Improved Audio Steganalytic Feature and Its Applications in Audio Forensics

Digital multimedia steganalysis has attracted wide attention over the past decade. Currently, there are many algorithms for detecting image steganography. However, little research has been devoted to audio steganalysis. Since the statistical properties of image and audio files are quite different, features that are effective in image steganalysis may not be effective for audio. In this article, we design an improved audio steganalytic feature set derived from both the time and Mel-frequency domains for detecting some typical steganography in the time domain, including LSB matching, Hide4PGP, and Steghide. The experiment results, evaluated on different audio sources, including various music and speech clips of different complexity, have shown that the proposed features significantly outperform the existing ones. Moreover, we use the proposed features to detect and further identify some typical audio operations that would probably be used in audio tampering. The extensive experiment results have shown that the proposed features also outperform the related forensic methods, especially when the length of the audio clip is small, such as audio clips with 800 samples. This is very important in real forensic situations.

[1]  Ming Tang,et al.  AMR Steganalysis Based on the Probability of Same Pulse Position , 2015, IEEE Transactions on Information Forensics and Security.

[2]  Siwei Lyu,et al.  Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.

[3]  Gérard Dreyfus,et al.  Single-layer learning revisited: a stepwise procedure for building and training a neural network , 1989, NATO Neurocomputing.

[4]  Jiwu Huang,et al.  Audio Postprocessing Detection Based on Amplitude Cooccurrence Vector Feature , 2016, IEEE Signal Processing Letters.

[5]  Qingzhong Liu,et al.  MP3 audio steganalysis , 2013, Inf. Sci..

[6]  Wei Su,et al.  Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[7]  K. J. Ray Liu,et al.  Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[9]  Qingzhong Liu,et al.  Derivative-based audio steganalysis , 2011, TOMCCAP.

[10]  Qingzhong Liu,et al.  Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[11]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Jiwu Huang,et al.  Adaptive steganalysis against WOW embedding algorithm , 2014, IH&MMSec '14.

[14]  Jana Dittmann,et al.  Mel-cepstrum-based steganalysis for VoIP steganography , 2007, Electronic Imaging.

[15]  Hany Farid,et al.  Detecting Steganographic Messages in Digital Images , 2001 .

[16]  Rui Yang,et al.  Identifying Compression History of Wave Audio and Its Applications , 2014, TOMCCAP.

[17]  Yong Wang,et al.  Identification of Electronic Disguised Voices , 2014, IEEE Transactions on Information Forensics and Security.

[18]  Jiwu Huang,et al.  A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.