Mel-cepstrum based steganalysis for VoIP-steganography

被引:28
作者
Kraetzer, Christian [1 ]
Dittmann, Jana [1 ]
机构
[1] Univ Magdeburg, Dept Comp Sci, Res Grp Multimedia & Secur, Magdeburg, Germany
来源
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX | 2007年 / 6505卷
关键词
steganography; speech steganalysis; audio steganalysis;
D O I
10.1117/12.704040
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
Steganography and steganalysis in VoIP applications are important, research topics as speech data is an appropriate cover to hide messages or comprehensive documents. In our paper we introduce a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages. In particular we combine known and established audio steganalysis features with the features derived from Mel-cepstrum based analysis for an investigation on the improvement of the detection performance. Our main focus considers the application environment of VoIP-steganography scenarios. The evaluation of the enhanced feature space is performed for classical steganographic as well as for watermarking algorithms. With this strategy we show how general forensic approaches can detect information hiding techniques in the field of hidden communication as well as for DRM applications. For the later the detection of the presence of a potential watermark in a specific feature space can lead to new attacks or to a better design of the watermarking pattern. Following that the usefulness of Mel-cepstrum domain based features for detection is discussed in detail.
引用
收藏
页数:12
相关论文
共 25 条
[1]  
A Reynolds D., 1992, GAUSSIAN MIXTURE MOD
[2]   UNIFIED APPROACH TO SHORT-TIME FOURIER-ANALYSIS AND SYNTHESIS [J].
ALLEN, JB ;
RABINER, LR .
PROCEEDINGS OF THE IEEE, 1977, 65 (11) :1558-1564
[3]   Audio steganalysis with content-independent distortion measures [J].
Avcibas, I .
IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (02) :92-95
[4]  
AVICBAS I, 2005, EURASIP J APPL SIG P, P2749
[5]  
Bogert B. P., 1963, P S TIM SER AN NEW Y
[6]  
CLEIK M, 2004, P SPIE SEC WAT MULT, V6
[7]   Steganography and steganalysis in voice over IP scenarios - Operational aspects and first experiences with a new steganalysis tool set [J].
Dittmann, J ;
Hesse, D ;
Hillert, R .
Security, Steganography, and Watermarking of Multimedia Contents VII, 2005, 5681 :607-618
[8]  
DITTMANN J, 2004, P IEEE 6 WORKSH MULT
[9]  
Fastl H, 1999, PSYCHOACOUSTICS FACT
[10]  
Fridrich J, 2004, LECT NOTES COMPUT SC, V3200, P67