A fast and secure MP3 steganographic scheme with multi-domain

Abstract The problem of single domain embedding and encoder dependence exists in almost all adaptive MP3 steganographic schemes, leading to relatively concentrated modification, limited embedding capacity, long execution time, and re-compression. Therefore, a fast and secure MP3 steganographic scheme with multi-domain is proposed in this paper. First, to enlarge the embedding capacity and spread the modifications, we extract the linbits and sign bits of quantized modified discrete cosine transform (QMDCT) coefficients to combine multi-domain. Second, a distortion function is designed based on the statistical properties of the inter and intra frames for better security. The message is embedded into the multi-domains by incorporating the syndrome trellis coding (STC) with the distortion function. Finally, the embedding method is able to get rid of the MP3 encoder and further avoid the problems of re-compression. Experiments illustrate that our scheme achieves a significant improvement in imperceptibility and statistical undetectability. In addition, the execution time is decreased by 63.6% ∼ 76.7%, and the embedding capacity is increased by at least 47.4%.

[1]  Kun Yang,et al.  Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution , 2017, International Workshop on Digital Watermarking.

[2]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[3]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Thomas Sporer,et al.  PEAQ - The ITU Standard for Objective Measurement of Perceived Audio Quality , 2000 .

[5]  Rangding Wang,et al.  Detection of MP3Stego exploiting recompression calibration-based feature , 2013, Multimedia Tools and Applications.

[6]  Qingzhong Liu,et al.  Improved detection of MP3 double compression using content-independent features , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).

[7]  Rangding Wang,et al.  Huffman table swapping-based steganograpy for MP3 audio , 2009, Multimedia Tools and Applications.

[8]  Jie Zhu,et al.  Steganography for MP3 audio by exploiting the rule of window switching , 2012, Comput. Secur..

[9]  Jing Yang,et al.  Detection of double MP3 compression Based on Difference of Calibration Histogram , 2015, Multimedia Tools and Applications.

[10]  Xianfeng Zhao,et al.  Defining Joint Embedding Distortion for Adaptive MP3 Steganography , 2019, IH&MMSec.

[11]  Gao Hai-ying,et al.  The MP3 Steganography Algorithm Based on Huffman Coding , 2007 .

[12]  Zhong Wei-Dong,et al.  A novel steganography algorithm based on motion vector and matrix encoding , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[13]  Kun Yang,et al.  CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain , 2018, IH&MMSec.

[14]  Yan Diqun,et al.  Quantization Step Parity-based Steganography for MP3 Audio , 2009 .

[15]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[16]  Xianfeng Zhao,et al.  An Adaptive Double-Layered Embedding Scheme for MP3 Steganography , 2020, IEEE Signal Processing Letters.

[17]  Xianfeng Zhao,et al.  A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel , 2020, IH&MMSec.

[18]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Xianfeng Zhao,et al.  RHFCN:: Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[21]  Xianfeng Zhao,et al.  MP3 steganalysis based on joint point-wise and block-wise correlations , 2020, Inf. Sci..

[22]  Chao Jin,et al.  Steganalysis of MP3Stego with low embedding-rate using Markov feature , 2017, Multimedia Tools and Applications.

[23]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[24]  Lina Wang,et al.  A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame , 2017, IWDW.

[25]  Zhao Xian,et al.  Steganalysis of MP3Stego based on Huffman table distribution and recoding , 2012 .

[26]  Diqun Yan,et al.  Anti-Forensics of Double Compressed MP3 Audio , 2020, Int. J. Digit. Crime Forensics.

[27]  Gou Li High Capacity Audio Steganography in MP3 Bitstreams , 2007 .

[28]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[29]  Xianfeng Zhao,et al.  AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model , 2019, IEEE Transactions on Information Forensics and Security.

[30]  Diqun Yan,et al.  Quantization Step Parity-based Steganography for MP3 Audio , 2009, Fundam. Informaticae.

[31]  Lina Wang,et al.  Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors , 2019, 2019 IEEE International Conference on Multimedia and Expo (ICME).

[32]  Weiming Zhang,et al.  Defining embedding distortion for motion vector-based video steganography , 2014, Multimedia Tools and Applications.

[33]  Hong Zhao,et al.  Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value , 2014, IEEE Transactions on Information Forensics and Security.

[34]  Jessica J. Fridrich,et al.  Minimizing additive distortion functions with non-binary embedding operation in steganography , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[35]  Qingzhong Liu,et al.  MP3 audio steganalysis , 2013, Inf. Sci..

[36]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.