CLC number: TP309; TP391
On-line Access:
Received: 2005-07-28
Revision Accepted: 2005-11-18
Crosschecked: 0000-00-00
Cited: 4
Clicked: 5185
Ru Xue-min, Zhuang Yue-ting, Wu Fei. Audio steganalysis based on “negative resonance phenomenon” caused by steganographic tools[J]. Journal of Zhejiang University Science A, 2006, 7(4): 577-583.
@article{title="Audio steganalysis based on “negative resonance phenomenon” caused by steganographic tools",
author="Ru Xue-min, Zhuang Yue-ting, Wu Fei",
journal="Journal of Zhejiang University Science A",
volume="7",
number="4",
pages="577-583",
year="2006",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2006.A0577"
}
%0 Journal Article
%T Audio steganalysis based on “negative resonance phenomenon” caused by steganographic tools
%A Ru Xue-min
%A Zhuang Yue-ting
%A Wu Fei
%J Journal of Zhejiang University SCIENCE A
%V 7
%N 4
%P 577-583
%@ 1673-565X
%D 2006
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2006.A0577
TY - JOUR
T1 - Audio steganalysis based on “negative resonance phenomenon” caused by steganographic tools
A1 - Ru Xue-min
A1 - Zhuang Yue-ting
A1 - Wu Fei
J0 - Journal of Zhejiang University Science A
VL - 7
IS - 4
SP - 577
EP - 583
%@ 1673-565X
Y1 - 2006
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2006.A0577
Abstract: Researching on the impact different steganographic software tools have audio statistical features, revealed the phenomenon that when messages are embedded in a WAV file by using a certain tool, the variation of statistical features in the WAV file which already contains messages embedded by the same tool is abruptly smaller than those in which messages have not been embedded. We call it “negative resonance phenomenon” temporarily. With the phenomenon above and Support Vector Machines (SVMs), we can detect the existence of hidden messages, and also identify the tools used to hide them. As shown by the experimental results, the proposed method can be very effectively used to detect hidden messages embedded by Hide4PGP, Stegowav and S-Tools4.
[1] Böhme, R., Westfeld, A., 2004. Statistical Characterisation of MP3 Encoders for Steganalysis. Proceedings of the Multimedia and Security Workshop. ACM Press, New York, p.25-34.
[2] Brown, A., 2005. S-Tools4. Http://www.jjtc.com/stegoarchive/stego/softwarewindows.html.
[3] Burges, C.J.C., 1998. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2(2):121-167.
[4] Chang, C.C., Lin, C.J., 2001. LIBSVM: A Library for Support Vector Machines. Http://www.csie.ntu.edu.tw/~cjlin/libsvm.
[5] Farid, H., 2001. Detecting Steganographic Messages in Digital Images. Technical Report TR2001-412, Dartmouth College, Hanover, NH.
[6] Farid, H., 2002. Detecting Hidden Messages Using Higher-order Statistical Models. Proceedings of International Conference on Image Processing. NY, II:905-908.
[7] Fridrich, J., Goljan, M., Du, R., 2001. Reliable Detection of LSB Steganography in Color and Grayscale Images. Proceedings of the ACM Workshop on Multimedia and Security. Ottawa, CA, p.27-30.
[8] Fridrich, J., Goljan, M., Hogea, D., Soukal, D., 2003. Quantitative steganalysis of digital images: estimating the secret message length. ACM Multimedia Systems Journal, Special Issue on Multimedia Security, 9(3):288-302.
[9] Johnson, M.K., Lyu, S., Farid, H., 2005. Steganalysis of Recorded Speech. Proceedings of Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE San Jose, CA, USA, 5681:664-672.
[10] Liang, X.P., He, J.H., Li, J.Q., Huang, J.W., 2004. Steganalysis principle, actuality and prospect. Acta Scientiarum Natralium Universitatis Sunyatseni, 43(6):93-96 (in Chinese).
[11] Liu, S.H., Yao, H.X., Gao, W., 2004. Steganalysis of Data Hiding Techniques in Wavelet Domain. Proceeding of International Conference on Information Technology: Coding Computing. Las Vegas, USA, p.751-754.
[12] Peticolas, F.A.P., Anderson, R.J., Kuhn, M.G., 1999. Information hiding—A survey. Proceedings of the IEEE Special Issue on Protection of Multimedia Content, 87(7):1062-1078.
[13] Pulcini, G., 2005. Stegowav. Http://www.jjtc.com/stegoarchive/stego/softwaredos.html.
[14] Repp, H., 2005. Hide4PGP. Http://www.heinz-epp.online-home.de/Hide4PGP.htm.
[15] Smith, J.O., 2004. Physical Audio Signal Processing. August 2004 Draft. Http://ccrma.stanford.edu/~jos/pasp/.
[16] Spanias, A.S., 1994. Speech coding: a tutorial review. Proceedings of the IEEE, 82(10):1541-1582.
[17] Vapnik, V.N., 1995. The Nature of Statistical Learning Theory. Spring-Verlag, New York, p.188-203.
[18] Westfeld, A., Pfitzmann, A., 1999. Attacks on Steganographic Systems. Proceedings of Information Hiding—Third International Workshop. Springer-Verlag, Dresden, Germany, p.61-75.
Open peer comments: Debate/Discuss/Question/Opinion
<1>