MP3 steganalysis based on joint point-wise and block-wise correlations

Abstract With the growing attention on multimedia security, various MP3 steganographic and steganalytic algorithms have been proposed increasingly. However, the existing MP3 steganalysis is lack of good universality and detection performance. To address this problem, we devise an effective MP3 steganalytic algorithm based on joint point-wise and block-wise correlations of quantified modified discrete cosine transfer coefficients matrix. On the one hand, a universal rich high pass filtering module for MP3 steganalysis is deployed to boost the sensitiveness of the algorithm to the subtle signal brought by the data hiding. On the other hand, based on the principle of MP3 encoding and the characteristics of MP3 steganography, multi-scale correlations measure module is introduced, which is used to measure the changes of point-wise, 2 × 2 block-wise, and 4 × 4 block-wise correlations due to steganography separately. Additionally, customized feature optimization, including truncated threshold selection and high pass filters measure, is performed based on the properties of MP3 steganography. Experimental results illustrate that our proposed algorithm can be applied to various MP3 steganographic algorithms, bitrates, duration, and relative payloads. Detection accuracies are promoted by more than 20% averagely compared with state-of-the-art methods.

[1]  Kun Yang,et al.  CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain , 2018, IH&MMSec.

[2]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[3]  Saudi Arabia,et al.  Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority , 2014 .

[4]  Lina Wang,et al.  Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors , 2019, 2019 IEEE International Conference on Multimedia and Expo (ICME).

[5]  Hong Zhao,et al.  Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value , 2014, IEEE Transactions on Information Forensics and Security.

[6]  Adnan Abdul-Aziz Gutub,et al.  Triple-A: Secure RGB image steganography based on randomization , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[7]  Bolin Chen,et al.  Audio Steganalysis with Convolutional Neural Network , 2017, IH&MMSec.

[8]  Adnan Abdul-Aziz Gutub,et al.  RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[9]  Jessica J. Fridrich,et al.  Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.

[10]  N. Kamaraj,et al.  Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics , 2010, Inf. Sci..

[11]  Rangding Wang,et al.  Detection of MP3Stego exploiting recompression calibration-based feature , 2013, Multimedia Tools and Applications.

[12]  Farhan Khan,et al.  Message Concealment Techniques using Image based Steganography , 2007 .

[13]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .

[14]  Xuelong Li,et al.  Robust Reversible Watermarking via Clustering and Enhanced Pixel-Wise Masking , 2012, IEEE Transactions on Image Processing.

[15]  Xinbo Gao,et al.  Robust lossless data hiding using clustering and statistical quantity histogram , 2012, Neurocomputing.

[16]  Xiaofeng Song,et al.  Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank , 2017, J. Electronic Imaging.

[17]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[18]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[19]  Chao Jin,et al.  Steganalysis of MP3Stego with low embedding-rate using Markov feature , 2017, Multimedia Tools and Applications.

[20]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[21]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[22]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Xianfeng Zhao,et al.  Segmentation Based Video Steganalysis to Detect Motion Vector Modification , 2017, Secur. Commun. Networks.

[24]  Meisam Khalil Arjmandi,et al.  Audio steganalysis based on reversed psychoacoustic model of human hearing , 2016, Digit. Signal Process..

[25]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[26]  Sid-Ahmed Selouani,et al.  Audio steganalysis using deep belief networks , 2016, Int. J. Speech Technol..

[27]  Sakir Sezer,et al.  Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes , 2016, IEEE Transactions on Image Processing.

[28]  Adnan Abdul-Aziz Gutub,et al.  Multi-Bits Stego-System For Hiding Text in Multimedia Images Based on User Security Priority , 2018 .

[29]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[30]  Kun Yang,et al.  Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution , 2017, International Workshop on Digital Watermarking.

[31]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[32]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[33]  Hong Zhang,et al.  A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality , 2017, IEEE Transactions on Information Forensics and Security.

[34]  Xianfeng Zhao,et al.  RHFCN:: Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[35]  Lina Wang,et al.  A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame , 2017, IWDW.