skip to main content
research-article

Derivative-based audio steganalysis

Published:02 September 2011Publication History
Skip Abstract Section

Abstract

This article presents a second-order derivative-based audio steganalysis. First, Mel-cepstrum coefficients and Markov transition features from the second-order derivative of the audio signal are extracted; a support vector machine is then applied to the features for discovering the existence of hidden data in digital audio streams. Also, the relation between audio signal complexity and steganography detection accuracy, which is an issue relevant to audio steganalysis performance evaluation but so far has not been explored, is analyzed experimentally. Results demonstrate that, in comparison with a recently proposed signal stream-based Mel-cepstrum method, the second-order derivative-based audio steganalysis method gains a considerable advantage under all categories of signal complexity--especially for audio streams with high signal complexity, which are generally the most challenging for steganalysis-and thereby significantly improves the state of the art in audio steganalysis.

References

  1. Avcibas, I. 2006. Audio steganalysis with content-independent distortion measures. IEEE Signal Process. Lett. 13, 2, 92--95.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bogert, B., Healy, M., and Tukey, J. 1963. The frequency analysis of times series for echoes: cepstrum, pseudoautocovariance, cross-cepstrum, and saphe cracking. In Proceedings of the Symposium on Time Series Analysis.Google ScholarGoogle Scholar
  3. Farid, H. 2002. Detecting hidden messages using higher-order statistical models. In Proceedings of the 2002 International Conference on Image Processing (ICIP'02). 905--908.Google ScholarGoogle Scholar
  4. Fridrich, J. 2004. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Information Hiding, Lecture Notes in Computer Science, vol. 3200, Springer, Berlin, 67--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Gonzalez, R. and Woods, R. 2008. Digital Image Processing 3rd ed. Prentice Hall, Englewood Cliffs, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Harmsen, J. J. 2003. Steganalysis of additive noise modelable information hiding. Master's thesis, Rensselaer Polytechnic Institute, Troy, NY.Google ScholarGoogle Scholar
  7. Harmsen, J. and Pearlman, W. 2003. Steganalysis of additive noise modelable information hiding. In Proceedings of the SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents. vol. 5020, 131--142.Google ScholarGoogle Scholar
  8. Hetzl, S. and Mutzel, P. 2005. A graph-theoretic approach to steganography. In Communications and Multimedia Security, Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 119--128. The code is available at http://steghide.sourceforge.net/. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hill, T. and Lewicki, P. 2005. Statistics: Methods and Applications. StatSoft, Inc.Google ScholarGoogle Scholar
  10. Holotyak, T., Fridrich, J., and Voloshynovskiy, S. 2005. Blind statistical steganalysis of additive steganography using wavelet higher order statistics. Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 273--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Johnson, M., Lyu, S., and Farid, H. 2005. Steganalysis of recorded speech. In Proceedings of the SPIE. vol. 5681, 664--672.Google ScholarGoogle Scholar
  12. Kirovski, D. and Malvar, H. S. 2003. Spread spectrum watermarking of audio signals. IEEE Trans. Signal Process. 51, 4, 1020--1033. The audio watermarking hiding tool is available at http://research.microsoft.com/en-us/downloads/885bb5c4-ae6d-418b-97f9-adc9da8d48bd/default.aspx. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kraetzer, C. and Dittmann J. 2007. Mel-cepstrum based steganalysis for VOIP-steganography. In Proceedings of the SPIE. vol. 6505.Google ScholarGoogle Scholar
  14. Liu, Q. and Sung, A. H. 2007. Feature mining and neuro-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In Proceedings of the 20th International Joint Conference in Artificial Intelligence (IJCAI). 2808--2813. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Liu, Q., Sung, A. H., Chen, Z., and Xu, J. 2008a. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Patt. Recogn. 41, 1, 56--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Liu, Q., Sung, A. H., Ribeiro, B., Wei, M., Chen, Z., and Xu, J. 2008b. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci.178, 1, 21--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Liu, Q., Sung, A. H., Ribeiro, B., and Ferreira, R. 2008c. Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. In Proceedings of the 21st International Joint Conference on Neural Networks (IJCNN). 3351--3356.Google ScholarGoogle Scholar
  18. Liu, Q., Sung, A. H., and Qiao, M. 2008d. Detecting information-hiding in WAV audios. In Proceedings of the 19th International Conference on Pattern Recognition (ICPR). 1--4.Google ScholarGoogle Scholar
  19. Liu, Q., Sung, A. H., and Qiao, M. 2009a. Improved detection and evaluation for JPEG steganalysis. InProceedings of the 17th ACM International Conference on Multimedia (MM'09). ACM, New York, 873--876. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Liu, Q., Sung, A. H., and Qiao, M. 2009b. Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Security 4, 3, 359--368. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Liu, Q., Sung, A. H., Qiao, M., Chen, Z., and Ribeiro, B. 2010. An improved approach to steganalysis of JPEG images. Inf. Sci, 180, 9, 1643--1655. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Liu, Q., Sung, A. H., and Qiao, M. 2011. Neighboring joint density based JPEG steganalysis. ACM Trans. Intell. Syst. Technol. 2, 2, Article 16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Liu, Y., Chiang, K., Corbett, C., Archibald, R., Mukh0erjee, B., and Ghosal, D. 2008. A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance. Lecture Notes in Computer Science, vol. 5222, Springer, Berlin, 487--501. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Lyu, S. and Farid, H. 2006. Steganalysis using higher-order image statistic, IEEE Trans. Inf. Forensics Security 1, 1, 111--119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. McEachern, R. 1994. Hearing it like it is: Audio signal processing the way the ear does it. DSP Applications.Google ScholarGoogle Scholar
  26. Ozer, H., Sankur, B., Memon, N., and Avcibas, I. 2006. Detection of audio covert channels using statistical footprints of hidden messages. Digital Signal Process.16, 4, 389--401.Google ScholarGoogle ScholarCross RefCross Ref
  27. Pevny, T. and Fridrich, J. 2007. Merging Markov and DCT features for multi-class JPEG steganalysis. In Proceedings of the SPIE Electronic Imag. vol. 6505.Google ScholarGoogle Scholar
  28. Qiao, M., Sung, A. H., and Liu, Q. 2009. Steganalysis of MP3stego. In Proceedings of the International Joint Conference on Neural Networks (IJCNN'09). 2566--2571. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Reynolds, D. 1992. A Gaussian mixture modeling approaching to text-independent speaker identification. Ph.D. dissertation, Department of Electrical Engineering, Georgia Institute of Technology.Google ScholarGoogle Scholar
  30. Sharp, T. 2001. An implementation of key-based digital signal steganography. In Proceedings of the 4th International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2137, Springer, Berlin,13--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Shi, Y., Chen, C., and Chen, W. 2007. A Markov process based approach to effective attacking JPEG Steganography. In Information Hiding, Lecture Notes in Computer Science, vol. 4437, Springer, Berlin, 249--264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Vapnik, V. 1998. Statistical Learning Theory. Wiley, New York.Google ScholarGoogle Scholar
  33. Zeng, W., Ai, H., and Hu, R. 2007. A novel steganalysis algorithm of phase coding in audio signal. In Proceedings of the 6thInternational Conference on Advanced Language Processing and Web Information Technology. 261--264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Zeng, W., Ai, H., and Hu, R. 2008. An algorithm of echo steganalysis based on power cepstrum and pattern classification. In Proceedings of the International Conference on Information and Automation. 1667--1670.Google ScholarGoogle Scholar

Index Terms

  1. Derivative-based audio steganalysis

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Multimedia Computing, Communications, and Applications
          ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 7, Issue 3
          August 2011
          117 pages
          ISSN:1551-6857
          EISSN:1551-6865
          DOI:10.1145/2000486
          Issue’s Table of Contents

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 September 2011
          • Accepted: 1 May 2010
          • Revised: 1 April 2010
          • Received: 1 August 2008
          Published in tomm Volume 7, Issue 3

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader