A Novel Method for MP3 Steganalysis

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 308)

Abstract

Modern communication through digital media is finding traction in our day-to-day life. Steganography plays its role in improving the security of communication by various means. However, all these technologies can also be used with malicious intent. Terrorist organizations have been using steganographic techniques to communicate for a while now. Thus, it is imperative that countermeasures are made to be efficient. Various forms of stego-media are available. Among the available media, digital audio is a very popular carrier for covert communication. Recently, many audio steganalysis methods have been proposed to detect existence of hidden data in stego-media of all formats. In this paper, we look into the analysis of MP3Stego an MP3 steganographic tool. We have considered features such as Markov transition and neighboring joint density. Experimental results show that our approach is successful in discriminating MP3 covers and the steganograms generated using MP3Stego.

Keywords

MDCT MP3Stego 

References

  1. 1.
    Noto, M.: MP3Stego: Hiding Text in MP3 Files, p. 5. Sans Institute http://www.sans.org/readingroom/whitepapers/stenganography/mp3stego-hiding-textmp3-files-550 (2001)
  2. 2.
    Smith, S.W.: Digital Signal Processing : A Practical Guide for Engineers and Scientist. Massachusetts, Massachusetts (2003)Google Scholar
  3. 3.
    Petitcolas, F.: MP3Stego, 1998. http://www.petitcolas.net/fabien/steganography/mp3stego/(2011)
  4. 4.
    Qiao, M., Sung, A.H., Liu, Q.: Steganalysis of MP3Stego. In: International Joint Conference on Neural Networks, 2009. IJCNN 2009. IEEE (2009)Google Scholar
  5. 5.
    Westfeld, A.: Detecting low embedding rates. In: Information Hiding. Springer, Berlin (2003)Google Scholar
  6. 6.
    Qiao, M., Sung, A.H., Liu, Q.: Feature mining and intelligent computing for MP3 steganalysis. In: International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing, 2009. IJCBS’09. IEEE (2009)Google Scholar
  7. 7.
    Özer, H., et al. Detection of audio covert channels using statistical footprints of hidden messages. Digital Signal Process. 16(4), 389–401 (2006)Google Scholar
  8. 8.
    Yu, X., et al.: MP3 audio steganalysis using calibrated side information feature. J. Comput. Inf. Syst. 8(10), 4241–4248 (2012)Google Scholar
  9. 9.
    Menon, R.J.: Mp3 steganography and steganalysis. http://www.dfcsc.uri.edu/docs/Menon_Thesis.pdf (2009)
  10. 10.
    Liu, Q., Sung, A.H., Qiao, M.: Derivative-based audio steganalysis. TOMCCAP 7(3), 18 (2011)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.TIFAC CORE in Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations