An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
A Novel Steganalysis Algorithm of Phase Coding in Audio Signal
ALPIT '07 Proceedings of the Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007)
ISC '08 Proceedings of the 11th international conference on Information Security
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis
IEEE Transactions on Information Forensics and Security
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Blind statistical steganalysis of additive steganography using wavelet higher order statistics
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
IH'04 Proceedings of the 6th international conference on Information Hiding
Spread-spectrum watermarking of audio signals
IEEE Transactions on Signal Processing
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
A method to detect JPEG-based double compression
ISNN'11 Proceedings of the 8th international conference on Advances in neural networks - Volume Part II
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
A framework for avoiding steganography usage over HTTP
Journal of Network and Computer Applications
Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images
Proceedings of the Twelfth International Workshop on Multimedia Data Mining
Information Sciences: an International Journal
Optimizing acoustic features for source cell-phone recognition using speech signals
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
This article presents a second-order derivative-based audio steganalysis. First, Mel-cepstrum coefficients and Markov transition features from the second-order derivative of the audio signal are extracted; a support vector machine is then applied to the features for discovering the existence of hidden data in digital audio streams. Also, the relation between audio signal complexity and steganography detection accuracy, which is an issue relevant to audio steganalysis performance evaluation but so far has not been explored, is analyzed experimentally. Results demonstrate that, in comparison with a recently proposed signal stream-based Mel-cepstrum method, the second-order derivative-based audio steganalysis method gains a considerable advantage under all categories of signal complexity--especially for audio streams with high signal complexity, which are generally the most challenging for steganalysis-and thereby significantly improves the state of the art in audio steganalysis.