Advertisement

A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance

  • Yali Liu
  • Ken Chiang
  • Cherita Corbett
  • Rennie Archibald
  • Biswanath Mukherjee
  • Dipak Ghosal
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5222)

Abstract

Steganography can be used to hide information in audio media both for the purposes of digital watermarking and establishing covert communication channels. Digital audio provides a suitable cover for high-throughput steganography as a result of its transient and unpredictable characteristics. Distortion measure plays an important role in audio steganalysis - the analysis and classification method of determining if an audio medium is carrying hidden information. In this paper, we propose a novel distortion metric based on Hausdorff distance. Given an audio object x which could potentially be a stego-audio object, we consider its de-noised version x′ as an estimate of the cover-object. We then use Hausdorff distance to measure the distortion from x to x′. The distortion measurement is obtained at various wavelet decomposition levels from which we derive high-order statistics as features for a classifier to determine the presence of hidden information in an audio signal. Extensive experimental results for the Least Significant Bit (LSB) substitution based steganography tool show that the proposed algorithm has a strong discriminatory ability and the performance is significantly superior to existing methods. The proposed approach can be easily applied to other steganography tools and algorithms.

Keywords

Audio Signal Distortion Measure Hide Message Covert Communication Wavelet Decomposition Level 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dittmann, J., Hesse, D., Hillert, R.: Steganography and steganalysis in voice-over ip scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, USA, January 2005, pp. 607–618. SPIE (2005)Google Scholar
  2. 2.
    Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on multimedia and security: new challenges, Ottawa, Ontario, Canada, october 2001, pp. 27–30. ACM Press, New York (2001)CrossRefGoogle Scholar
  3. 3.
    Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Proceedings of the Second International Workshop on Information Hiding, Portland, OR, USA, April 1998, pp. 273–289. Springer, Heidelberg (1998)Google Scholar
  4. 4.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Proceedings of the Third International Workshop on Information Hiding, Dresden, Germany, september 1999, pp. 61–76. Springer, Heidelberg (1999)Google Scholar
  5. 5.
    Johnson, M.K., Lyu, S., Farid, H.: Steganalysis of recorded speech. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VII, May 2005, vol. 5681, pp. 664–672. SPIE (2005)Google Scholar
  6. 6.
    Ozer, H., Avcibas, I., Sankur, B., Memon, N.D.: Steganalysis of audio based on audio quality metrics. In: Delp III, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents V, January 2003, vol. 5020, pp. 55–66. SPIE (2003)Google Scholar
  7. 7.
    Avcibas, I.: Audio steganalysis with content-independent distortion measures. Signal Processing Letters, IEEE 13(2), 92–95 (2006)CrossRefGoogle Scholar
  8. 8.
    Huttenlocher, D.P., Klanderman, G.A., Rucklidge, W.J.: Comparing images using the hausdorff distance. Pattern Analysis and Machine Intelligence, IEEE Transactions on 15(9), 850–863 (1993)CrossRefGoogle Scholar
  9. 9.
    Veltkamp, R.C.: Shape matching: similarity measures and algorithms. In: Shape Modeling and Applications, SMI 2001 International Conference on, Genova, Italy, pp. 188–197 (May 2001)Google Scholar
  10. 10.
    Holotyak, T., Fridrich, J., Voloshynovskiy, S.: Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Lecture Notes in Computer Science, pp. 273–274. Springer, Heidelberg (2005)Google Scholar
  11. 11.
    Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: Image Processing, 2001. International Conference on, Thessaloniki, Greece, pp. 1019–1022 (October 2001)Google Scholar
  12. 12.
    Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.S.: Detection of hiding in the least significant bit. Signal Processing, IEEE Transactions on 52(10), 3046–3058 (2004)CrossRefMathSciNetGoogle Scholar
  13. 13.
    Dumitrescu, S., Wu, X.: Steganalysis of LSB embedding in multimedia signals. In: Multimedia and Expo, 2002. ICME 2002. IEEE International Conference on, Lusanne, Switzerland, pp. 581–584 (August 2002)Google Scholar
  14. 14.
    Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Proceedings of the Fifth International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, pp. 355–372 (October 2002)Google Scholar
  15. 15.
    Farid, H.: Detecting hidden messages using higher-order statistical models. In: Image Processing. 2002. International Conference on, Rochester, NY, USA, pp. 905–908 (September 2002)Google Scholar
  16. 16.
    Harmse, J.J.: Steganalysis of additive noise modelable information hiding. Master’s thesis, Rensselaer Polytechnic Institute, Troy, New York, USA (2003)Google Scholar
  17. 17.
    Shi, Y.Q., Xuan, G., Yang, C., Gao, J., Zhang, Z., Chai, P., Zou, D., Chen, C., Chen, W.: Effective steganalysis based on statistical moments of wavelet characteristic function. In: IEEE International Conference on Information Technology: Coding and Computing, ITCC 2005, April 2005, pp. 768–773. IEEE Computer Society Press, Los Alamitos (2005)CrossRefGoogle Scholar
  18. 18.
    Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. Image Processing, IEEE Transactions on 12(2), 221–229 (2003)CrossRefMathSciNetGoogle Scholar
  19. 19.
    Watson, A.B. (ed.): Digital images and human vision. MIT Press, Cambridge (1993)Google Scholar
  20. 20.
    Nill, N.: A visual model weighted cosine transform for image compression and quality assessment. Communications, IEEE Transactions on 33(6), 551–557 (1985)CrossRefGoogle Scholar
  21. 21.
    A Library for Support Vector Machines, http://www.csie.ntu.edu.tw/cjlin/libsvm/
  22. 22.
    Donoho, D.L., Johnstone, I.M.: Adapting to unknown smoothness via wavelet shrinkage. Journal of the American Statistical Association 90(432), 1200–1224 (1995)zbMATHCrossRefMathSciNetGoogle Scholar
  23. 23.
    Burrus, C.S., Gopinath, R.A., Guo, H.: Introduction to wavelets and wavelets transforms, a primer. Prentice Hall, Englewood Cliffs (1998)Google Scholar
  24. 24.
    Veltkamp, R., Hagedoorn, M.: State-of-the-art in shape matching. Technical Report UU-CS-1999-27, Utrecht University, the Netherlands (1999)Google Scholar
  25. 25.
  26. 26.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Yali Liu
    • 1
  • Ken Chiang
    • 2
  • Cherita Corbett
    • 2
  • Rennie Archibald
    • 3
  • Biswanath Mukherjee
    • 3
  • Dipak Ghosal
    • 3
  1. 1.Electrical & Computer EngineeringUniversity of California, DavisDavisUSA
  2. 2.Sandia National LaboratoriesLivermoreUSA
  3. 3.Department of Computer ScienceUniversity of California, DavisDavisUSA

Personalised recommendations