Skip to main content

2014 | OriginalPaper | Buchkapitel

Steganalysis of Compressed Speech Based on Markov and Entropy

verfasst von : Haibo Miao, Liusheng Huang, Yao Shen, Xiaorong Lu, Zhili Chen

Erschienen in: Digital-Forensics and Watermarking

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Compressed domain based steganography (CDBS) is a kind of relatively new and secure audio steganography. Up to date, there is little research on the steganalysis against this kind of audio steganography. In this paper, we introduce two methods to detect various CDBS on ACELP speech. One is the Markov method and the other is the entropy method. Both methods are based on the observation that the steganography behavior has certain effects on the relationship among the pulses in the same track. The Markov transition probabilities are utilized to evaluate the interrelationships between adjacent pulses and entropy is employed to measure the “disorder” of combined pulse distributions. First, Markov transition probabilities, joint entropy and conditional entropy features of the track pulses are extracted; a support vector machine (SVM) is then applied to the features for discovering the existence of hidden data in compressed speech signals, respectively. Some famous CDBS methods on ACELP encoded speech are considered. Experimental results have proven the effectiveness of the two methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding - a survey. Proc. IEEE Spec. Issue Prot. Multimed. Content 87(7), 1062–1078 (1999) Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding - a survey. Proc. IEEE Spec. Issue Prot. Multimed. Content 87(7), 1062–1078 (1999)
2.
Zurück zum Zitat Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)CrossRef Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)CrossRef
3.
Zurück zum Zitat Liu, Q., Sung, A.H., Qiao, M.: Derivative-based audio steganalysis. ACM Trans. Multimed. Comput. Commun. Appl. 7(3), 1–19 (2011)CrossRef Liu, Q., Sung, A.H., Qiao, M.: Derivative-based audio steganalysis. ACM Trans. Multimed. Comput. Commun. Appl. 7(3), 1–19 (2011)CrossRef
4.
Zurück zum Zitat Scott A. Moskowitz, Marc Cooperman.M.S.A., C. M.: Steganographic method and device. USA Patent (1997) Scott A. Moskowitz, Marc Cooperman.M.S.A., C. M.: Steganographic method and device. USA Patent (1997)
5.
Zurück zum Zitat Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996)CrossRef Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996)CrossRef
6.
Zurück zum Zitat Lee, C., Moallemi, K., Warren, R.: Method and apparatus for transporting auxiliary data in audio signals. USA Patent (1998) Lee, C., Moallemi, K., Warren, R.: Method and apparatus for transporting auxiliary data in audio signals. USA Patent (1998)
7.
Zurück zum Zitat Lee, S.-K., Ho, Y.-S.: Digital audio watermarking in the cepstrum domain. IEEE Trans. Consum. Electron. 46(3), 744–750 (2000)CrossRefMathSciNet Lee, S.-K., Ho, Y.-S.: Digital audio watermarking in the cepstrum domain. IEEE Trans. Consum. Electron. 46(3), 744–750 (2000)CrossRefMathSciNet
8.
Zurück zum Zitat Gruhl, D., Bender, W., Lu, A.: Echo hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 295–315. Springer, Heidelberg (1996)CrossRef Gruhl, D., Bender, W., Lu, A.: Echo hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 295–315. Springer, Heidelberg (1996)CrossRef
9.
Zurück zum Zitat Gopalan, K., Wenndt, S., Noga, A., Haddad, D., Adams, S.: Covert speech communication via cover speech by tone insertion. In: Proceedings of the 2003 IEEE Aerospace Conference, Big Sky, MT (2003) Gopalan, K., Wenndt, S., Noga, A., Haddad, D., Adams, S.: Covert speech communication via cover speech by tone insertion. In: Proceedings of the 2003 IEEE Aerospace Conference, Big Sky, MT (2003)
10.
Zurück zum Zitat Gopalan, K., Wenndt, S.: Audio Steganography for covert data transmission by imperceptible tone insertion. In: Proceedings of the IASTED International Conference on Communication Systems and Applications, Banff, Canada (2004) Gopalan, K., Wenndt, S.: Audio Steganography for covert data transmission by imperceptible tone insertion. In: Proceedings of the IASTED International Conference on Communication Systems and Applications, Banff, Canada (2004)
11.
Zurück zum Zitat Miao, H., Huang, L., Chen, Z., Yang, W., Al-hawbani, A.: A new scheme for covert communication via 3G encoded speech. Comput. Electr. Eng. 38(6), 1490–1501 (2012)CrossRef Miao, H., Huang, L., Chen, Z., Yang, W., Al-hawbani, A.: A new scheme for covert communication via 3G encoded speech. Comput. Electr. Eng. 38(6), 1490–1501 (2012)CrossRef
12.
Zurück zum Zitat Wu, Z., Yang, W.: Speech information hiding in G.729. Chin. J. Electron. 15(3), 545–549 (2006) Wu, Z., Yang, W.: Speech information hiding in G.729. Chin. J. Electron. 15(3), 545–549 (2006)
13.
Zurück zum Zitat Lu, Z.M., Yan, B.: Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst. E88-D(2), 330–334 (2005) Lu, Z.M., Yan, B.: Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst. E88-D(2), 330–334 (2005)
14.
Zurück zum Zitat Geiser, B., Vary, P.: Backwards compatible wideband telephony in mobile networks: CELP watermarking and bandwidth extension. In: Proceedings of ICASSP, Honolulu, Hawai’i, USA (2007) Geiser, B., Vary, P.: Backwards compatible wideband telephony in mobile networks: CELP watermarking and bandwidth extension. In: Proceedings of ICASSP, Honolulu, Hawai’i, USA (2007)
15.
Zurück zum Zitat Geiser, B., Vary, P.: High rate data hiding in ACELP speech codec. In: Proceedings of ICASSP, Caesars Palace, Las Vegas, Nevada, USA (2008) Geiser, B., Vary, P.: High rate data hiding in ACELP speech codec. In: Proceedings of ICASSP, Caesars Palace, Las Vegas, Nevada, USA (2008)
16.
Zurück zum Zitat Kraetzer, C., Dittmann, J.: Pros and cons of mel-cepstrum based audio steganalysis using SVM classification. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 359–377. Springer, Heidelberg (2008)CrossRef Kraetzer, C., Dittmann, J.: Pros and cons of mel-cepstrum based audio steganalysis using SVM classification. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 359–377. Springer, Heidelberg (2008)CrossRef
17.
Zurück zum Zitat Zeng, W., Ai, H., Hu, R.: A novel steganalysis algorithm of phase coding in audio signal. In: Proceedings of the International Conference on Advanced Language Processing and Web Information Technology, pp. 261–264 (2007) Zeng, W., Ai, H., Hu, R.: A novel steganalysis algorithm of phase coding in audio signal. In: Proceedings of the International Conference on Advanced Language Processing and Web Information Technology, pp. 261–264 (2007)
18.
Zurück zum Zitat Zeng, W., Ai, H., Hu, R.: An algorithm of echo steganalysis based on power cepstrum and pattern classification. In: Proceedings of the International Conference on Information and Automation, pp. 1667–1670 (2008) Zeng, W., Ai, H., Hu, R.: An algorithm of echo steganalysis based on power cepstrum and pattern classification. In: Proceedings of the International Conference on Information and Automation, pp. 1667–1670 (2008)
19.
Zurück zum Zitat Paraskevas, I., Chilton, E.: Combination of magnitude and phase statistical features for audio classification. Acoust. Res. Lett. Online Acoust. Soc. Am. 5(3), 111–117 (2004)CrossRef Paraskevas, I., Chilton, E.: Combination of magnitude and phase statistical features for audio classification. Acoust. Res. Lett. Online Acoust. Soc. Am. 5(3), 111–117 (2004)CrossRef
20.
Zurück zum Zitat Johnson, M.K., Lyu, S., Farid, H.: Steganalysis of recorded speech. In: Proceedings of Conference on Security, Steganography and Watermarking of Multimedia, Contents VII, pp. 664–672 (2005) Johnson, M.K., Lyu, S., Farid, H.: Steganalysis of recorded speech. In: Proceedings of Conference on Security, Steganography and Watermarking of Multimedia, Contents VII, pp. 664–672 (2005)
21.
Zurück zum Zitat Ozer, H., Avcibas, I., Sankur, B., Memon, N.D.: Steganalysis of audio based on audio quality metrics. In: Proceedings of the Conference on Security, Steganography and Watermarking of Multimedia, Contents V, vol. 5020, pp. 55–66 (2003) Ozer, H., Avcibas, I., Sankur, B., Memon, N.D.: Steganalysis of audio based on audio quality metrics. In: Proceedings of the Conference on Security, Steganography and Watermarking of Multimedia, Contents V, vol. 5020, pp. 55–66 (2003)
22.
Zurück zum Zitat Liu, Y., Chiang, K., Corbett, C., Archibald, R., Mukherjee, B., Ghosal, D.: A novel audio steganalysis based on high-order statistics of a distortion measure with hausdorff distance. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 487–501. Springer, Heidelberg (2008)CrossRef Liu, Y., Chiang, K., Corbett, C., Archibald, R., Mukherjee, B., Ghosal, D.: A novel audio steganalysis based on high-order statistics of a distortion measure with hausdorff distance. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 487–501. Springer, Heidelberg (2008)CrossRef
23.
Zurück zum Zitat Holotyak, T., Fridrich, J., Voloshynovskiy, S.: Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security (2005) Holotyak, T., Fridrich, J., Voloshynovskiy, S.: Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security (2005)
24.
Zurück zum Zitat Avcibas, I.: Audio steganalysis with content-independent distortion measures. IEEE Sig. Process. Lett. 13(2), 92–95 (2006)CrossRef Avcibas, I.: Audio steganalysis with content-independent distortion measures. IEEE Sig. Process. Lett. 13(2), 92–95 (2006)CrossRef
25.
Zurück zum Zitat Liu, Q., Sung, A.H., Qiao, M.: Novel stream mining for audio steganalysis. In: Proceedings of the 17th ACM international conference on multimedia, Beijing, pp. 95–104 (2009) Liu, Q., Sung, A.H., Qiao, M.: Novel stream mining for audio steganalysis. In: Proceedings of the 17th ACM international conference on multimedia, Beijing, pp. 95–104 (2009)
26.
Zurück zum Zitat Qi, D., Xijian, P.: Steganalysis of compressed speech based on histogram features. In: Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Chengdu, China (2010) Qi, D., Xijian, P.: Steganalysis of compressed speech based on histogram features. In: Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Chengdu, China (2010)
27.
Zurück zum Zitat Chen, Z., Huang, L., Meng, P., Yang, W., Miao, H.: Blind linguistic steganalysis against translation based steganography. In: Kim, H.-J., Shi, Y.Q., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 251–265. Springer, Heidelberg (2011)CrossRef Chen, Z., Huang, L., Meng, P., Yang, W., Miao, H.: Blind linguistic steganalysis against translation based steganography. In: Kim, H.-J., Shi, Y.Q., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 251–265. Springer, Heidelberg (2011)CrossRef
Metadaten
Titel
Steganalysis of Compressed Speech Based on Markov and Entropy
verfasst von
Haibo Miao
Liusheng Huang
Yao Shen
Xiaorong Lu
Zhili Chen
Copyright-Jahr
2014
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-43886-2_5

Premium Partner