[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1900008.1900118acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

A review of the audio and video steganalysis algorithms

Published: 15 April 2010 Publication History

Abstract

Steganography is the process of hiding information in cover media to obtain the stego media, such that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. The three common forms of cover media used in Steganography are Image, Audio and Video. Only few algorithms are available for audio and video steganalysis and there is no comprehensive survey available for the same. The high-level contribution of this paper is a critical review of the algorithms available for audio and video steganalysis. We observe that each of these two cover media has its own special attributes and steganalysis algorithms developed for one category are not applicable to the other. We anticipate that this paper will serve as a launch pad for investigators interested in audio and/or video steganalysis research.

References

[1]
http://www.internetworldstats.com/stats.htm
[2]
Stinson, D. 2002. Cryptography: Theory and Practice. 2nd Edition. Chapman and Hal/CRC.
[3]
Sullivan, K., Madhow, U., Chandrasekaran, S., and Manjunath, B. S. 2006. Steganalysis for Markov Cover Data with Applications to Images. IEEE Transactions on Information Forensics & Security. 1, 2 (Jun. 2006), 275--287.
[4]
Ru, X.-M., Zhang, H.-J., and Huang, X. Steganalysis of Audio: Attacking the Steghide. In Proceedings of the 4th International Conference on Machine Learning and Cybernetics (Guangzhou, China, August 18--21, 2005). 7, 3937--3942.
[5]
Kancherla, K., and Mukkamala, S. Video Steganalysis using Spatial and Temporal Redundancies. In Proceedings of the International Conference on High Performance Computing and Simulation (Leipzig, Germany, June 21--24, 2009). 200--207.
[6]
Arnold, M., Wolthusen, S., and Schmucker, M. 2003. Techniques and Applications of Digital Watermarking and Content Protection. Artech House.
[7]
Sridevi, R., Damodaram, A., and Narasimham, S. V. L. 2009. Efficient Method of Audio Steganography by Modified LSB Algorithm and Strong Encryption Key with Enhanced Security. Journal of Theoretical and Applied Information Technology. 5, 6 (Jun. 2009), 768--771.
[8]
Bender, W., Gruhl, D., and Morimoto, N. 1996. Techniques for Data Hiding. Systems Journal. 35, 3--4 (1996), 313--336.
[9]
Kirovski, D., and Malvar, H. 2003. Spread-spectrum Watermarking of Audio Signals. IEEE Transactions on Signal Processing. 51, 4 (Apr. 2003), 1020--1033.
[10]
Huang, D., and Yeo, T. Robust and Inaudible Multi-echo Audio Watermarking. In Proceedings of the IEEE Pacific-Rim Conference on Multimedia (Hsinchu, Taiwan, December 16--18, 2002), 615--622.
[11]
Kraetzer, C., and Dittmann, J. 2008. Pros and Cons of Melcepstrum based Audio Steganalysis using SVM Classification. Lecture Notes in Computer Science. 4567 (Jan. 2008), 359--377.
[12]
Zeng, W., Ai, H., and Hu, R. A Novel Steganalysis Algorithm of Phase Coding in Audio Signal. In Proceedings of the 6th International Conference on Advanced Language Processing and Web Information Technology (Luoyang, China, August 22--24, 2007). 242--247.
[13]
Zeng, W., Ai, H., and Hu, R. An Algorithm for Echo Steganalysis based on Power Cepstrum and Pattern Classification. In Proceedings of the International Conference on Information and Automation (Zhangjiajie, China, June 20--23, 2008). 1667--1670.
[14]
Paraskevas, I., and Chilton, E. 2004. Combination of Magnitude and Phase Statistical Features for Audio Classification. Acoustical Research Letters Online. 5, 3 (Jul. 2004), 111--117.
[15]
Johnson, M. K., Lyu, S., and Farid, H. Steganalysis of Recorded Speech. In Proceedings of the Conference on Security, Steganography and Watermarking of Multimedia (San Jose, USA, January 16--20, 2005). SPIE 5681, 664--672.
[16]
Ozer, H., Avcibas, I., Sankur, B., and Memon, N. D. Steganalysis of Audio based on Audio Quality Metrics. In Proceedings of the Conference on Security, Steganography and Watermarking of Multimedia (Santa Clara, USA, January 2003). SPIE 5020, 55--66.
[17]
Rencher, A. C. 2002. Methods of Multivariate Data Analysis. 2nd Edition. John Wiley.
[18]
Pudil, P., Novovicova, J., and Kittler, J. 1994. Floating Search Methods in Feature Selection. Pattern Recognition Letters. 15, 11 (Nov. 1994), 1119--1125.
[19]
Liu, Y., Chiang, K., Corbett, C., Archibald, R., Mukherjee, B., and Ghosal, D. 2008. A Novel Audio Steganalysis based on Higher-Order Statistics of a Distortion Measure with Hausdorff Distance. Lecture Notes in Computer Science. 5222 (Sep. 2008), 487--501.
[20]
Huttenlocher, D. P., Klanderman, G. A., and Rucklidge, W. J. 1993. Comparing Images using the Hausdorff Distance. IEEE Transactions on Pattern Analysis and Machine Intelligence. 19, 9 (Sep. 1993), 850--863.
[21]
Holotyak, T., Fridrich, J., and Voloshynovskiy, S. 2005. Blind Statistical Steganalysis of Additive Steganography using Wavelet Higher Order Statistics. Lecture Notes in Computer Science. 3677 (Sep. 2005), 273--274.
[22]
Avcibas, I. 2006. Audio Steganalysis with Content-independent Distortion Measures. IEEE Signal Processing Letters. 13, 2 (Feb. 2006). 92--95.
[23]
Liu, Q., Sung, A. H., and Qiao, M. Novel Stream Mining for Audio Steganalysis. In Proceedings of the 17th ACM International Conference on Multimedia (Beijing, China, October 19--24, 2009), 95--104.
[24]
Budia, U., Kundur, D., and Zourntos, T. 2006. Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. IEEE Transactions on Information Forensics and Security. 1, 4 (Dec. 2006), 502--516.
[25]
Cox, I., Kilian, J., Leighton, F., and Shamoon, T. 1997. Secure Spread Spectrum Watermarking for Multi-media. IEEE Transactions on Image Processing. 6, 12 (Dec. 1997), 1673--1687.
[26]
Marvel, L. M., Boncelet Jr. C. G., and Retter, C. T. 1999. Spread Spectrum Image Steganography. IEEE Transactions on Image Processing. 8, 8 (Aug. 1999), 1075--1083.
[27]
Jainsky, J. S., Kundur, D., and Halverson, D. R. Towards Digital Video Steganalysis using Asymptotic Memoryless Detection. In Proceedings of the 9th International Workshop on Multimedia and Security (Dallas, USA, September 20--21, 2007). 161--168.
[28]
Lehmann, E. L., and Romano, J. P. 2005. Testing Statistical Hypotheses. 3rd Edition. Springer Texts in Statistics.
[29]
Su, Y., Zhang, C., Wang, L., and Zhang, C. A New Video Steganalysis based on Mode Detection. In Proceedings of the International Conference on Audio, Language and Image Processing (Shanghai, China, July 7--9, 2008). 1507--1510.
[30]
http://www.compression.ru/video/stego_video/index.html
[31]
Pankajakshan, V., and Ho, A. T. S. Improving Video Steganalysis using Temporal Correlation. In Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (Splendor Kaohsiung, Taiwan, November 26--28, 2007). 1, 287--290.
[32]
Wang, Y., Osterman, J., and Zhang, Y.-Q. 2001. Video Processing and Communications. Prentice Hall.
[33]
Zhang, C., Su, Y., and Zhang, C. 2008. Video Steganalysis based on Aliasing Detection. Electronic Letters. 44, 13 (Jun. 2008), 801--803.
[34]
Liu, B., Liu, F., and Wang, P. Inter-frame Correlation based Compression Video Steganalysis. In Proceedings of the Congress on Image and Signal Processing (Sanya, China, May 27--30, 2008), 3, 42--46.

Cited By

View all
  • (2020)Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data TransmissionIEEE Access10.1109/ACCESS.2020.29782978(45477-45495)Online publication date: 2020
  • (2018)Video steganalysis to obstruct criminal activities for digital forensicsInternational Journal of Electronic Security and Digital Forensics10.5555/3292811.329281310:4(338-355)Online publication date: 1-Jan-2018
  • (2016)Spread spectrum audio watermarking based on perceptual characteristic aware extractionIET Signal Processing10.1049/iet-spr.2014.038810:3(266-273)Online publication date: May-2016
  • Show More Cited By

Index Terms

  1. A review of the audio and video steganalysis algorithms

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ACMSE '10: Proceedings of the 48th annual ACM Southeast Conference
    April 2010
    488 pages
    ISBN:9781450300643
    DOI:10.1145/1900008
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 April 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. audio
    2. cover media
    3. information hiding
    4. steganalysis
    5. steganography
    6. video

    Qualifiers

    • Research-article

    Conference

    ACM SE '10
    Sponsor:
    ACM SE '10: ACM Southeast Regional Conference
    April 15 - 17, 2010
    Mississippi, Oxford

    Acceptance Rates

    ACMSE '10 Paper Acceptance Rate 48 of 94 submissions, 51%;
    Overall Acceptance Rate 502 of 1,023 submissions, 49%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data TransmissionIEEE Access10.1109/ACCESS.2020.29782978(45477-45495)Online publication date: 2020
    • (2018)Video steganalysis to obstruct criminal activities for digital forensicsInternational Journal of Electronic Security and Digital Forensics10.5555/3292811.329281310:4(338-355)Online publication date: 1-Jan-2018
    • (2016)Spread spectrum audio watermarking based on perceptual characteristic aware extractionIET Signal Processing10.1049/iet-spr.2014.038810:3(266-273)Online publication date: May-2016
    • (2015)Hiding of compressed bit stream into audio file to enhance the confidentiality and portability of a data transmission system2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)10.1109/ISMSC.2015.7594052(196-201)Online publication date: May-2015
    • (2012)Block Level Video Steganalysis SchemeProceedings of the 2012 11th International Conference on Machine Learning and Applications - Volume 0110.1109/ICMLA.2012.121(651-654)Online publication date: 12-Dec-2012
    • (2012)Digital audio watermarking; techniques and applications2012 International Conference on Computer and Communication Engineering (ICCCE)10.1109/ICCCE.2012.6271333(830-835)Online publication date: Jul-2012
    • (2011)Forensics Investigations of Multimedia DataProceedings of the 2011 Sixth International Conference on IT Security Incident Management and IT Forensics10.1109/IMF.2011.14(48-61)Online publication date: 10-May-2011

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media