Speech steganalysis based on the delay vector variance method
Speech steganalysis based on the delay vector variance method
This study investigates the use of delay vector variance-based features for steganalysis of recorded speech. Because data hidden within a speech signal distort the properties of the original speech signal, we designed a new audio steganalyzer that utilizes delay vector variance (DVV) features based on surrogate data in order to detect the existence of hidden data. The proposed DVV features are evaluated individually and together with other chaotic-type features. The performance of the proposed steganalyzer method is also discussed with a focus on the effect of different hiding capacities. The results of the study show that using the proposed DVV features alone or in cooperation with other features helps in designing a distinctive audio steganalyzer, as cooperation with other chaotic-type features provides higher performances for stego and cover objects.
___
- [1] Westfeld AP. Detecting low embedding rates. In: IH 2002 International Workshop; 79 October 2002; Noordwijkerhout, the Netherlands. Berlin, Germany: Springer-Verlag, 2003. pp. 324-339.
- [2] Westfeld AP, Pfitzmann A. Attacks on steganographic systems. In: IH 1999 International Workshop; 29 September 1 October 1999; Dresden, Germany. Heidelberg, Germany: Springer-Verlag, 1999. pp. 61-66.
- [3] Johnson MK, Lyu S, Farid H. Steganalysis of recorded speech. In: SPIE 2005 Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents; 1620 January 2005; San Jose, CA, USA. Bellingham, WA, USA: SPIE. pp. 664-672.
- [4] Altun O, Sharma G, C¸ elik M, Sterling M, Titlebaum E, Bocko M. Morphological steganalysis of audio signals and the principle of diminishing marginal distortions. In: IEEE 2005 International Conference on Acoustics, Speech, and Signal Processing; 1823 March 2005; Philadelphia, PA, USA. New York, NY, USA: IEEE. pp. 21-24.
- [5] Ozer H, Avcıba¸s ¨ ˙I, Sankur B, Memon N. Steganalysis of audio based on audio quality metrics. In: SPIE 2003 Conference on Security and Watermarking of Multimedia Contents; 20 January 2003; Santa Clara, CA, USA. Bellingham, WA, USA: SPIE. pp. 55-66.
- [6] Djebbar F, Ayad B, Meraim KA, Hamam H. Comparative study of digital audio steganography techniques. EURASIP J Audio SPEE 2012; 25: 1-16.
- [7] Meghanathan N, Nayak L. Steganalysis algorithms for detecting the hidden information in image, audio and video cover media. International Journal of Network Security & Its Application 2010; 2: 43-55.
- [8] Ko¸cal OH, Y¨ur¨ukl¨u E, Avcıba¸s ˙I. Chaotic-type features for speech steganalysis. IEEE T Inf Foren Sec 2008; 3: 651-661.
- [9] Ko¸cal OH, Y¨ur¨ukl¨u E, Dilavero˘glu E. A new approach for speech audio steganalysis using delay vector variance method. J Fac Eng Arch 2014; 19: 27-36.
- [10] Kokkinos I, Maragos P. Nonlinear speech analysis using models for chaotic systems. IEEE T Speech Audi P 2005; 13: 1098-1109.
- [11] Banbrook M, McLaughlin S. Speech characterization and synthesis by nonlinear methods. IEEE T Speech Audi P 1999; 7: 1-17.
- [12] Theiler J, Eubank S, Longtin A, Galdrikian B, Farmer JD. Testing for nonlinearity in time series: the method of surrogate data. Physica D 1992; 58: 77-94.
- [13] Schreiber T, Schmitz A. Discrimination power of measures for nonlinearity in a time series. Phys Rev E 1997; 55: 5443-5447.
- [14] Gautama T, Mandic DP, Van Hulle MM. Indications of nonlinear structures in brain electrical activity. Phys Rev E 2003; 67: 046204.1-046204.5.
- [15] Gautama T, Mandic DP, Van Hulle MM. A novel method for determining the nature of time series. IEEE T Bio-Med Eng 2004; 51: 728-736.
- [16] Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding. IBM Syst J 1996; 35: 313-336.
- [17] Fridrich J, Goljan M. Digital image steganography using stochastic modulation. In: SPIE 2003 Conference on Security and Watermarking of Multimedia Contents; 20 January 2003; Santa Clara, CA, USA. Bellingham, WA, USA: SPIE. pp. 191-202.
- [18] Simmons GJ. Prisoners problem and the subliminal channel. In: Chaum D, editor. Advances in Cryptology. New York, NY, USA: Plenum Press, 1984. pp. 51-67.
- [19] Cox IJ, Kilian J, Leighton FT, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE T Image Process 1997; 6: 1673-1687.
- [20] Kennel MB, Abarbanel HDI. False neighbors and false strands: a reliable minimum embedding dimension algorithm. Phys Rev E 2002; 66: 026209.
- [21] Hilborn R. Chaos and Nonlinear Dynamics. 2nd ed. Oxford, UK: Oxford University Press, 2000.
- [22] Hegger R, Kantz H, Schreiber T. Practical implementation of nonlinear time series methods: the TISEAN package. Chaos 1999; 9: 413-435.
- [23] Pudil P, Novovicova J, Kittler J. Floating search methods in feature selection. Pattern Recogn Lett 1994; 15: 1119-1125.
- [24] Geetha S, Ishwarya N, Kamaraj N. Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm. Expert Syst Appl 2010; 37: 7469-7482.
- [25] Avcıba¸s ˙I. Audio steganalysis with content-independent distortion measures. IEEE Signal Proc Let 2006; 13: 92-95.
- [26] Ozer H, Sankur B, Memon N, Avcıba¸s ¨ ˙I. Detection of audio covert channels using statistical footprints of hidden messages. Digit Signal Process 2006; 16: 389-401.
- [27] Qiao M, Sung AH, Liu Q. MP3 audio steganalysis. Inform Sciences 2013; 31: 123-134.
- [28] Yu X, Wang R, Yan D, Zhu J. MP3 Audio steganalysis using calibrated side information feature. J Comput Inf Syst 2012; 8: 4241-4248.