Ten lectures on wavelets
Discrete-time signal processing (2nd ed.)
Discrete-time signal processing (2nd ed.)
An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 02
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
A Novel Steganalysis Algorithm of Phase Coding in Audio Signal
ALPIT '07 Proceedings of the Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007)
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Pros and cons of mel-cepstrum based audio steganalysis using SVM classification
IH'07 Proceedings of the 9th international conference on Information hiding
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
IH'04 Proceedings of the 6th international conference on Information Hiding
HMM-Based audio keyword generation
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
How realistic is photorealistic?
IEEE Transactions on Signal Processing
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Revealing real quality of double compressed MP3 audio
Proceedings of the international conference on Multimedia
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Evaluation of a resource allocating network with long term memory using GPU
ICANNGA'11 Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II
Derivative-based audio steganalysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Multimedia Tools and Applications
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Highly transparent steganography model of speech signals using Efficient Wavelet Masking
Expert Systems with Applications: An International Journal
Audio steganalysis based on lossless data-compression techniques
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Information Sciences: an International Journal
Optimizing acoustic features for source cell-phone recognition using speech signals
Proceedings of the first ACM workshop on Information hiding and multimedia security
Steganalysis for MP3Stego using differential statistics of quantization step
Digital Signal Processing
Hi-index | 0.00 |
To improve a recently developed mel-cepstrum audio steganalysis method, we present in this paper a method based on Fourier spectrum statistics and mel-cepstrum coefficients, derived from the second-order derivative of the audio signal. Specifically, the statistics of the high-frequency spectrum and the melcepstrum coefficients of the second-order derivative are extracted for use in detecting audio steganography. We also design a wavelet-based spectrum and mel-cepstrum audio steganalysis. By applying support vector machines to these features, unadulterated carrier signals (without hidden data) and the steganograms (carrying covert data) are successfully discriminated. Experimental results show that proposed derivative-based and wavelet-based approaches remarkably improve the detection accuracy. Between the two new methods, the derivative-based approach generally delivers a better performance.