Abstract
This article presents a second-order derivative-based audio steganalysis. First, Mel-cepstrum coefficients and Markov transition features from the second-order derivative of the audio signal are extracted; a support vector machine is then applied to the features for discovering the existence of hidden data in digital audio streams. Also, the relation between audio signal complexity and steganography detection accuracy, which is an issue relevant to audio steganalysis performance evaluation but so far has not been explored, is analyzed experimentally. Results demonstrate that, in comparison with a recently proposed signal stream-based Mel-cepstrum method, the second-order derivative-based audio steganalysis method gains a considerable advantage under all categories of signal complexity--especially for audio streams with high signal complexity, which are generally the most challenging for steganalysis-and thereby significantly improves the state of the art in audio steganalysis.
- Avcibas, I. 2006. Audio steganalysis with content-independent distortion measures. IEEE Signal Process. Lett. 13, 2, 92--95.Google ScholarCross Ref
- Bogert, B., Healy, M., and Tukey, J. 1963. The frequency analysis of times series for echoes: cepstrum, pseudoautocovariance, cross-cepstrum, and saphe cracking. In Proceedings of the Symposium on Time Series Analysis.Google Scholar
- Farid, H. 2002. Detecting hidden messages using higher-order statistical models. In Proceedings of the 2002 International Conference on Image Processing (ICIP'02). 905--908.Google Scholar
- Fridrich, J. 2004. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Information Hiding, Lecture Notes in Computer Science, vol. 3200, Springer, Berlin, 67--81. Google ScholarDigital Library
- Gonzalez, R. and Woods, R. 2008. Digital Image Processing 3rd ed. Prentice Hall, Englewood Cliffs, NJ. Google ScholarDigital Library
- Harmsen, J. J. 2003. Steganalysis of additive noise modelable information hiding. Master's thesis, Rensselaer Polytechnic Institute, Troy, NY.Google Scholar
- Harmsen, J. and Pearlman, W. 2003. Steganalysis of additive noise modelable information hiding. In Proceedings of the SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents. vol. 5020, 131--142.Google Scholar
- Hetzl, S. and Mutzel, P. 2005. A graph-theoretic approach to steganography. In Communications and Multimedia Security, Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 119--128. The code is available at http://steghide.sourceforge.net/. Google ScholarDigital Library
- Hill, T. and Lewicki, P. 2005. Statistics: Methods and Applications. StatSoft, Inc.Google Scholar
- Holotyak, T., Fridrich, J., and Voloshynovskiy, S. 2005. Blind statistical steganalysis of additive steganography using wavelet higher order statistics. Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 273--274. Google ScholarDigital Library
- Johnson, M., Lyu, S., and Farid, H. 2005. Steganalysis of recorded speech. In Proceedings of the SPIE. vol. 5681, 664--672.Google Scholar
- Kirovski, D. and Malvar, H. S. 2003. Spread spectrum watermarking of audio signals. IEEE Trans. Signal Process. 51, 4, 1020--1033. The audio watermarking hiding tool is available at http://research.microsoft.com/en-us/downloads/885bb5c4-ae6d-418b-97f9-adc9da8d48bd/default.aspx. Google ScholarDigital Library
- Kraetzer, C. and Dittmann J. 2007. Mel-cepstrum based steganalysis for VOIP-steganography. In Proceedings of the SPIE. vol. 6505.Google Scholar
- Liu, Q. and Sung, A. H. 2007. Feature mining and neuro-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In Proceedings of the 20th International Joint Conference in Artificial Intelligence (IJCAI). 2808--2813. Google ScholarDigital Library
- Liu, Q., Sung, A. H., Chen, Z., and Xu, J. 2008a. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Patt. Recogn. 41, 1, 56--66. Google ScholarDigital Library
- Liu, Q., Sung, A. H., Ribeiro, B., Wei, M., Chen, Z., and Xu, J. 2008b. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci.178, 1, 21--36. Google ScholarDigital Library
- Liu, Q., Sung, A. H., Ribeiro, B., and Ferreira, R. 2008c. Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. In Proceedings of the 21st International Joint Conference on Neural Networks (IJCNN). 3351--3356.Google Scholar
- Liu, Q., Sung, A. H., and Qiao, M. 2008d. Detecting information-hiding in WAV audios. In Proceedings of the 19th International Conference on Pattern Recognition (ICPR). 1--4.Google Scholar
- Liu, Q., Sung, A. H., and Qiao, M. 2009a. Improved detection and evaluation for JPEG steganalysis. InProceedings of the 17th ACM International Conference on Multimedia (MM'09). ACM, New York, 873--876. Google ScholarDigital Library
- Liu, Q., Sung, A. H., and Qiao, M. 2009b. Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Security 4, 3, 359--368. Google ScholarDigital Library
- Liu, Q., Sung, A. H., Qiao, M., Chen, Z., and Ribeiro, B. 2010. An improved approach to steganalysis of JPEG images. Inf. Sci, 180, 9, 1643--1655. Google ScholarDigital Library
- Liu, Q., Sung, A. H., and Qiao, M. 2011. Neighboring joint density based JPEG steganalysis. ACM Trans. Intell. Syst. Technol. 2, 2, Article 16. Google ScholarDigital Library
- Liu, Y., Chiang, K., Corbett, C., Archibald, R., Mukh0erjee, B., and Ghosal, D. 2008. A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance. Lecture Notes in Computer Science, vol. 5222, Springer, Berlin, 487--501. Google ScholarDigital Library
- Lyu, S. and Farid, H. 2006. Steganalysis using higher-order image statistic, IEEE Trans. Inf. Forensics Security 1, 1, 111--119. Google ScholarDigital Library
- McEachern, R. 1994. Hearing it like it is: Audio signal processing the way the ear does it. DSP Applications.Google Scholar
- Ozer, H., Sankur, B., Memon, N., and Avcibas, I. 2006. Detection of audio covert channels using statistical footprints of hidden messages. Digital Signal Process.16, 4, 389--401.Google ScholarCross Ref
- Pevny, T. and Fridrich, J. 2007. Merging Markov and DCT features for multi-class JPEG steganalysis. In Proceedings of the SPIE Electronic Imag. vol. 6505.Google Scholar
- Qiao, M., Sung, A. H., and Liu, Q. 2009. Steganalysis of MP3stego. In Proceedings of the International Joint Conference on Neural Networks (IJCNN'09). 2566--2571. Google ScholarDigital Library
- Reynolds, D. 1992. A Gaussian mixture modeling approaching to text-independent speaker identification. Ph.D. dissertation, Department of Electrical Engineering, Georgia Institute of Technology.Google Scholar
- Sharp, T. 2001. An implementation of key-based digital signal steganography. In Proceedings of the 4th International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2137, Springer, Berlin,13--26. Google ScholarDigital Library
- Shi, Y., Chen, C., and Chen, W. 2007. A Markov process based approach to effective attacking JPEG Steganography. In Information Hiding, Lecture Notes in Computer Science, vol. 4437, Springer, Berlin, 249--264. Google ScholarDigital Library
- Vapnik, V. 1998. Statistical Learning Theory. Wiley, New York.Google Scholar
- Zeng, W., Ai, H., and Hu, R. 2007. A novel steganalysis algorithm of phase coding in audio signal. In Proceedings of the 6thInternational Conference on Advanced Language Processing and Web Information Technology. 261--264. Google ScholarDigital Library
- Zeng, W., Ai, H., and Hu, R. 2008. An algorithm of echo steganalysis based on power cepstrum and pattern classification. In Proceedings of the International Conference on Information and Automation. 1667--1670.Google Scholar
Index Terms
- Derivative-based audio steganalysis
Recommendations
Novel stream mining for audio steganalysis
MM '09: Proceedings of the 17th ACM international conference on MultimediaIn this paper, we present a novel stream data mining for audio steganalysis, based on second order derivative of audio streams. We extract Mel-cepstrum coefficients and Markov transition features on the second order derivative, a support vector machine ...
MP3 audio steganalysis
MP3, one of the most widely used digital audio formats, provides a high compression ratio with faithful quality. The widespread use enables MP3 audio files to become excellent covers to carry hidden information in audio steganography on the Internet. ...
Spectrum Steganalysis of WAV Audio Streams
MLDM '09: Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern RecognitionIn this paper, we propose an audio steganalysis method called reference based Fourier Spectrum Steganalysis. The mean values and the standard deviations of the high frequency spectrum of the second and high order derivatives are extracted from the ...
Comments