Audio steganalysis based on reversed psychoacoustic model of human hearing

During the last decade, audio information hiding has attracted lots of attention due to its ability to provide a covert communication channel. On the other hand, various audio steganalysis schemes have been developed to detect the presence of any secret messages. Basically, audio steganography methods attempt to hide their messages in areas of time or frequency domains where human auditory system (HAS) does not perceive. Considering this fact, we propose a reliable audio steganalysis system based on the reversed Mel-frequency cepstral coefficients (R-MFCC) which aims to provide a model with maximum deviation from HAS model. Genetic algorithm is deployed to optimize dimension of the R-MFCC-based features. This will both speed up feature extraction and reduce the complexity of classification. The final decision is made by a trained support vector machine (SVM) to detect suspicious audio files. The proposed method achieves detection rates of 97.8% and 94.4% in the targeted (Steghide@1.563%) and universal scenarios. These results are respectively 17.3% and 20.8% higher than previous D2-MFCC based method. Based on a model with maximum deviation from human auditory system, a new steganalysis method is proposed.The method is tested on wide range of data hiding algorithms and in both targeted and universal scenarios.The proposed method improves detection rate of targeted and universal scenarios by 17.3% and 20.8%.

[1]  David G. Stork,et al.  Pattern Classification , 1973 .

[2]  Adam M. Croom Auditory Neuroscience: Making Sense of Sound , 2014 .

[3]  J. C. Tressler,et al.  Fourth Edition , 2006 .

[4]  Douglas A. Reynolds,et al.  Robust text-independent speaker identification using Gaussian mixture speaker models , 1995, IEEE Trans. Speech Audio Process..

[5]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[6]  Kenneth Alan De Jong,et al.  An analysis of the behavior of a class of genetic adaptive systems. , 1975 .

[7]  Sajad Shirali-Shahreza,et al.  High capacity error free wavelet Domain Speech Steganography , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[8]  Biing-Hwang Juang,et al.  Fundamentals of speech recognition , 1993, Prentice Hall signal processing series.

[9]  Mazdak Zamani,et al.  Correlation between PSNR and bit per sample rate in audio steganography , 2012 .

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Emrah Yürüklü,et al.  Chaotic-Type Features for Speech Steganalysis , 2008, IEEE Transactions on Information Forensics and Security.

[12]  Lothar Thiele,et al.  A Comparison of Selection Schemes used in Genetic Algorithms , 1995 .

[13]  Ismail Avcibas Audio steganalysis with content-independent distortion measures , 2006, IEEE Signal Processing Letters.

[14]  Robert P. W. Duin,et al.  A Matlab Toolbox for Pattern Recognition , 2004 .

[15]  K. Dejong,et al.  An analysis of the behavior of a class of genetic adaptive systems , 1975 .

[16]  Rizky M. Nugraha Implementation of Direct Sequence Spread Spectrum steganography on audio data , 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics.

[17]  Rainer Bhme Advanced Statistical Steganalysis , 2010 .

[18]  Sid-Ahmed Selouani,et al.  An Autoregressive Time Delay Neural Network for speech steganalysis , 2012, 2012 11th International Conference on Information Science, Signal Processing and their Applications (ISSPA).

[19]  Mohammad Pooyan,et al.  Detection of vocal disorders based on phase space parameters and Lyapunov spectrum , 2015, Biomed. Signal Process. Control..

[20]  Petra Mutzel,et al.  A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.

[21]  Jana Dittmann,et al.  Mel-cepstrum-based steganalysis for VoIP steganography , 2007, Electronic Imaging.

[22]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[23]  Nasir D. Memon,et al.  Steganalysis of audio based on audio quality metrics , 2003, IS&T/SPIE Electronic Imaging.

[24]  Tony R. Martinez,et al.  Improving classification accuracy by identifying and removing instances that should be misclassified , 2011, The 2011 International Joint Conference on Neural Networks.

[25]  Nasir D. Memon,et al.  Detection of audio covert channels using statistical footprints of hidden messages , 2006, Digit. Signal Process..

[26]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[27]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[28]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[29]  Qingzhong Liu,et al.  Novel stream mining for audio steganalysis , 2009, MM '09.

[30]  Hugo Fastl,et al.  Psychoacoustics: Facts and Models , 1990 .

[31]  Qingzhong Liu,et al.  Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[32]  Siwei Lyu,et al.  Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.

[33]  Sergios Theodoridis,et al.  Introduction to Pattern Recognition: A Matlab Approach , 2010 .

[34]  Hamzeh Ghasemzadeh A metaheuristic approach for solving jigsaw puzzles , 2014, 2014 Iranian Conference on Intelligent Systems (ICIS).

[35]  Gautam Sanyal,et al.  Feature Based Audio Steganalysis (FAS) , 2012 .

[36]  Meisam Khalil Arjmandi,et al.  Reversed-Mel cepstrum based audio steganalysis , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).

[37]  Hamzeh Ghasemzadeh,et al.  Cipher-text only attack on hopping window time domain scramblers , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).

[38]  Joseph Lehmann Jan Schnupp, Israel Nelken, and Andrew King, Auditory Neuroscience: Making Sense of Sound. , 2011 .

[39]  Rainer Böhme,et al.  Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.

[40]  Hong-Juan Zhang,et al.  Steganalysis of audio: attacking the Steghide , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[41]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[42]  Yin-Cheng Qi,et al.  Wavelet domain audio steganalysis based on statistical moments and PCA , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.

[43]  N. Kamaraj,et al.  Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm , 2010, Expert Syst. Appl..

[44]  J. Dittmann,et al.  Network based intrusion detection to detect steganographic communication channels: on the example of audio data , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..