Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Derivative-based audio steganalysis

Published: 02 September 2011 Publication History

Abstract

This article presents a second-order derivative-based audio steganalysis. First, Mel-cepstrum coefficients and Markov transition features from the second-order derivative of the audio signal are extracted; a support vector machine is then applied to the features for discovering the existence of hidden data in digital audio streams. Also, the relation between audio signal complexity and steganography detection accuracy, which is an issue relevant to audio steganalysis performance evaluation but so far has not been explored, is analyzed experimentally. Results demonstrate that, in comparison with a recently proposed signal stream-based Mel-cepstrum method, the second-order derivative-based audio steganalysis method gains a considerable advantage under all categories of signal complexity--especially for audio streams with high signal complexity, which are generally the most challenging for steganalysis-and thereby significantly improves the state of the art in audio steganalysis.

References

[1]
Avcibas, I. 2006. Audio steganalysis with content-independent distortion measures. IEEE Signal Process. Lett. 13, 2, 92--95.
[2]
Bogert, B., Healy, M., and Tukey, J. 1963. The frequency analysis of times series for echoes: cepstrum, pseudoautocovariance, cross-cepstrum, and saphe cracking. In Proceedings of the Symposium on Time Series Analysis.
[3]
Farid, H. 2002. Detecting hidden messages using higher-order statistical models. In Proceedings of the 2002 International Conference on Image Processing (ICIP'02). 905--908.
[4]
Fridrich, J. 2004. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Information Hiding, Lecture Notes in Computer Science, vol. 3200, Springer, Berlin, 67--81.
[5]
Gonzalez, R. and Woods, R. 2008. Digital Image Processing 3rd ed. Prentice Hall, Englewood Cliffs, NJ.
[6]
Harmsen, J. J. 2003. Steganalysis of additive noise modelable information hiding. Master's thesis, Rensselaer Polytechnic Institute, Troy, NY.
[7]
Harmsen, J. and Pearlman, W. 2003. Steganalysis of additive noise modelable information hiding. In Proceedings of the SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents. vol. 5020, 131--142.
[8]
Hetzl, S. and Mutzel, P. 2005. A graph-theoretic approach to steganography. In Communications and Multimedia Security, Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 119--128. The code is available at http://steghide.sourceforge.net/.
[9]
Hill, T. and Lewicki, P. 2005. Statistics: Methods and Applications. StatSoft, Inc.
[10]
Holotyak, T., Fridrich, J., and Voloshynovskiy, S. 2005. Blind statistical steganalysis of additive steganography using wavelet higher order statistics. Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 273--274.
[11]
Johnson, M., Lyu, S., and Farid, H. 2005. Steganalysis of recorded speech. In Proceedings of the SPIE. vol. 5681, 664--672.
[12]
Kirovski, D. and Malvar, H. S. 2003. Spread spectrum watermarking of audio signals. IEEE Trans. Signal Process. 51, 4, 1020--1033. The audio watermarking hiding tool is available at http://research.microsoft.com/en-us/downloads/885bb5c4-ae6d-418b-97f9-adc9da8d48bd/default.aspx.
[13]
Kraetzer, C. and Dittmann J. 2007. Mel-cepstrum based steganalysis for VOIP-steganography. In Proceedings of the SPIE. vol. 6505.
[14]
Liu, Q. and Sung, A. H. 2007. Feature mining and neuro-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In Proceedings of the 20th International Joint Conference in Artificial Intelligence (IJCAI). 2808--2813.
[15]
Liu, Q., Sung, A. H., Chen, Z., and Xu, J. 2008a. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Patt. Recogn. 41, 1, 56--66.
[16]
Liu, Q., Sung, A. H., Ribeiro, B., Wei, M., Chen, Z., and Xu, J. 2008b. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci.178, 1, 21--36.
[17]
Liu, Q., Sung, A. H., Ribeiro, B., and Ferreira, R. 2008c. Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. In Proceedings of the 21st International Joint Conference on Neural Networks (IJCNN). 3351--3356.
[18]
Liu, Q., Sung, A. H., and Qiao, M. 2008d. Detecting information-hiding in WAV audios. In Proceedings of the 19th International Conference on Pattern Recognition (ICPR). 1--4.
[19]
Liu, Q., Sung, A. H., and Qiao, M. 2009a. Improved detection and evaluation for JPEG steganalysis. InProceedings of the 17th ACM International Conference on Multimedia (MM'09). ACM, New York, 873--876.
[20]
Liu, Q., Sung, A. H., and Qiao, M. 2009b. Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Security 4, 3, 359--368.
[21]
Liu, Q., Sung, A. H., Qiao, M., Chen, Z., and Ribeiro, B. 2010. An improved approach to steganalysis of JPEG images. Inf. Sci, 180, 9, 1643--1655.
[22]
Liu, Q., Sung, A. H., and Qiao, M. 2011. Neighboring joint density based JPEG steganalysis. ACM Trans. Intell. Syst. Technol. 2, 2, Article 16.
[23]
Liu, Y., Chiang, K., Corbett, C., Archibald, R., Mukh0erjee, B., and Ghosal, D. 2008. A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance. Lecture Notes in Computer Science, vol. 5222, Springer, Berlin, 487--501.
[24]
Lyu, S. and Farid, H. 2006. Steganalysis using higher-order image statistic, IEEE Trans. Inf. Forensics Security 1, 1, 111--119.
[25]
McEachern, R. 1994. Hearing it like it is: Audio signal processing the way the ear does it. DSP Applications.
[26]
Ozer, H., Sankur, B., Memon, N., and Avcibas, I. 2006. Detection of audio covert channels using statistical footprints of hidden messages. Digital Signal Process.16, 4, 389--401.
[27]
Pevny, T. and Fridrich, J. 2007. Merging Markov and DCT features for multi-class JPEG steganalysis. In Proceedings of the SPIE Electronic Imag. vol. 6505.
[28]
Qiao, M., Sung, A. H., and Liu, Q. 2009. Steganalysis of MP3stego. In Proceedings of the International Joint Conference on Neural Networks (IJCNN'09). 2566--2571.
[29]
Reynolds, D. 1992. A Gaussian mixture modeling approaching to text-independent speaker identification. Ph.D. dissertation, Department of Electrical Engineering, Georgia Institute of Technology.
[30]
Sharp, T. 2001. An implementation of key-based digital signal steganography. In Proceedings of the 4th International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2137, Springer, Berlin,13--26.
[31]
Shi, Y., Chen, C., and Chen, W. 2007. A Markov process based approach to effective attacking JPEG Steganography. In Information Hiding, Lecture Notes in Computer Science, vol. 4437, Springer, Berlin, 249--264.
[32]
Vapnik, V. 1998. Statistical Learning Theory. Wiley, New York.
[33]
Zeng, W., Ai, H., and Hu, R. 2007. A novel steganalysis algorithm of phase coding in audio signal. In Proceedings of the 6thInternational Conference on Advanced Language Processing and Web Information Technology. 261--264.
[34]
Zeng, W., Ai, H., and Hu, R. 2008. An algorithm of echo steganalysis based on power cepstrum and pattern classification. In Proceedings of the International Conference on Information and Automation. 1667--1670.

Cited By

View all
  • (2024)Estimating the first and second derivatives of discrete audio dataEURASIP Journal on Audio, Speech, and Music Processing10.1186/s13636-024-00355-52024:1Online publication date: 18-Jun-2024
  • (2024)Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification SuppressionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341726819(6559-6572)Online publication date: 1-Jan-2024
  • (2024)Provably Secure Public-Key Steganography Based on Elliptic Curve CryptographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121919(3148-3163)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 7, Issue 3
August 2011
117 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/2000486
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 September 2011
Accepted: 01 May 2010
Revised: 01 April 2010
Received: 01 August 2008
Published in TOMM Volume 7, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Audio
  2. Markov
  3. Mel-cepstrum
  4. SVM
  5. derivative
  6. signal complexity
  7. steganalysis
  8. steganography

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Estimating the first and second derivatives of discrete audio dataEURASIP Journal on Audio, Speech, and Music Processing10.1186/s13636-024-00355-52024:1Online publication date: 18-Jun-2024
  • (2024)Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification SuppressionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341726819(6559-6572)Online publication date: 1-Jan-2024
  • (2024)Provably Secure Public-Key Steganography Based on Elliptic Curve CryptographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121919(3148-3163)Online publication date: 1-Jan-2024
  • (2024)Model Access Control Based on Hidden Adversarial Examples for Automatic Speech RecognitionIEEE Transactions on Artificial Intelligence10.1109/TAI.2023.32858585:3(1302-1315)Online publication date: Mar-2024
  • (2023)Cover Enhancement Method for Audio Steganography Based on Universal Adversarial Perturbations with Sample DiversificationComputers, Materials & Continua10.32604/cmc.2023.03681975:3(4893-4915)Online publication date: 2023
  • (2023)A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering GraphicsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/353966119:2(1-20)Online publication date: 6-Feb-2023
  • (2023)The Placebo Effect of Artificial Intelligence in Human–Computer InteractionACM Transactions on Computer-Human Interaction10.1145/352922529:6(1-32)Online publication date: 11-Jan-2023
  • (2022)Crafting Trajectories of Smart Phone Use at the OperaACM Transactions on Computer-Human Interaction10.1145/353100729:6(1-37)Online publication date: 16-Nov-2022
  • (2022)Real-time steganalysis for streaming media based on multi-channel convolutional sliding windowsKnowledge-Based Systems10.1016/j.knosys.2021.107561237:COnline publication date: 15-Feb-2022
  • (2021)Tackling the Cover Source Mismatch Problem in Audio Steganalysis With Unsupervised Domain AdaptationIEEE Signal Processing Letters10.1109/LSP.2020.302223728(1475-1479)Online publication date: 2021
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media