access icon free Comprehensive review of audio steganalysis methods

Recently, merging signal processing techniques with information security services has drawn a lot of attention. Steganography and steganalysis are among those trends. Like their counterparts in cryptology, steganography and steganalysis are in a constant battle. Steganography methods try to hide the presence of covert messages in innocuous-looking data, whereas steganalysis methods try to break steganography algorithms and reveal the existence of hidden messages. The streaming nature of audio signals, their popularity, and their wide spread usage make them very good candidates for steganography. This has led to a very rich literature on both steganography and steganalysis of audio signals. This study intends to conduct a comprehensive review of audio steganalysis methods aggregated over near 15 years. To that end, both compressed and con-compressed methods are reviewed, and then their important details are presented in different tables. Furthermore, some of the most recent audio steganalysis methods (both non-compressed and compressed ones) are implemented and comparative analyses on their performances are conducted. Finally, the study provides some possible directions for future research studies on audio steganalysis.

Inspec keywords: steganography; audio streaming; audio signal processing

Other keywords: audio steganalysis methods; information security service; steganography method; signal processing techniques; cryptology; compressed method; audio signal streaming; concompressed method

Subjects: Cryptography; Audio equipment and systems; Speech and audio signal processing

References

    1. 1)
      • 2. Ghasemzadeh, H., Mehrara, H., Khas, M.T.: ‘Cipher-text only attack on hopping window time domain scramblers’. Presented at the 2014 4th Int. eConf. on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 2014.
    2. 2)
      • 58. Menon, R.J.: ‘Mp3 steganography and steganalysis’ (University of Rhode Island, 2008).
    3. 3)
      • 13. Liu, Q., Sung, A.H., Qiao, M.: ‘Derivative-based audio steganalysis’. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 2011, vol. 7, p. 18.
    4. 4)
      • 34. Li, M., Kulhandjian, M.K., Pados, D.A., et al: ‘Extracting spread-spectrum hidden data from digital media’, IEEE Trans. Inf. Forensics Sec., 2013, 8, pp. 12011210.
    5. 5)
      • 53. Platt, C.: ‘UnderMP3Cover’, ed, 2004.
    6. 6)
      • 57. Kim, D.-H., Yang, S.-J., Chung, J.-H.: ‘Additive data insertion into MP3 bitstream using linbits characteristics’. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, 2004. Proc. (ICASSP'04), Montreal, Canada, 2004, vol. 4, pp. iv-181iv-184.
    7. 7)
      • 78. Böhme, R., Westfeld, A.: ‘Statistical characterisation of MP3 encoders for steganalysis’. Proc. 2004 Workshop on Multimedia and Security, 2004, pp. 2534.
    8. 8)
      • 29. Ghasemzadeh, H., Khass, M.T., Arjmandi, M.K., et al: ‘Detection of vocal disorders based on phase space parameters and Lyapunov spectrum’, Biomed. Signal Proc. Control, 2015, 22, pp. 135145.
    9. 9)
      • 40. Gopalan, K., Wenndt, S.J., Adams, S.F., et al: ‘Audio steganography by amplitude or phase modification’. Electronic Imaging 2003, Santa Clara, United States, 2003, pp. 6776.
    10. 10)
      • 27. Johnson, M.K., Lyu, S., Farid, H.: ‘Steganalysis of recorded speech’. Security, Steganography, and Watermarking of Multimedia Contents VII. Vol. 5681. International Society for Optics and Photonics, San Jose, United States, 2005.
    11. 11)
      • 4. Ghasemzadeh, H., Keyvanrad, M.H.: ‘Toward a robust and secure echo steganography method based on parameters hopping’. Signal Processing and Intelligent Systems, Tehran, Iran, 2015.
    12. 12)
      • 79. Ghasemzadeh, H.: ‘Calibrated steganalysis of mp3stego in multi-encoder scenario’, Under review, pre-print available at arXiv:1709.08084, Magdeburg, Germany, 2017.
    13. 13)
      • 12. Liu, Q., Sung, A.H., Qiao, M.: ‘Novel stream mining for audio steganalysis’. Proc. 17th ACM Int. Conf. on Multimedia, Beijing, China, 2009, pp. 95104.
    14. 14)
      • 9. Hetzl, S., Mutzel, P.: ‘A graph–theoretic approach to steganography’. Communications and Multimedia Security, Salzburg, Austria, 2005, pp. 119128.
    15. 15)
      • 36. I. secret: ‘Invisible secret’. Available at http://www.invisiblesecrets.com/.
    16. 16)
      • 62. Westfeld, A.: ‘Detecting low embedding rates’. Information Hiding, Noordwijkerhout, Netherlands, 2003, pp. 324339.
    17. 17)
      • 18. Özer, H., Sankur, B., Memon, N., et al: ‘Detection of audio covert channels using statistical footprints of hidden messages’, Digit. Signal Process., 2006, 16, pp. 389401.
    18. 18)
      • 6. Ker, A.D., Bas, P., Böhme, R., et al: ‘Moving steganography and steganalysis from the laboratory into the real world’. Proc. first ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 2013, pp. 4558.
    19. 19)
      • 35. Repp, H.: ‘Hide4PGP’, 1996. Available at http://www.heinz-repp.onlinehome.de/Hide4PGP.htm.
    20. 20)
      • 60. Shirali-Shahreza, M.H., Shirali-Shahreza, S.: ‘Real-time and MPEG-1 layer III compression resistant steganography in speech’, IET Inf. Sec., 2010, 4, pp. 17.
    21. 21)
      • 20. Ghasemzadeh, H., Tajik Khas, M., Khalil Arjmandi, M.: ‘Audio steganalysis based on reversed psychoacoustic model of human hearing’, Digit. Signal Process., 2016, 51, pp. 133141.
    22. 22)
      • 75. Wei, Y., Guo, L., Wang, Y.: ‘Controlling bitrate steganography on AAC audio’. 2010 3rd Int. Congress on Image and Signal Processing (CISP), Yantai, China, 2010, pp. 43734375.
    23. 23)
      • 24. Kexin, Z.: ‘Audio steganalysis of spread spectrum hiding based on statistical moment’. 2010 2nd Int. Conf. on Signal Processing Systems (ICSPS), Dalian, China, 2010, pp. V3-381V3-384.
    24. 24)
      • 73. Xu, S., Zhang, P., Wang, P., et al: ‘Performance analysis of data hiding in MPEG-4 AAC audio’, Tsinghua Sci. Technol., 2009, 14, pp. 5561.
    25. 25)
      • 74. Wang, Y., Guo, L., Wei, Y., et al: ‘A steganography method for AAC audio based on escape sequences’. 2010 Int. Conf. on Multimedia Information Networking and Security (MINES), Nanjing, China, 2010, pp. 841845.
    26. 26)
      • 70. Brandenburg, K.: ‘MP3 and AAC explained’. Audio Engineering Society Conf.: 17th Int. Conf.: High-Quality Audio Coding, Florence, Italy, 1999.
    27. 27)
      • 46. Shirali-Shahreza, S., Manzuri-Shalmani, M.: ‘High capacity error free wavelet domain speech steganography’. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, 2008. ICASSP 2008, Las Vegas, USA, 2008, pp. 17291732.
    28. 28)
      • 43. Petitcolas, F.A.: ‘Mp3stego’, ed, 1998.
    29. 29)
      • 55. Yan, D., Wang, R.: ‘Huffman table swapping-based steganograpy for MP3 audio’, Multimedia Tools Appl., 2011, 52, pp. 291305.
    30. 30)
      • 16. Liu, Q., Sung, A.H., Qiao, M.: ‘Temporal derivative-based spectrum and Mel-cepstrum audio steganalysis’, IEEE Trans. Inf. Forensics Sec., 2009, 4, pp. 359368.
    31. 31)
      • 77. Ren, Y., Xiong, Q., Wang, L.: ‘A steganalysis scheme for AAC audio based on MDCT difference between intra and inter frame’. Int. Workshop on Digital Watermarking, Magdeburg, Germany, 2017, pp. 217231.
    32. 32)
      • 8. Ru, X.-M., Zhang, H.-J., Huang, X.: ‘Steganalysis of audio: attacking the steghide’. Proc. 2005 Int. Conf. on Machine Learning and Cybernetics, Guangzhou, China, 2005, pp. 39373942.
    33. 33)
      • 41. Rekik, S., Guerchi, D., Selouani, S.-A., et al: ‘Speech steganography using wavelet and Fourier transforms’, EURASIP J. Audio Speech Music Process., 2012, 2012, pp. 114.
    34. 34)
      • 33. Kirovski, D., Malvar, H.S.: ‘Spread-spectrum watermarking of audio signals’, IEEE Trans. Signal Process., 2003, 51, pp. 10201033.
    35. 35)
      • 15. Kraetzer, C., Dittmann, J.: ‘Mel-cepstrum-based steganalysis for VoIP steganography’. Electronic Imaging 2007, San Jose, United States, 2007, pp. 650505650505-12.
    36. 36)
      • 28. Ghasemzadeh, H., Arjmandi, M.K.: ‘Universal audio steganalysis based on calibration and reversed frequency resolution of human auditory system’, IET Signal Process., 2017, 11, (8), pp. 916922.
    37. 37)
      • 1. Ghasemzadeh, H., Khass, M.T., Mehrara, H.: ‘Cipher text only attack on speech time scrambling systems using correction of audio spectrogram’, ISC Int. J. Inf. Sec., 2017, 9, pp. 3347.
    38. 38)
      • 66. Jin, C., Wang, R., Yan, D.: ‘Steganalysis of MP3Stego with low embedding-rate using Markov feature’, Multimedia Tools Appl., 2017, 76, pp. 61436158.
    39. 39)
      • 37. Sharp, T.: ‘An implementation of key-based digital signal steganography’. Information hiding, Pittsburgh, USA, 2001, pp. 1326.
    40. 40)
      • 14. Rekik, S., Selouani, S.-A., Guerchi, D., et al: ‘An autoregressive time delay neural network for speech steganalysis’. 2012 11th Int. Conf. on Information Science, Signal Processing and their Applications (ISSPA), Montreal, Canada, 2012, pp. 5458.
    41. 41)
      • 63. Qiao, M., Sung, A.H., Liu, Q.: ‘Feature mining and intelligent computing for MP3 steganalysis’. Int. Joint Conf. on Bioinformatics, Systems Biology and Intelligent Computing, 2009 (IJCBS'09), Shanghai, China, 2009, pp. 627630.
    42. 42)
      • 25. Zeng, W., Hu, R., Ai, H.: ‘Audio steganalysis of spread spectrum information hiding based on statistical moment and distance metric’, Multimedia Tools Appl., 2011, 55, pp. 525556.
    43. 43)
      • 56. Diqun, Y., Rangding, W., Liguang, Z.: ‘Quantization step parity-based steganography for MP3 audio’, Fundam. Inform., 2009, 97, pp. 114.
    44. 44)
      • 11. Koçal, O.H., Yürüklü, E., Avcibas, I.: ‘Chaotic-type features for speech steganalysis’, IEEE Trans. Inf. Forensics Sec., 2008, 3, pp. 651661.
    45. 45)
      • 69. Jin, C., Wang, R., Yan, D., et al: ‘Steganalysis of UnderMP3Cover’, J. Comput. Inf. Syst., 2012, 8, pp. 1045910468.
    46. 46)
      • 45. Fridrich, J., Goljan, M.: ‘Digital image steganography using stochastic modulation’. Electronic Imaging 2003, Santa Clara, United States, 2003, pp. 191202.
    47. 47)
      • 7. Dittmann, J., Hesse, D.: ‘Network based intrusion detection to detect steganographic communication channels: on the example of audio data’. 2004 IEEE 6th Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 343346.
    48. 48)
      • 54. Achmad, Z.: ‘MP3Stegz’, Ed, 2008.
    49. 49)
      • 3. Simmons, G.J.: ‘The prisoners’ problem and the subliminal channel’. Advances in Cryptology, California, USA, 1984, pp. 5167.
    50. 50)
      • 51. Xie, C., Cheng, Y., Chen, Y.: ‘An active steganalysis approach for echo hiding based on sliding windowed cepstrum’, Signal Process., 2011, 91, pp. 877889.
    51. 51)
      • 26. Avcıbas, I.: ‘Audio steganalysis with content-independent distortion measures’, IEEE Signal Process. Lett., 2006, 13, pp. 9295.
    52. 52)
      • 61. Zaturenskiy, M.: ‘MP3 files as a steganography medium’. Proc. 2nd Annual Conf. on Research in Information Technology, Orlando, USA, 2013, pp. 2328.
    53. 53)
      • 72. Zhu, J., Wang, R., Yan, D.: ‘The sign bits of Huffman codeword-based steganography for AAC audio’. 2010 Int. Conf. on Multimedia Technology (ICMT), Ningbo, China, 2010, pp. 14.
    54. 54)
      • 5. Böhme, R.: ‘Advanced statistical steganalysis’ (Springer Science & Business Media, Springer-Verlag Berlin Heidelberg, 2010).
    55. 55)
      • 48. Zeng, W., Ai, H., Hu, R.: ‘A novel steganalysis algorithm of phase coding in audio signal’. Sixth Int. Conf. on Advanced Language Processing and Web Information Technology, 2007. ALPIT 2007, Luoyang, China, 2007, pp. 261264.
    56. 56)
      • 47. Nugraha, R.M.: ‘Implementation of direct sequence spread spectrum steganography on audio data’. 2011 Int. Conf. on Electrical Engineering and Informatics (ICEEI), Bandung, Indonesia, 2011, pp. 16.
    57. 57)
      • 49. Zeng, W., Ai, H., Hu, R.: ‘An algorithm of echo steganalysis based on power cepstrum and pattern classification’. Int. Conf. on Audio, Language and Image Processing, 2008. ICALIP 2008, Shanghai, China, 2008, pp. 13441348.
    58. 58)
      • 39. Stools: ‘Stools’. Available at http://info.umuc.edu/its/online_lab/ifsm459/s-tools4/.
    59. 59)
      • 17. Wei, Y., Guo, L., Wang, Y., et al: ‘A blind audio steganalysis based on feature fusion’, J. Electron., 2011, 28, pp. 265276.
    60. 60)
      • 21. Ghasemzadeh, H.: ‘A metaheuristic approach for solving jigsaw puzzles’. 2014 Iranian Conf. on Intelligent Systems (ICIS), Bam, Iran, 2014, pp. 16.
    61. 61)
      • 52. Qi, Y.-C., Ye, L., Liu, C.: ‘Wavelet domain audio steganalysis for multiplicative embedding model’. Int. Conf. on Wavelet Analysis and Pattern Recognition, 2009. ICWAPR 2009, Baoding, China, 2009, pp. 429432.
    62. 62)
      • 50. Wang, Y., Wen, H., Jian, Z., et al: ‘Steganalysis on positive and negative echo hiding based on skewness and kurtosis’. 2014 IEEE 9th Conf. on Industrial Electronics and Applications (ICIEA), Hangzhou, China, 2014, pp. 12351238.
    63. 63)
      • 76. Ren, Y., Xiong, Q., Wang, L.: ‘Steganalysis of AAC using calibrated Markov model of adjacent codebook’. 2016 IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, 2016, pp. 21392143.
    64. 64)
      • 32. Bender, W., Gruhl, D., Morimoto, N., et al: ‘Techniques for data hiding’, IBM Syst. J., 1996, 35, pp. 313336.
    65. 65)
      • 23. Geetha, S., Ishwarya, N., Kamaraj, N.: ‘Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm’, Expert Syst. Appl., 2010, 37, pp. 74697482.
    66. 66)
      • 67. Yan, D., Wang, R.: ‘Detection of MP3Stego exploiting recompression calibration-based feature’, Multimedia Tools Appl., 2014, 72, pp. 865878.
    67. 67)
      • 42. Tolba, M.F., Ghonemy, M.-S., Taha, I.-H., et al: ‘High capacity image steganography using wavelet-based fusion’. Ninth Int. Symp. on Computers and Communications, 2004. Proc. ISCC 2004, Alexandria, Egypt, 2004, pp. 430435.
    68. 68)
      • 38. Steganos: ‘Steganos’. Available at http://www.steganos.com.
    69. 69)
      • 65. Jin, C., Wang, R., Yan, D., et al: ‘A novel detection scheme for MP3Stego with low payload’. 2014 IEEE China Summit & Int. Conf. on Signal and Information Processing (ChinaSIP), Xi'an, China, 2014, pp. 602606.
    70. 70)
      • 19. Ghasemzadeh, H., Arjmandi, M.K.: ‘Reversed-Mel cepstrum based audio steganalysis’. 2014 4th Int. eConf. on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 2014, pp. 679684.
    71. 71)
      • 59. Gang, L., Akansu, A.N., Ramkumar, M.: ‘MP3 resistant oblivious steganography’. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Salt Lake City, USA, 2001, pp. 13651368.
    72. 72)
      • 44. S. wave: ‘Stego wave’. Available at http://www.jjtc.com/Steganography/tools.html.
    73. 73)
      • 10. Fu, J.-W., Qi, Y.-C., Yuan, J.-S.: ‘Wavelet domain audio steganalysis based on statistical moments and PCA’. Int. Conf. on Wavelet Analysis and Pattern Recognition, 2007 (ICWAPR'07), Beijing, China, 2007, pp. 16191623.
    74. 74)
      • 31. Cox, I.J., Kilian, J., Leighton, F.T., et al: ‘Secure spread spectrum watermarking for multimedia’, IEEE Trans. Image Process., 1997, 6, pp. 16731687.
    75. 75)
      • 22. Liu, Y., Chiang, K., Corbett, C., et al: ‘A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance’. Information Security, Taipei, Taiwan, 2008, pp. 487501.
    76. 76)
      • 64. Qiao, M., Sung, A.H., Liu, Q.: ‘MP3 audio steganalysis’, Inf. Sci., 2013, 231, pp. 123134.
    77. 77)
      • 30. Lang, A., Dittmann, J.: ‘Profiles for evaluation and their usage in audio wet’. IS&T/SPIE's 18th Annual Symp. on Electronic Imaging, San Jose, USA, 2006.
    78. 78)
      • 71. Zhu, J., Wang, R.-D., Li, J., et al: ‘A huffman coding section-based steganography for AAC audio’, Inf. Technol. J., 2011, 10, pp. 19831988.
    79. 79)
      • 68. Yan, D., Wang, R., Yu, X., et al: ‘Steganalysis for MP3Stego using differential statistics of quantization step’, Digit. Signal Process., 2013, 23, pp. 11811185.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-spr.2016.0651
Loading

Related content

content/journals/10.1049/iet-spr.2016.0651
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading