[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2523514.2523561acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
extended-abstract

Visual steganalysis of LSB-encoded audio data based on frequency domain characteristics

Published: 26 November 2013 Publication History

Abstract

Steganography is an art and science of information hiding. Text, audio and image files are usually used as cover data. Then, a secret message is embedded into these cover data that no one knows about it except sender and receiver. Mostly used methods for audio steganography are based on Least Significant Bit (LSB) method and its derivatives in the literature. Steganalysis is a methodology of detecting messages hidden using steganography. In this paper, a visual steganalysis method has been proposed. Secret text messages can be detected by using frequency domain characteristics of stego audio data which contain text messages. Experimental results show that if stego object contains text messages and it is encoded by LSB or its varieties, some remarkable changes can be observed in frequency domain characteristics and its spectrogram. Thanks to exploring these frequency domain characteristics of stego objects, steganalysis (stego text detection) on audio data can be visually realized.

References

[1]
Salamon, D. 2003. Data privacy and security, encryption and information hiding, Springer.
[2]
Kessler, G. C. 2004. An overview of steganography for the computer forensics examiner, Forensic Science Communications. 6, 3 (July 2004).
[3]
Shanableh, T. 2012. Data hiding in mpeg video files using multivariate regression and flexible macroblock ordering, IEEE Transactions on Information Forensics and Security. 7, 455--464.
[4]
Hong, W., and Chen, T. S. 2012. A novel data embedding method using adaptive pixel pair matching, IEEE Transactions on Information Forensics and Security, 7, 176--184.
[5]
Yalman, Y., Akar, F., and Erturk, I. 2010. An image interpolation based reversible data hiding method using r-weighted coding, In IEEE International Conference on Computational Science and Engineering (Hong Kong, December 2010), 346--350.
[6]
Bender, B., Gruhl, D., Morimoto, N., and Lu, A. 1996. Techniques for data hiding. IBM Systems Journal. 35, 313--336.
[7]
Yalman, Y. 2008. A hidden data transfer system implementation within digital voice for wireless communications, Journal of Polytechnic. 11, 4, 319--327.
[8]
Akar, F., Yalman, Y., and Varol, H. S. (2012) Data Hiding in Digital Images Using A Partial Optimization Technique Based on Classical LSB Method. Turkish Journal of Electrical Engineering & Computer Sciences. DOI=10.3906/elk-1205-58.
[9]
Fillatre, L. 2012. Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Transactions on Signal Processing. 60, 2 (Feb. 2012), 556--569.
[10]
Avcibas, I., Memon N., and Sankur, B. 2003. Steganalysis using image quality metrics. IEEE Transactions on Image Processing. 12, 2 (Feb. 2003), 221--229.
[11]
Hernandez-Chamorro, A. Espejel-Trujillo, A. Lopez-Hernandez, J. Nakano-Miyatake, M., and Perez-Meana, H. 2009. A methodology of steganalysis for images, Electrical, Communications, and Computers, In International Conference on CONIELECOMP 2009, 102--106.
[12]
Divya, S. S., and Reddy, M. R. M. 2012. Hiding text in audio using multiple LSB steganography and provide security using cryptography. International Journal Of Scientific & Technology Research. 1, 6 (July 2012), 68--70.
[13]
Wang, C. and Quincy, W. 2007. Information hiding in real-time VoIP streams, In Ninth IEEE Symposium on Multimedia, 255--262.
[14]
Jayaram, P., Ranganatha, H., R, and Anupama, H., S. 2011. Information hiding using audio steganography -- A survey. In The International Journal of Multimedia & Its Applications (IJMA). 3, 3 (August 2011), 86--96.

Index Terms

  1. Visual steganalysis of LSB-encoded audio data based on frequency domain characteristics

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
      November 2013
      483 pages
      ISBN:9781450324984
      DOI:10.1145/2523514
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      • Macquarie U., Austarlia
      • MNIT: Malaviya National Institute of Technology
      • Aksaray Univ.: Aksaray University
      • SFedU: Southern Federal University

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 November 2013

      Check for updates

      Author Tags

      1. audio steganography
      2. data hiding
      3. information security
      4. steganalysis

      Qualifiers

      • Extended-abstract

      Conference

      SIN '13
      Sponsor:
      • MNIT
      • Aksaray Univ.
      • SFedU

      Acceptance Rates

      Overall Acceptance Rate 102 of 289 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 135
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Jan 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media