Derivative-based audio steganalysis

This article presents a second-order derivative-based audio steganalysis. First, Mel-cepstrum coefficients and Markov transition features from the second-order derivative of the audio signal are extracted; a support vector machine is then applied to the features for discovering the existence of hidden data in digital audio streams. Also, the relation between audio signal complexity and steganography detection accuracy, which is an issue relevant to audio steganalysis performance evaluation but so far has not been explored, is analyzed experimentally. Results demonstrate that, in comparison with a recently proposed signal stream-based Mel-cepstrum method, the second-order derivative-based audio steganalysis method gains a considerable advantage under all categories of signal complexity--especially for audio streams with high signal complexity, which are generally the most challenging for steganalysis-and thereby significantly improves the state of the art in audio steganalysis.

[1]  Newton Lee,et al.  ACM Transactions on Multimedia Computing, Communications and Applications (ACM TOMCCAP) , 2007, CIE.

[2]  Qingzhong Liu,et al.  Detecting information-hiding in WAV audios , 2008, 2008 19th International Conference on Pattern Recognition.

[3]  Jana Dittmann,et al.  Mel-cepstrum-based steganalysis for VoIP steganography , 2007, Electronic Imaging.

[4]  Qingzhong Liu,et al.  Steganalysis of MP3Stego , 2009, 2009 International Joint Conference on Neural Networks.

[5]  Thomas Hill Statistics: Methods and Applications , 2005 .

[6]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[7]  Nasir D. Memon,et al.  Detection of audio covert channels using statistical footprints of hidden messages , 2006, Digit. Signal Process..

[8]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[9]  Ruimin Hu,et al.  An algorithm of echo steganalysis based on power cepstrum and pattern classification , 2008, 2008 International Conference on Audio, Language and Image Processing.

[10]  Petra Mutzel,et al.  A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.

[11]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[12]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[13]  Wei Zeng,et al.  A Novel Steganalysis Algorithm of Phase Coding in Audio Signal , 2007, Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007).

[14]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[15]  Qingzhong Liu,et al.  Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images , 2007, IJCAI.

[16]  Siwei Lyu,et al.  Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.

[17]  Douglas A. Reynolds,et al.  A Gaussian mixture modeling approach to text-independent speaker identification , 1992 .

[18]  Qingzhong Liu,et al.  An improved approach to steganalysis of JPEG images , 2010, Inf. Sci..

[19]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[20]  Biswanath Mukherjee,et al.  A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance , 2008, ISC.

[21]  B. P. Bogert,et al.  The quefrency analysis of time series for echoes : cepstrum, pseudo-autocovariance, cross-cepstrum and saphe cracking , 1963 .

[22]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[23]  Rafael C. González,et al.  Digital image processing, 3rd Edition , 2008 .

[24]  Ismail Avcibas Audio steganalysis with content-independent distortion measures , 2006, IEEE Signal Processing Letters.

[25]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[26]  Qingzhong Liu,et al.  Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[27]  Qingzhong Liu,et al.  Neighboring joint density-based JPEG steganalysis , 2011, TIST.

[28]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[29]  Qingzhong Liu,et al.  Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..

[30]  Qingzhong Liu,et al.  Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[31]  Qingzhong Liu,et al.  Improved detection and evaluation for JPEG steganalysis , 2009, ACM Multimedia.

[32]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[33]  Qingzhong Liu,et al.  Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..