LOCATING INFORMATION-HIDING IN MP3 AUDIO

Mengyu Qiao, Andrew H. Sung, Qingzhong Liu, Bernardete M. Ribeiro

2011

Abstract

Steganography provides a stealthy communication channel for malicious users, which jeopardizes traditional cyber security infrastructure. Due to the good quality and the small storage usage, compressed audio has been widely employed by online audio sharing, audio streaming broadcast, and voice over IP, etc. Several audio steganographic systems have been developed and published on Internet. Traditional blind steganalysis methods detect the existence of information hiding, but neglect the size and the location of hidden data. In this paper, we present a scheme to locate the modified segments in compressed audio streams based on signal analysis in MDCT transform domain. We create reference signals by reversing and repeating quantification process, and compare the statistical differences between source signals and reference signals. Dynamic evolving neural-fuzzy inference systems are applied to predict the number of modified frames. Finally, the frames of audio streams are ranked according to their modification density, and the top ranked frames are selected as candidate information-hiding locations.

References

  1. http://www.msnbc.msn.com/id/38028696/ns/technology_a nd_science-science/
  2. http://www.justice.gov/opa/documents/062810complaint1. pdf
  3. http://www.justice.gov/opa/documents/062810complaint2. pdf
  4. Ru, X., Zhang, H. and Huang, X. (2005). Steganalysis of Audio: Attaching the Steghide. Proc. the Fourth International Conference on Machine Learning and Cybernetics, 3937-3942.
  5. Kraetzer, C. and Dittmann, J. (2008). “Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. Lecture Notes in Computer Science, 4567, 359-377.
  6. Liu, Q., Sung, A., and Qiao, M. (2009a). Temporal Derivative-based Spectrum and Mel-cepstrum Audio Steganalysis. IEEE Trans. on Info. Forensics and Security, 4(3), 359-368.
  7. Liu, Q., Sung, A., and Qiao, M. (2009b). Novel Stream Mining for Audio Steganalysis. Proc. of 17th ACM International Conference on Multimedia, 95-104.
  8. Qiao, M., Sung, A., and Liu, Q. (2009a). Feature Mining and Intelligent Computing for MP3 Steganalysis. Proc. of International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing, 627-630.
  9. Qiao, M., Sung, A., and Liu, Q. (2009b). Steganalysis of MP3Stego. Proc. of 22nd International Joint Conference on Neural Networks, 2566-2571.
  10. Shi, Y., Chen, C., and Chen, W. (2007). A Markov Process Based Approach to Effective Attacking JPEG Steganography. Lecture Notes in Computer Sciences, 437, 249-264.
  11. Kasabov, N. and Song, Q. (2002). DENFIS: Dynamic Evolving Neural-fuzzy Inference System and Its Application for Time-series. IEEE Trans. Fuzzy Systems, 10(2), 144-154.
Download


Paper Citation


in Harvard Style

Qiao M., Sung A., Liu Q. and Ribeiro B. (2011). LOCATING INFORMATION-HIDING IN MP3 AUDIO . In Proceedings of the 3rd International Conference on Agents and Artificial Intelligence - Volume 1: ICAART, ISBN 978-989-8425-40-9, pages 504-507. DOI: 10.5220/0003296205040507


in Bibtex Style

@conference{icaart11,
author={Mengyu Qiao and Andrew H. Sung and Qingzhong Liu and Bernardete M. Ribeiro},
title={LOCATING INFORMATION-HIDING IN MP3 AUDIO},
booktitle={Proceedings of the 3rd International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,},
year={2011},
pages={504-507},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003296205040507},
isbn={978-989-8425-40-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,
TI - LOCATING INFORMATION-HIDING IN MP3 AUDIO
SN - 978-989-8425-40-9
AU - Qiao M.
AU - Sung A.
AU - Liu Q.
AU - Ribeiro B.
PY - 2011
SP - 504
EP - 507
DO - 10.5220/0003296205040507