Detection of MP3Stego exploiting recompression calibration-based feature
详细信息    查看全文
  • 作者:Diqun Yan (1)
    Rangding Wang (1)
  • 关键词:Steganalysis ; MP3 ; Calibration ; Sensitivity
  • 刊名:Multimedia Tools and Applications
  • 出版年:2014
  • 出版时间:September 2014
  • 年:2014
  • 卷:72
  • 期:1
  • 页码:865-878
  • 全文大小:778 KB
  • 参考文献:1. Achmad Z (2002) Stego-Lame, http://sourceforge.net/projects/mp3stegz
    2. Avcibas I (2006) Audio steganalysis with content-independent distortion measures. IEEE Signal Process Lett 13(2):92-5 CrossRef
    3. Bohme R, Westfeld A (2004) Statistical characterisation of MP3 encoders for steganalysis. Proceedings of ACM Workshop on Multimedia and Security, ACM, New York, USA, p 25-4
    4. Cha SH (2007) Comprehensive survey on distance/similarity measures between probability density functions. Int J Math Models Methods Appl Sci 1(4):300-07
    5. Chang CC, Lin CJ (2001) LIBSVM: A library for support vector machines. http://www.csie.ntu.edu.tw/~cjlin/libsvm
    6. Dittmann J, Hesse D (2004) Network based intrusion detection to detect steganographic communication channels: on the example of audio data. Proceedings of IEEE International Workshop on Multimedia Signal Processing, IEEE, Siena, Italy, p 343-46
    7. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995-007 CrossRef
    8. Fridrich J (2004) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proceedings of International Conference on Information Hiding, Vol. 3200, Springer, Berlin, LNCS, p 67-1
    9. ISO/IEC 11172- (1993) Information technology—coding of moving pictures and associated audio for digital storage media at up to about 1.5?M bit/s—part3: audio
    10. Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441-44 CrossRef
    11. Ker AD, Bohme R (2008) Revisiting weighted stego-image steganalysis. Proceedings of SPIE on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, SPIE, Vol. 6819, p 5-7
    12. Kraetzer C, Dittman J (2007) Pros and cons of mel-cepstrum based audio steganalysis using SVM classification. Proceedings of International Conference on Information Hiding, Vol. 4567, Springer, LNCS, p 359-77
    13. Malik H (2008) Steganalysis of qim steganography using irregularity measure. Proceedings of ACM Workshop on Multimedia and Security, ACM, New York, USA, p 149-58
    14. Ozer H, Sankur B, Memon N, Avcibas I (2006) Detection of audio covert channels using statistical footprints of hidden messages. Digit Signal Process 16(4):389-01 CrossRef
    15. Petitcolas FAP (2002) MP3Stego. http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego
    16. Platt C (2004) UnderMP3Cover. http://sourceforge.net/projects/ump3c
    17. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32-4 CrossRef
    18. Qiao M, Sung A, Liu Q (2009) Steganalysis of MP3Stego. Proceedings of International Joint Conference on Neural Networks, IEEE, New Jersey, USA, p 2566-571
    19. Qiao M, Sung A, Liu Q (2009) Feature mining and intelligent computing for MP3 steganalysis. Proceedings of International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing, IEEE, Washington, DC, USA, p 627-30
    20. Westfeld A (2003) Detecting low embedding rates. Proceedings of International Conference on Information Hiding, Vol. 2578, Springer, LNCS, p 324-39
    21. Yan D, Wang R (2011) Huffman table swapping-based steganography for MP3 audio. Multimedia Tools Appl 52(2-):291-05 CrossRef
    22. Yan D, Wang R, Zhang L (2009) Quantization step parity-based steganography for MP3 audio. Fundam Inform 97(1-):1-4
  • 作者单位:Diqun Yan (1)
    Rangding Wang (1)

    1. College of Information Science and Engineering, Ningbo University, 315211, Zhejiang, China
  • ISSN:1573-7721
文摘
MP3Stego is a typical steganographic tool for MP3 audio. Once the cover audio is unavailable, it is hard to distinguish between background noise and steganographic distortion. In this work, the MP3Stego algorithm has been analyzed from a warden’s perspective. It is observed that the number of bits in the bit reservoir will be disturbed when the secret message is embedded. In addition, a reliable estimation of cover audio is obtained by the proposed recompression calibration. The calibrated features are classified with support vector machine technique. Experimental results show that the proposed scheme is effective and gets good performance, especially when the embedding rate is not less than 0.01?%. The results also shows that the proposed scheme can achieve lower false positive rate comparing to the existing algorithms.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700