Discrete-time signal processing (2nd ed.)
Discrete-time signal processing (2nd ed.)
Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 02
Reversible steganographic method using SMVQ approach based on declustering
Information Sciences: an International Journal
Reversible hiding in DCT-based compressed images
Information Sciences: an International Journal
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
A Novel Steganalysis Algorithm of Phase Coding in Audio Signal
ALPIT '07 Proceedings of the Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007)
The upper and lower bounds of the information-hiding capacity of digital images
Information Sciences: an International Journal
High-performance JPEG steganography using complementary embedding strategy
Pattern Recognition
Adaptive embedding techniques for VQ-compressed images
Information Sciences: an International Journal
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Pros and cons of mel-cepstrum based audio steganalysis using SVM classification
IH'07 Proceedings of the 9th international conference on Information hiding
IH'04 Proceedings of the 6th international conference on Information Hiding
How realistic is photorealistic?
IEEE Transactions on Signal Processing
Multimedia data mining: state of the art and challenges
Multimedia Tools and Applications
Hi-index | 0.00 |
In this paper, we propose an audio steganalysis method called reference based Fourier Spectrum Steganalysis. The mean values and the standard deviations of the high frequency spectrum of the second and high order derivatives are extracted from the testing signals and the reference versions. A Support Vector Machine (SVM) is employed to discriminate the unadulterated carrier signals and the steganograms wherein covert messages were embedded. Experimental results show that our method delivers very good performance and holds great promise for effective detection of steganograms produced by Hide4PGP, Invisible Secrets, S-tools4 and Steghide.