algorithm of phase coding in audio signal. In: Proceedings of the International Conference on Advanced Language Processing and Web Information Technology, pp. 261–264 (2007)
18.
go back to reference Zeng, W., Ai, H., Hu, R.: An algorithm of echo steganalysis based on power cepstrum and pattern classification. In: Proceedings of the International Conference on Information and Automation, pp. 1667–1670 (2008) Zeng, W., Ai, H., Hu, R.: An algorithm of echo steganalysis based on power cepstrum and pattern classification. In: Proceedings of the International Conference on Information and Automation, pp. 1667–1670 (2008)
19.
go back to reference Paraskevas, I., Chilton, E.: Combination of magnitude and phase statistical features for audio classification. Acoust. Res. Lett. Online Acoust. Soc. Am. 5(3), 111–117 (2004)CrossRef Paraskevas, I., Chilton, E.: Combination of magnitude and phase statistical features for audio classification. Acoust. Res. Lett. Online Acoust. Soc. Am. 5(3), 111–117 (2004)CrossRef
20.
go back to reference Johnson, M.K., Lyu, S., Farid, H.: Steganalysis of recorded speech. In: Proceedings of Conference on Security, Steganography and Watermarking of Multimedia, Contents VII, pp. 664–672 (2005) Johnson, M.K., Lyu, S., Farid, H.: Steganalysis of recorded speech. In: Proceedings of Conference on Security, Steganography and Watermarking of Multimedia, Contents VII, pp. 664–672 (2005)
21.
go back to reference Ozer, H., Avcibas, I., Sankur, B., Memon, N.D.: Steganalysis of audio based on audio quality metrics. In: Proceedings of the Conference on Security, Steganography and Watermarking of Multimedia, Contents V, vol. 5020, pp. 55–66 (2003) Ozer, H., Avcibas, I., Sankur, B., Memon, N.D.: Steganalysis of audio based on audio quality metrics. In: Proceedings of the Conference on Security, Steganography and Watermarking of Multimedia, Contents V, vol. 5020, pp. 55–66 (2003)
22.
go back to reference Liu, Y., Chiang, K., Corbett, C., Archibald, R., Mukherjee, B., Ghosal, D.: A novel audio steganalysis based on high-order statistics of a distortion measure with hausdorff distance. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 487–501. Springer, Heidelberg (2008)CrossRef Liu, Y., Chiang, K., Corbett, C., Archibald, R., Mukherjee, B., Ghosal, D.: A novel audio steganalysis based on high-order statistics of a distortion measure with hausdorff distance. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 487–501. Springer, Heidelberg (2008)CrossRef
23.
go back to reference Holotyak, T., Fridrich, J., Voloshynovskiy, S.: Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security (2005) Holotyak, T., Fridrich, J., Voloshynovskiy, S.: Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security (2005)
24.
go back to reference Avcibas, I.: Audio steganalysis with content-independent distortion measures. IEEE Sig. Process. Lett. 13(2), 92–95 (2006)CrossRef Avcibas, I.: Audio steganalysis with content-independent distortion measures. IEEE Sig. Process. Lett. 13(2), 92–95 (2006)CrossRef
25.
go back to reference Liu, Q., Sung, A.H., Qiao, M.: Novel stream mining for audio steganalysis. In: Proceedings of the 17th ACM international conference on multimedia, Beijing, pp. 95–104 (2009) Liu, Q., Sung, A.H., Qiao, M.: Novel stream mining for audio steganalysis. In: Proceedings of the 17th ACM international conference on multimedia, Beijing, pp. 95–104 (2009)
26.
go back to reference Qi, D., Xijian, P.: Steganalysis of compressed speech based on histogram features. In: Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Chengdu, China (2010) Qi, D., Xijian, P.: Steganalysis of compressed speech based on histogram features. In: Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Chengdu, China (2010)
27.
go back to reference Chen, Z., Huang, L., Meng, P., Yang, W., Miao, H.: Blind linguistic steganalysis against translation based steganography. In: Kim, H.-J., Shi, Y.Q., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 251–265. Springer, Heidelberg (2011)CrossRef Chen, Z., Huang, L., Meng, P., Yang, W., Miao, H.: Blind linguistic steganalysis against translation based steganography. In: Kim, H.-J., Shi, Y.Q., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 251–265. Springer, Heidelberg (2011)CrossRef
Metadata
Title
Steganalysis of Compressed Speech Based on Markov and Entropy
Authors
Haibo Miao
Liusheng Huang
Yao Shen
Xiaorong Lu
Zhili Chen
Copyright Year
2014
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-43886-2_5

Premium Partner