2017
DOI: 10.1049/iet-spr.2016.0690
|View full text |Cite
|
Sign up to set email alerts
|

Universal audio steganalysis based on calibration and reversed frequency resolution of human auditory system

Abstract: Calibration and higher order statistics (HOS) are standard components of image steganalysis. However, these techniques have not yet found adequate attention in audio steganalysis. Specifically, most of current studies are either non-calibrated or only based on noise removal. The goal of this paper is to fill these gaps and to show that calibrated features based on re-embedding technique improves performance of audio steganalysis. Furthermore, we show that least significant bit (LSB) is the most sensitive bit-p… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 28 publications
0
19
0
Order By: Relevance
“…The steganographic security (statistical undetectability) is the import criteria to evaluate the steganographic systems. In the experiments, four steganalysis methods [29], [30] are used to test the security of the proposed method. Accordingly, four kinds of features are extracted for steganalysis, which include derivative-based high-frequency spectrum (DHS), derivative-based mel-cepstrum (DMC), wavelet-based melcepstrum (WMC) and reversed-Mel energy (RME).…”
Section: Securitymentioning
confidence: 99%
“…The steganographic security (statistical undetectability) is the import criteria to evaluate the steganographic systems. In the experiments, four steganalysis methods [29], [30] are used to test the security of the proposed method. Accordingly, four kinds of features are extracted for steganalysis, which include derivative-based high-frequency spectrum (DHS), derivative-based mel-cepstrum (DMC), wavelet-based melcepstrum (WMC) and reversed-Mel energy (RME).…”
Section: Securitymentioning
confidence: 99%
“…Previous calibration methods are similar in the sense that estimation of covers was used for calibration. Calibrating features based on the characteristics of stegos is another possibility that was pursued in [28]. That paper addressed both targeted and universal cases.…”
Section: Universal Non‐compressed Methodsmentioning
confidence: 99%
“…Such a method may make a decision about every frame and then use an appropriate rule for making the final decision. Also, such methods would be very beneficial for steganography and its results can be used for better understanding the cover space and implement adaptive steganography methods. Previous works have shown the effect of audio contents on the result of steganalysis [11, 28]. Therefore, implementing a proper clustering method before steganalysis and investigating its effect seems to be fruitful. Current literature has only considered steganalysis of mono signals.…”
Section: Future Workmentioning
confidence: 99%
“…The transform domain algorithms embed secret by modifying the transform domain coefficients, that are, Discrete Cosine Transform (DCT) [20], variants of Discrete Wavelet Transform (DWT) [21], and Fast Fourier Transform (FFT) [22]. Many state-of-the-art transform domain algorithms have emerged, such as Jsteg [23], OutGuess [24], StegHide [25], F5 [26], and so on. These algorithms preserve the image statistical characteristics as much as possible during the embedding process to defense the visual-based and statistical-based steganalysis attacks.…”
Section: Related Workmentioning
confidence: 99%