2011
DOI: 10.1145/2000486.2000492
|View full text |Cite
|
Sign up to set email alerts
|

Derivative-based audio steganalysis

Abstract: This article presents a second-order derivative-based audio steganalysis. First, Mel-cepstrum coefficients and Markov transition features from the second-order derivative of the audio signal are extracted; a support vector machine is then applied to the features for discovering the existence of hidden data in digital audio streams. Also, the relation between audio signal complexity and steganography detection accuracy, which is an issue relevant to audio steganalysis performance evaluation but so far has not b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(28 citation statements)
references
References 21 publications
0
27
0
Order By: Relevance
“…(1) All the three classification techniques for our improved 2-D M el-Cepstrum implementation outperform the results reported by Liu [37]. NN_Mix which uses a training set obtained by mixing the data sets from the three embedding techniques.…”
Section: Improved Mel-cepstrum Techniquementioning
confidence: 82%
See 3 more Smart Citations
“…(1) All the three classification techniques for our improved 2-D M el-Cepstrum implementation outperform the results reported by Liu [37]. NN_Mix which uses a training set obtained by mixing the data sets from the three embedding techniques.…”
Section: Improved Mel-cepstrum Techniquementioning
confidence: 82%
“…The complexity service is implemented for the files that have an extension of .wav. The choice of two different service implementations of .wav files is motivated by the reported results in [28,37] that as the complexity of the .wav audio files increases, a different technique can be used to obtain better stego detection accuracy results. The M el-Cepstrum service provided by our steganalyzer is based on M el-frequency cepstrum technique in conjunction with second order derivative, which is widely used in image processing to detect isolated points, edges, etc [38].…”
Section: A New Framework For Steganalysismentioning
confidence: 99%
See 2 more Smart Citations
“…For example, when = 48, twice the embedding capacity of CNV-based method may be obtained with a decrease of only about 2% in speech quality and much the same undetectability. Moreover, both the quality of stego speech and the security of defending against statistical steganalysis [17,18] are better than the recent NID-based speech steganography.…”
Section: Introductionmentioning
confidence: 98%