Abstract
In this paper, we present a blind steganalysis based on feature fusion. Features based on Short Time Fourier Transform (STFT), which consists of second-order derivative spectrum features of audio and Mel-frequency cepstrum coefficients, audio quality metrics and features on linear prediction residue are extracted separately. Then feature fusion is conducted. The performance of the proposed steganalysis is evaluated against 4 steganographic schemes: Direct Sequence Spread Spectrum (DSSS), Quantization Index Modulation (QIM), ECHO embedding (ECHO), and Least Significant Bit embedding (LSB). Experiment results show that the classifying performance of the proposed detector is much superior to the previous work. Even more exciting is that the proposed methodology could detect the four steganography, with 85%+ classification accuracy achieved in all the detections, which makes the proposed steganalysis methodology capable of being regarded as a blind steganalysis, and especially useful when the steganalyzer are without the knowledge of the steganographic scheme employed in data embedding.
Similar content being viewed by others
References
A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. The 3rd International Workshop on Information Hiding, Dresden, Germany, September 29–October 1, 1999, 61–76.
J. Fridrich and M. Goljan. Reliable detection of LSB steganography in color and grayscale images. ACM Multimedia 2001 Workshops-Multimedia and Security: New Challenges, Ottawa, Canada, October 5, 2001, 27–30.
S. Dumitrescu, X. Wu, and Z. Wang. Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing, 51(2003)7, 1995–2007.
P. Lu, X. Luo, Q. Tang, and L. Shen. An improved sample pairs method for detection of LSB embedding. The 6th International Workshop on Information Hiding, Toronto, Canada, May 23–25, 2004, 116–127.
J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. The 6th International Workshop on Information Hiding, Toronto, Canada, May 23–25, 2004, 67–81.
J. Fridrich, M. Goljan, and D. Hogea. Attacking the outguess. ACM Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis, Juanles-Pins, France, December 1–6, 2002, 967–982.
J. Huang and D. Mumford. Statistics of natural images and models. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Ft. Collins, CO, USA, June 23–25, 1999, 541–547.
W. Zeng, H. Ai, R. Hu, B. Liu, and S. Gao. Steganalysis of LSB embedding in audio signals based on sample pair analysis. International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, September 21–25, 2007, 2960–2963.
F. Petitcolas. Mp3stego software. Available: http://www.petitcolas.net/fabien/steganography/mp3-stego, 2006
Y. Wei, L. Guo, and Y. Wang. Controlling bitrate steganography on AAC audio. 2010 International Congress on Image and Signal Processing, Yantai, China, October 16–18, 2010, 4373–4375.
A. Westfeld. Detecting low embedding rates. In Proceedings of 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, October 7–9, 2002, 324–339.
H. Ozer, I. Avcibacs, B. Sankur, and N. Memon. Steganalysis of audio based on audio quality metrics. Security and Watermarking of Multimedia Contents V, In Proceedings of SPIE, Santa Clara, CA, USA, January 21–24, 2003, 56–66.
I. Avcibas. Audio steganalysis with content-independent distortion measures. IEEE Signal Processing Letters, 13(2006)2, 92–95.
O. Altun, G. Sharma, M. Celik, M. Sterling, E. Titlebaum, and M. Bocko. Morphological steganalysis of audio signals and the principle of diminishing marginal distortions. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Philadelphia, PA, USA, 2005, 21–24.
X. Ru, H. Zhang, and X. Huang. Steganalysis of audio: Attacking the steghide. In Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, August 18–21, 2005, 3937–3942.
J. Fu, Y. Qi, and J. Yuan. Wavelet domain audio steganalysis based on statistical moments and PCA. International Conference on Wavelet Analysis and Pattern Recognition, Beijing, China, November 2–4, 2007, 1619–1623.
M. Johnson, S. Lyu, and H. Farid. Steganalysis of recorded speech. Proceedings of SPIE-IS and T Electronic Imaging-Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, USA, January 17–20, 2005, 664–672.
Q. Liu, A. Sung, and M. Qiao. Spectrum steganalysis of WAV audio streams. The 6th International Conference on Machine Learning and Data Mining in Pattern Recognition, Leipzig, Germany, July 23–25, 2009, 582–593.
Q. Liu and A. Sung. Temporal derivative-based spectrum and melcepstrum audio steganalysis. IEEE Transactions on Information Forensics and Security, 4(2009)3, 359–368.
D. Kirovski and H. Malvar. Spread-spectrum watermarking of audio signals. IEEE Transactions on Signal Processing, 51(2003)4, 1020–1033.
A. Brown. S-tools4. http://www.jitc.com/stegoarchive/stego/softwarewindows.html, 2003.
B. Chen and G. Wornell. Quantization index modulation methods for digital watermarking and information embedding of multimedia. The Journal of VLSI Signal Processing, 27(2001)1, 7–33.
W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(1996)3, 313–336.
H. Repp. Hide4pgp. http://www.rugeley.demon.co.uk/security/hide4pgp.zip.
R. Gonzalez and R. Woods. Digital Image Processing. Englewood Cliffs, NJ, USA, Prentice-Hall, 2008, 568.
A. Ramalingam. Gaussian mixture modeling of short-time Fourier transform features for audio fingerprinting. IEEE Transactions on Information Forensics and Security, 1(2006)4, 457–463.
C. Kraetzer and J. Dittmann. Mel-cepstrum based steganalysis for voipsteganography. Congress on Security, Steganography, and Watermarking of Multimedia Contents. In Proceedings of SPIE, San Jose, California, USA, January 29–February 1, 2007.
M. Xu, L. Duan, J. Cai, L. Chia, C. Xu, and Q. Tian. HMM-based audio keyword generation. The 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30–December 3, 2004, 566–574.
Q. Liu. Wave audio. http://www.cs.nmt.edu/IA/steganalysis.html, 2006.
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China (No. 61071173).
Communication author: Guo Li, born in 1946, male, Professor.
About this article
Cite this article
Wei, Y., Guo, L., Wang, Y. et al. A blind audio steganalysis based on feature fusion. J. Electron.(China) 28, 265–276 (2011). https://doi.org/10.1007/s11767-011-0567-z
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11767-011-0567-z