Skip to main content
Log in

A blind audio steganalysis based on feature fusion

  • Published:
Journal of Electronics (China)

Abstract

In this paper, we present a blind steganalysis based on feature fusion. Features based on Short Time Fourier Transform (STFT), which consists of second-order derivative spectrum features of audio and Mel-frequency cepstrum coefficients, audio quality metrics and features on linear prediction residue are extracted separately. Then feature fusion is conducted. The performance of the proposed steganalysis is evaluated against 4 steganographic schemes: Direct Sequence Spread Spectrum (DSSS), Quantization Index Modulation (QIM), ECHO embedding (ECHO), and Least Significant Bit embedding (LSB). Experiment results show that the classifying performance of the proposed detector is much superior to the previous work. Even more exciting is that the proposed methodology could detect the four steganography, with 85%+ classification accuracy achieved in all the detections, which makes the proposed steganalysis methodology capable of being regarded as a blind steganalysis, and especially useful when the steganalyzer are without the knowledge of the steganographic scheme employed in data embedding.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. The 3rd International Workshop on Information Hiding, Dresden, Germany, September 29–October 1, 1999, 61–76.

  2. J. Fridrich and M. Goljan. Reliable detection of LSB steganography in color and grayscale images. ACM Multimedia 2001 Workshops-Multimedia and Security: New Challenges, Ottawa, Canada, October 5, 2001, 27–30.

  3. S. Dumitrescu, X. Wu, and Z. Wang. Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing, 51(2003)7, 1995–2007.

    Article  Google Scholar 

  4. P. Lu, X. Luo, Q. Tang, and L. Shen. An improved sample pairs method for detection of LSB embedding. The 6th International Workshop on Information Hiding, Toronto, Canada, May 23–25, 2004, 116–127.

  5. J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. The 6th International Workshop on Information Hiding, Toronto, Canada, May 23–25, 2004, 67–81.

  6. J. Fridrich, M. Goljan, and D. Hogea. Attacking the outguess. ACM Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis, Juanles-Pins, France, December 1–6, 2002, 967–982.

  7. J. Huang and D. Mumford. Statistics of natural images and models. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Ft. Collins, CO, USA, June 23–25, 1999, 541–547.

  8. W. Zeng, H. Ai, R. Hu, B. Liu, and S. Gao. Steganalysis of LSB embedding in audio signals based on sample pair analysis. International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, September 21–25, 2007, 2960–2963.

  9. F. Petitcolas. Mp3stego software. Available: http://www.petitcolas.net/fabien/steganography/mp3-stego, 2006

  10. Y. Wei, L. Guo, and Y. Wang. Controlling bitrate steganography on AAC audio. 2010 International Congress on Image and Signal Processing, Yantai, China, October 16–18, 2010, 4373–4375.

  11. A. Westfeld. Detecting low embedding rates. In Proceedings of 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, October 7–9, 2002, 324–339.

  12. H. Ozer, I. Avcibacs, B. Sankur, and N. Memon. Steganalysis of audio based on audio quality metrics. Security and Watermarking of Multimedia Contents V, In Proceedings of SPIE, Santa Clara, CA, USA, January 21–24, 2003, 56–66.

  13. I. Avcibas. Audio steganalysis with content-independent distortion measures. IEEE Signal Processing Letters, 13(2006)2, 92–95.

    Article  Google Scholar 

  14. O. Altun, G. Sharma, M. Celik, M. Sterling, E. Titlebaum, and M. Bocko. Morphological steganalysis of audio signals and the principle of diminishing marginal distortions. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Philadelphia, PA, USA, 2005, 21–24.

  15. X. Ru, H. Zhang, and X. Huang. Steganalysis of audio: Attacking the steghide. In Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, August 18–21, 2005, 3937–3942.

  16. J. Fu, Y. Qi, and J. Yuan. Wavelet domain audio steganalysis based on statistical moments and PCA. International Conference on Wavelet Analysis and Pattern Recognition, Beijing, China, November 2–4, 2007, 1619–1623.

  17. M. Johnson, S. Lyu, and H. Farid. Steganalysis of recorded speech. Proceedings of SPIE-IS and T Electronic Imaging-Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, USA, January 17–20, 2005, 664–672.

  18. Q. Liu, A. Sung, and M. Qiao. Spectrum steganalysis of WAV audio streams. The 6th International Conference on Machine Learning and Data Mining in Pattern Recognition, Leipzig, Germany, July 23–25, 2009, 582–593.

  19. Q. Liu and A. Sung. Temporal derivative-based spectrum and melcepstrum audio steganalysis. IEEE Transactions on Information Forensics and Security, 4(2009)3, 359–368.

    Article  Google Scholar 

  20. D. Kirovski and H. Malvar. Spread-spectrum watermarking of audio signals. IEEE Transactions on Signal Processing, 51(2003)4, 1020–1033.

    Article  MathSciNet  Google Scholar 

  21. A. Brown. S-tools4. http://www.jitc.com/stegoarchive/stego/softwarewindows.html, 2003.

  22. B. Chen and G. Wornell. Quantization index modulation methods for digital watermarking and information embedding of multimedia. The Journal of VLSI Signal Processing, 27(2001)1, 7–33.

    Article  MATH  Google Scholar 

  23. W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(1996)3, 313–336.

    Article  Google Scholar 

  24. H. Repp. Hide4pgp. http://www.rugeley.demon.co.uk/security/hide4pgp.zip.

  25. R. Gonzalez and R. Woods. Digital Image Processing. Englewood Cliffs, NJ, USA, Prentice-Hall, 2008, 568.

    Google Scholar 

  26. A. Ramalingam. Gaussian mixture modeling of short-time Fourier transform features for audio fingerprinting. IEEE Transactions on Information Forensics and Security, 1(2006)4, 457–463.

    Article  Google Scholar 

  27. C. Kraetzer and J. Dittmann. Mel-cepstrum based steganalysis for voipsteganography. Congress on Security, Steganography, and Watermarking of Multimedia Contents. In Proceedings of SPIE, San Jose, California, USA, January 29–February 1, 2007.

  28. M. Xu, L. Duan, J. Cai, L. Chia, C. Xu, and Q. Tian. HMM-based audio keyword generation. The 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30–December 3, 2004, 566–574.

  29. Q. Liu. Wave audio. http://www.cs.nmt.edu/IA/steganalysis.html, 2006.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Guo.

Additional information

Supported by the National Natural Science Foundation of China (No. 61071173).

Communication author: Guo Li, born in 1946, male, Professor.

About this article

Cite this article

Wei, Y., Guo, L., Wang, Y. et al. A blind audio steganalysis based on feature fusion. J. Electron.(China) 28, 265–276 (2011). https://doi.org/10.1007/s11767-011-0567-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11767-011-0567-z

Key words

CLC index

Navigation