Multimedia Tools and Applications

, Volume 76, Issue 5, pp 6143–6158 | Cite as

Steganalysis of MP3Stego with low embedding-rate using Markov feature

Article

Abstract

MP3Stego is a typical steganographic tool for MP3 audios, whose embedding behavior disturbs the intrinsic correlation of the quantized MDCT coefficients (refer to as QMDCTs). In this paper, the Markov feature captured this correlation were designed based on the QMDCTs. The feature is sensitive to the subtle alteration caused by MP3stego embedding even at a low embedding-rate. In addition, some work on QMDCT pre-processing, threshold selection and feature optimization were applied to feature construction, which contribute to improving the detection accuracy and reducing the computational complexity of the proposed scheme. Experimental results show that our approach can effectively detect MP3Stego of low embedding-rate and outperforms the prior arts.

Keywords

MP3Stego Steganography Steganalysis Low embedding-rate One-step transition probability Feature selection 

References

  1. 1.
    Achmad Z (2008) MP3Stegz. http://sourceforge.net/projects/mp3stegz. Accessed 25 June 2015
  2. 2.
    Chang C-C, Lin C-J (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol 2:27:1–27:27, Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm CrossRefGoogle Scholar
  3. 3.
    Chen CC, Shi YQ (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceedings of the IEEE International Symposium on Circuits and Systems. Seattle, WA, 18–21 May, pp 3029–3032Google Scholar
  4. 4.
    ISO/IEC 11172–3:1993 Information technology -- Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s -- Part 3: AudioGoogle Scholar
  5. 5.
    Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: Proceedings of the 5th Annual Information Security South Africa Conference on New Knowledge Today. Sandton, South Africa, 29 June–1 JulyGoogle Scholar
  6. 6.
    Nissar A, Mir AH (2010) Classification of steganalysis techniques: a study. Digit Signal Process 20:1758–1770CrossRefGoogle Scholar
  7. 7.
    Petitcolas FAP (2002) MP3Stego. http://www.petitcolas.net/steganography/mp3stego. Accessed 25 June 2015
  8. 8.
    Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. Proc IEEE 87(7):1062–1078CrossRefGoogle Scholar
  9. 9.
    Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224CrossRefGoogle Scholar
  10. 10.
    Pevny T, Fridrich J (2007) Merging markov and DCT features for multi-class JPEG steganalysis In: Proceedings of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX. San Jose, CA, USA, 28 January. doi:10.1117/12.696774
  11. 11.
    Platt C (2004) UnderMP3Cover. http://sourceforge.net/projects/ump3c. Accessed 25 June 2015
  12. 12.
    Qiao MY, Sung AH, Liu QZ (2009) Steganalysis of MP3Stego. In: Proceedings of the International Joint Conference on Neural Networks. Atlanta, Georgia, USA, 14–19 June, pp 2566–2571Google Scholar
  13. 13.
    Qiao MY, Sung AH, Liu QZ (2013) MP3 audio steganalysis. Inf Sci 231:123–134CrossRefGoogle Scholar
  14. 14.
    Shi YQ, Chen CC, Chen W (2006) A markov process based approach to effective attacking JPEG Steganography. In: Proceedings of the 8th International Workshop on Information Hiding. Alexandria, VA, USA, 10–12 July, 4437:249–264Google Scholar
  15. 15.
    Sullivan K, Madhow U, Chandrasekaran S, Manjunath BS (2006) Steganalysis for Markov cover data with applications to images. IEEE Trans Inf Forensics Secur 1(2):275–287CrossRefGoogle Scholar
  16. 16.
    Wan W, Zhao XF, Huang W, Sheng RN (2012) Steganalysis of MP3Stego based on Huffman table distribution and recoding. J Univ Chin Acad Sci 21(1):118–124Google Scholar
  17. 17.
    Westfeld A (2002) Detecting low embedding rates. In: Proceedings of the 5th International Workshop on Information Hiding. Noordwijkerhout, The Netherlands, 7–9 October, 2578:324–339Google Scholar
  18. 18.
    Xu DW, Wang RD, Shi YQ (2014) Data hiding in encrypted H.264/AVC video streams by codeword substitution. IEEE Trans Inf Forensics Secur 9(4):596–606CrossRefGoogle Scholar
  19. 19.
    Yan DQ, Wang RD, Yu XM, Zhu J (2013) Steganalysis for MP3Stego using differential statistics of quantization step. Digit Signal Process 23:1181–1185MathSciNetCrossRefGoogle Scholar
  20. 20.
    Yu RS, Lin X, Rahardja S, Ko CC (2004) A statistics study on the mdct coefficient distribution for audio. In: Proceedings of the IEEE International Conference on Multimedia and Expo. Taipei, Taiwan, 27–30 June, 2:1483–1486Google Scholar
  21. 21.
    Zhang H, Ping XJ, Xu MK, Wang R (2014) Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction. Sci Chin Inf Sci 57:048101:1–048101:7Google Scholar
  22. 22.
    Zou DK, Shi YQ, Su W, Xuan GR (2006) Steganlysis based on markov model of thresholded prediction-error image. In: Proceedings of the IEEE International Conference on Multimedia and Expo. Toronto, ON, Canada, 9–12 July, pp 1365–1368Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.College of Information Science and EngineeringNingbo UniversityZhejiangChina

Personalised recommendations