Speech steganalysis based on the delay vector variance method

Speech steganalysis based on the delay vector variance method

This study investigates the use of delay vector variance-based features for steganalysis of recorded speech. Because data hidden within a speech signal distort the properties of the original speech signal, we designed a new audio steganalyzer that utilizes delay vector variance (DVV) features based on surrogate data in order to detect the existence of hidden data. The proposed DVV features are evaluated individually and together with other chaotic-type features. The performance of the proposed steganalyzer method is also discussed with a focus on the effect of different hiding capacities. The results of the study show that using the proposed DVV features alone or in cooperation with other features helps in designing a distinctive audio steganalyzer, as cooperation with other chaotic-type features provides higher performances for stego and cover objects.

___

  • [1] Westfeld AP. Detecting low embedding rates. In: IH 2002 International Workshop; 7–9 October 2002; Noordwijkerhout, the Netherlands. Berlin, Germany: Springer-Verlag, 2003. pp. 324-339.
  • [2] Westfeld AP, Pfitzmann A. Attacks on steganographic systems. In: IH 1999 International Workshop; 29 September– 1 October 1999; Dresden, Germany. Heidelberg, Germany: Springer-Verlag, 1999. pp. 61-66.
  • [3] Johnson MK, Lyu S, Farid H. Steganalysis of recorded speech. In: SPIE 2005 Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents; 16–20 January 2005; San Jose, CA, USA. Bellingham, WA, USA: SPIE. pp. 664-672.
  • [4] Altun O, Sharma G, C¸ elik M, Sterling M, Titlebaum E, Bocko M. Morphological steganalysis of audio signals and the principle of diminishing marginal distortions. In: IEEE 2005 International Conference on Acoustics, Speech, and Signal Processing; 18–23 March 2005; Philadelphia, PA, USA. New York, NY, USA: IEEE. pp. 21-24.
  • [5] Ozer H, Avcıba¸s ¨ ˙I, Sankur B, Memon N. Steganalysis of audio based on audio quality metrics. In: SPIE 2003 Conference on Security and Watermarking of Multimedia Contents; 20 January 2003; Santa Clara, CA, USA. Bellingham, WA, USA: SPIE. pp. 55-66.
  • [6] Djebbar F, Ayad B, Meraim KA, Hamam H. Comparative study of digital audio steganography techniques. EURASIP J Audio SPEE 2012; 25: 1-16.
  • [7] Meghanathan N, Nayak L. Steganalysis algorithms for detecting the hidden information in image, audio and video cover media. International Journal of Network Security & Its Application 2010; 2: 43-55.
  • [8] Ko¸cal OH, Y¨ur¨ukl¨u E, Avcıba¸s ˙I. Chaotic-type features for speech steganalysis. IEEE T Inf Foren Sec 2008; 3: 651-661.
  • [9] Ko¸cal OH, Y¨ur¨ukl¨u E, Dilavero˘glu E. A new approach for speech audio steganalysis using delay vector variance method. J Fac Eng Arch 2014; 19: 27-36.
  • [10] Kokkinos I, Maragos P. Nonlinear speech analysis using models for chaotic systems. IEEE T Speech Audi P 2005; 13: 1098-1109.
  • [11] Banbrook M, McLaughlin S. Speech characterization and synthesis by nonlinear methods. IEEE T Speech Audi P 1999; 7: 1-17.
  • [12] Theiler J, Eubank S, Longtin A, Galdrikian B, Farmer JD. Testing for nonlinearity in time series: the method of surrogate data. Physica D 1992; 58: 77-94.
  • [13] Schreiber T, Schmitz A. Discrimination power of measures for nonlinearity in a time series. Phys Rev E 1997; 55: 5443-5447.
  • [14] Gautama T, Mandic DP, Van Hulle MM. Indications of nonlinear structures in brain electrical activity. Phys Rev E 2003; 67: 046204.1-046204.5.
  • [15] Gautama T, Mandic DP, Van Hulle MM. A novel method for determining the nature of time series. IEEE T Bio-Med Eng 2004; 51: 728-736.
  • [16] Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding. IBM Syst J 1996; 35: 313-336.
  • [17] Fridrich J, Goljan M. Digital image steganography using stochastic modulation. In: SPIE 2003 Conference on Security and Watermarking of Multimedia Contents; 20 January 2003; Santa Clara, CA, USA. Bellingham, WA, USA: SPIE. pp. 191-202.
  • [18] Simmons GJ. Prisoners’ problem and the subliminal channel. In: Chaum D, editor. Advances in Cryptology. New York, NY, USA: Plenum Press, 1984. pp. 51-67.
  • [19] Cox IJ, Kilian J, Leighton FT, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE T Image Process 1997; 6: 1673-1687.
  • [20] Kennel MB, Abarbanel HDI. False neighbors and false strands: a reliable minimum embedding dimension algorithm. Phys Rev E 2002; 66: 026209.
  • [21] Hilborn R. Chaos and Nonlinear Dynamics. 2nd ed. Oxford, UK: Oxford University Press, 2000.
  • [22] Hegger R, Kantz H, Schreiber T. Practical implementation of nonlinear time series methods: the TISEAN package. Chaos 1999; 9: 413-435.
  • [23] Pudil P, Novovicova J, Kittler J. Floating search methods in feature selection. Pattern Recogn Lett 1994; 15: 1119-1125.
  • [24] Geetha S, Ishwarya N, Kamaraj N. Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm. Expert Syst Appl 2010; 37: 7469-7482.
  • [25] Avcıba¸s ˙I. Audio steganalysis with content-independent distortion measures. IEEE Signal Proc Let 2006; 13: 92-95.
  • [26] Ozer H, Sankur B, Memon N, Avcıba¸s ¨ ˙I. Detection of audio covert channels using statistical footprints of hidden messages. Digit Signal Process 2006; 16: 389-401.
  • [27] Qiao M, Sung AH, Liu Q. MP3 audio steganalysis. Inform Sciences 2013; 31: 123-134.
  • [28] Yu X, Wang R, Yan D, Zhu J. MP3 Audio steganalysis using calibrated side information feature. J Comput Inf Syst 2012; 8: 4241-4248.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: 6
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

Stability criterion for uncertain 2-D discrete systems with interval-like time-varying delay employing quantization/overflow nonlinearities

Haranath KAR, Siva Kumar TADEPALLI, Venkata Krishna Rao KANDANVLI

A multiobjective tuning approach of power system stabilizers using particle swarm optimization

Djamel BOUKHETALA, Hilal LABDELAOUI, Far`es BOUDJEMA

Performance comparison of adaptive digital predistortion algorithms using adaptation time for mobile WiMAX power amplifier applications

Ji-Yeon KIM, Jong-Heon KIM

Adaptive speed observer with disturbance torque compensation for sensorless induction motor drives using RT-Lab

Mohan KRISHNA, Febin DAYA

A novel voltage control strategy in collaboration with information technology domains through the holonic architecture

Ahad KAZEMI, Javad ANSARI, Mehdi DOZEIN GHAZAVI

A new CMOS logarithmic current generator

Munir ABSI AL, Karama TAMIMI AL

High photoresponse from solution processed conventional and inverted ultraviolet photodetectors

Canan VARLIKLI, Görkem MEMİŞOĞLU

Open source software adoption evaluation through feature level sentiment analysis using Twitter data

Muhammad Touseef IKRAM, Naveed Anwer BUTT, Muhammad Tanvir AFZAL

Behavior of metamaterial-based microwave components for sensing and heating of nanoliter-scale volumes

Muhammed Said BOYBAY

Using magnetic field analysis to evaluate the suitability of a magnetic suspension system for lightweight vehicles

Hazril Md. ISA, Noor Hafizah AMER, Wan Nor Liza MAHADI WAN, Rahizar RAMLI