Feature Based Audio Steganalysis (FAS)

Taxonomy of audio signals containing secret information or not is a security issue addressed in the context of steganalysis. A cover audio object can be converted into a stego-audio object via different steganographic methods. In this work the authors present a statistical method based audio steganalysis technique to detect the presence of hidden messages in audio signals. The conceptual idea lies in the difference of the distribution of various statistical distance measures between the cover audio signals and their denoised versions i.e. stego-audio signals. The design of audio steganalyzer relies on the choice of these audio quality measures and the construction of two-class classifier based on KNN (k nearest neighbor), SVM (support vector machine) and two layer Back Propagation Feed Forward Neural Network (BPN). Experimental results show that the proposed technique can be used to detect the small presence of hidden messages in digital audio data. Experimental results demonstrate the effectiveness and accuracy of the proposed technique.

[1]  Bülent Sankur,et al.  Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.

[2]  Josef Kittler,et al.  Floating search methods in feature selection , 1994, Pattern Recognit. Lett..

[3]  Nasir D. Memon,et al.  Steganalysis of audio based on audio quality metrics , 2003, IS&T/SPIE Electronic Imaging.

[4]  Ismail Avcibas Audio steganalysis with content-independent distortion measures , 2006, IEEE Signal Processing Letters.

[5]  Ruimin Hu,et al.  An algorithm of echo steganalysis based on power cepstrum and pattern classification , 2008, 2008 International Conference on Audio, Language and Image Processing.

[6]  Jana Dittmann,et al.  Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification , 2007, Information Hiding.

[7]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[8]  Marc Rennhard,et al.  A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.

[9]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[10]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[11]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[12]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[13]  Ioannis Paraskevas,et al.  Combination of magnitude and phase statistical features for audio classification , 2004 .

[14]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[15]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[16]  Daniel P. Huttenlocher,et al.  Comparing Images Using the Hausdorff Distance , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[17]  Wei Zeng,et al.  A Novel Steganalysis Algorithm of Phase Coding in Audio Signal , 2007, Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007).

[18]  Biswanath Mukherjee,et al.  A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance , 2008, ISC.

[19]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[20]  Jean-Luc Dugelay,et al.  Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.

[21]  Tai-hoon Kim,et al.  A Multi Layer Security Model for Text Messages , 2009, 2009 IEEE International Advance Computing Conference.

[22]  Qingzhong Liu,et al.  Detecting information-hiding in WAV audios , 2008, 2008 19th International Conference on Pattern Recognition.

[23]  Qingzhong Liu,et al.  Novel stream mining for audio steganalysis , 2009, MM '09.

[24]  Vladimir Vapnik,et al.  The Nature of Statistical Learning , 1995 .

[25]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[26]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[27]  Gautam Sanyal,et al.  A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier , 2011 .

[28]  Siwei Lyu,et al.  Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.

[29]  Tapio Seppänen,et al.  Increasing the capacity of LSB-based audio steganography , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[30]  Ruimin Hu,et al.  An Algorithm of Echo Steganalysis based on , 2008 .

[31]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[32]  Kaliappan Gopalan Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[33]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[34]  Natarajan Meghanathan,et al.  STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE , AUDIO AND VIDEO COVER MEDIA , 2010 .