Filters








58 Hits in 2.2 sec

Audio Features Based Steganography Detection in WAV File

Khin Myo Kyi
2019 Zenodo  
Audio signals containing secret information or not is a security issue addressed in the context of steganalysis.  ...  Experimental result show that the propose method performs well in steganalysis of the audio stegnograms that are produced by using S tools4.  ...  Qingzhong Liu presented a novel stream data mining for audio steganalysis, based on second order derivative of audio streams.  ... 
doi:10.5281/zenodo.3591297 fatcat:dr32pwl6zrerpb7emks6o3taje

Derivative-based audio steganalysis

Qingzhong Liu, Andrew H. Sung, Mengyu Qiao
2011 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)  
the existence of hidden data in digital audio streams.  ...  all categories of signal complexity-especially for audio streams with high signal complexity, which are generally the most challenging for steganalysis-and thereby significantly improves the state of  ...  In this article, the proposed steganalysis method was just tested on WAV uncompressed audio streams. To detect the information-hiding in the compressed domain.  ... 
doi:10.1145/2000486.2000492 fatcat:ebjw6bv4jbcd5iqjx2uufi2ng4

Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram [article]

Yanzhen Ren, Dengkai Liu, Qiaochu Xiong, Jianming Fu, Lina Wang
2019 arXiv   pre-print
In this paper, the spectrogram, which is the visual representation of the spectrum of frequencies of audio signal, is adopted as the input of the feature network to extract the universal features introduced  ...  The method proposed in this paper can be extended to the audio steganalysis of other codec or audio forensics.  ...  Weiqi Luo for sharing the source code to their audio steganalysis scheme in [32] .  ... 
arXiv:1901.06838v2 fatcat:l342b4byejeffmbf7ikdmrns64

"A MultiAlgorithm, High Reliability, Extensible Steganalyzer using Services Oriented Architecture"

Eman Abdelfattah, Ausif Mahmood
2011 International Journal of Computer Applications  
Other contributions of the research done in this paper include, an improved M el-Cepstrum technique for audio wav files feature extraction that results in better accuracy in stego detection (> 99.9%),  ...  Other works in the area of image steganalysis are found in [1, [21] [22] [23] [24] .  ...  In the first method, the statistics of the high-frequency spectrum and the M el-Cepstrum coefficients of the second-order derivative are extracted for audio steganalysis.  ... 
doi:10.5120/3297-4503 fatcat:xpfjl3smjrbrvjg6kzfittlcny

Audio Steganography Using M8MA Technique

2013 Iraqi journal of statistical sciences  
(MP3) ) WAV ( M8MA .  ...  Steganalysis", Communications of the ACM, October 2004.  ...  Stream MP3 Wav . 2 . . . 3 . 4 …………… (1) . - 11 [1] Jayaram P and others," INFORMATION HIDING USING AUDIO STEGANOGRAPHY -A SURVEY", August 2011, College of Engineering, Bangalore, INDIA. www.ivsl.org .  ... 
doi:10.33899/iqjoss.2013.81247 fatcat:utrycgttlzfgtiynw3tpqfuqiu

Audio Steganalysis Based on Lossless Data-Compression Techniques [chapter]

Fatiha Djebbar, Beghdad Ayad
2012 Lecture Notes in Computer Science  
In this paper, we introduce a new blind steganalysis method that can reliably detect modifications in audio signals due to steganography.  ...  Experimental results show that our method performs very well and achieves very good detection rates of stego-audio signals produced by S-tools4, Steghide and Hide4PGP.  ...  Their approach is based on extracting the second order derivative based Markov transition probabilities and high frequency spectrum statistics as features of the audio streams.  ... 
doi:10.1007/978-3-642-34129-8_1 fatcat:svrbc5kzfrgehg7l64jamtzeey

Mel-cepstrum-based steganalysis for VoIP steganography

Christian Kraetzer, Jana Dittmann
2007 Security, Steganography, and Watermarking of Multimedia Contents IX  
In particular we combine known and established audio steganalysis features with the features derived from Melcepstrum based analysis for an investigation on the improvement of the detection performance  ...  Steganography and steganalysis in VoIP applications are important research topics as speech data is an appropriate cover to hide messages or comprehensive documents.  ...  Acknowledgements We wish to thank Claus Vielhauer for suggesting to transfer the Mel-cepstral based signal analysis from biometric speaker verification to the domain of steganalysis and Stefan Kiltz for  ... 
doi:10.1117/12.704040 dblp:conf/sswmc/KraetzerD07 fatcat:pdjei6drkvdh7ho2da6o4y4tp4

Steganography Using Bin-Walk Tool & Its Overview

Pooja Gaikwad, Priyanka Ghumare, Gayatri Chaudhari, Sayali Nikam, Rupali Murtdak, Umakant Mandawkar
2021 International journal of computer science and mobile computing  
Steganography refers to the act of camouflage the secret data within any image, audio, video in order to avoid the detection. The secret data is then extracted at its destination.  ...  the hint behind image, so we have used an Image steganography in one of flag of Necromancer.  ...  Various methods of audio steganography include:  Least Significant Bit Encoding  Parity Encoding  Phase Coding  Spread Spectrum This method hides the data in WAV, AU, and even MP3 sound files IV.  ... 
doi:10.47760/ijcsmc.2021.v10i06.010 fatcat:x7mpe53bava7xghvoz7tuj73cy

Lost audio packets steganography: the first practical evaluation

Wojciech Mazurczyk
2012 Security and Communication Networks  
This paper presents first experimental results for an Internet Protocol (IP) telephony-based steganographic method called lost audio packets steganography (LACK).  ...  The results presented in this paper were obtained on the basis of a functional LACK prototype and show the method's impact on the quality of voice transmission.  ...  audio streams-Real-time Transport Protocol (RTP) [2] streams-which are sent bidirectionally.  ... 
doi:10.1002/sec.502 fatcat:fnr7lhcmgfbavhsgoohpqd2z3q

Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect

Barnali Gupta Banik, Samir Kumar Bandyopadhyay
2018 Security and Communication Networks  
The robustness of the proposed method has been tested against Steganalysis attacks like noise addition, random cropping, resampling, requantization, pitch shifting, and mp3 compression.  ...  The quality of resultant stego audio and retrieved secret image has been measured by various metrics, namely, "peak signal-to-noise ratio"; "correlation coefficient"; "perceptual evaluation of audio quality  ...  Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2018/1781384 fatcat:yyfez7bihnbwjpdwrj5eskonqa

Securing IoT Data Using Steganography: A Practical Implementation Approach

Fatiha Djebbar
2021 Electronics  
The presented scheme is capable of hiding a high payload in audio signals (e.g., speech and music) with a low bit error rate (BER), high undetectability, low complexity, and low perceptibility.  ...  To fully benefit from the Internet of Things "IoT" system's capabilities, the validity and accuracy of transmitted data should be ensured.  ...  They showed that this technique improves the steganalysis results for low-bit-rate encoded speech streams.  ... 
doi:10.3390/electronics10212707 fatcat:nuasyz4fcneihijahuvfc76wbe

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions [article]

Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller
2015 arXiv   pre-print
We present different design approaches for the embedding of hidden channels with micro protocols in digitized audio signals under consideration of different requirements.  ...  Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks.  ...  Conclusions and Future Work We demonstrated the embedding of a micro protocol into an unstructured carrier, namely audio streaming over the network.  ... 
arXiv:1505.07757v1 fatcat:jcrw5xkp2zfptjgfzf4njtvhem

Data Masking: A New Approach for Steganography?

Regunathan Radhakrishnan, Mehdi Kharrazi, Nasir Memon
2005 Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology  
However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis.  ...  In this paper we propose a new form of multimedia steganography called data masking.  ...  303 helping in evaluating datamasked streams with the audio steganalyzers.  ... 
doi:10.1007/s11265-005-4153-1 fatcat:hfsvrafimrc5fifyajqarersze

Real-time Attacks on Audio Steganography

Marcus Nutzinger
2012 Journal of Information Hiding and Multimedia Signal Processing  
In this paper, techniques are presented which aim at the prevention of steganography usage in digital audio data, independent of the underlying algorithm.  ...  The results show that our apprach is different from this attack suite as we propose novel methods not available within StirMark for Audio and our emphasis is the preservation of the audio quality.  ...  Our research project is funded by the KIRAS PL3 program of the Austrian Research Promotion Agency (FFG).  ... 
dblp:journals/jihmsp/Nutzinger12 fatcat:5f5jvv4wevc23cdfcamyu7s7ie

Secure Electronic Medical Records Transmission using NTRU Cryptosystem and LSB in Audio Steganography

Adamu Abdulkadir, Shafii Muhammad Abdulhamid, Oluwafemi Osho, Ismaila Idris, John K. Alhassan
2018 International Conference on Rural and Elderly Health Informatics  
One of the major benefits derived from the internet is the ease of sending information from one system to another, irrespective of the location or distance between the nodes.  ...  Results showed our proposed system is able to securely hide the medical records without causing significant distortions in the original audio.  ...  The least significant (right-most) bit of the audio stream is then replaced with the bit stream of the message.  ... 
dblp:conf/irehi/AbdulkadirAOIA18 fatcat:oedb5eqzmbdtldofgo3skwnjym
« Previous Showing results 1 — 15 out of 58 results