Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis

Journal of Zhejiang University SCIENCE C - Tập 13 - Trang 624-634 - 2012
Song-bin Li1,2, Huai-zhou Tao1,2, Yong-feng Huang1,2
1Department of Electronic Engineering, Tsinghua University, Beijing, China
2Tsinghua National Laboratory for Information Science and Technology, Beijing, China

Tóm tắt

This paper presents a method to detect the quantization index modulation (QIM) steganography in G.723.1 bit stream. We show that the distribution of each quantization index (codeword) in the quantization index sequence has unbalanced and correlated characteristics. We present the designs of statistical models to extract the quantitative feature vectors of these characteristics. Combining the extracted vectors with the support vector machine, we build the classifier for detecting the QIM steganography in G.723.1 bit stream. The experiment shows that the method has far better performance than the existing blind detection method which extracts the feature vector in an uncompressed domain. The recall and precision of our method are all more than 90% even for a compressed bit stream duration as low as 3.6 s.

Tài liệu tham khảo

Avcibas, I., 2006. Audio steganalysis with content-independent distortion measure. IEEE Signal Process. Lett., 13(2):92–95. [doi:10.1109/LSP.2005.862152] Chang, C.C., Lin, C.J., 2001. LIBSVM: a Library for Support Vector Machines. Available from http://www.csie.ntu.edu.tw/~cjlin/libsvm [Accessed on May 9, 2011]. Chen, B., Wornell, G.W., 2001. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory, 47(4):1423–1443. [doi:10.1109/18.923725] Hafiz, M., 2008. Steganalysis of QIM Steganography Using Irregularity Measure. Proc. 10th ACM Workshop on Multimedia and Security, p.149–158. [doi:10.1145/1411328.1411355] Hafiz, M., 2010. Statistical Modeling of Footprints of QIM Steganography. IEEE Int. Conf. on Multi-media and Expo, p.1487–1492. [doi:10.1109/ICME.2010.5582954] Hafiz, M., Subbalakshmi, K.P., Chandramouli, R., 2008. Nonparametric steganalysis of QIM data hiding using approximate entropy. SPIE, 6819:681914. [doi:10.1117/12.767313] Huang, Y., Xiao, B., 2008. Implementation of Covert Communication Based on Steganography. Proc. 4th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, p.1512–1515. [doi:10.1109/IIH-MSP.2008.174] Huang, Y., Tang, S., Zhang, Y., 2011a. Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. IET Commun., 5(7): 929–936. [doi:10.1049/iet-com.2010.0348] Huang, Y., Tang, S., Bao, C., Yip, Y.J., 2011b. Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Inf. Secur., 5(1):26–32. [doi:10.1049/iet-ifs.2010.0032] ITU-T, 1996a. ITU-T Recommendation G.723.1: Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s. ITU-T, Geneva. ITU-T, 1996b. ITU-T Recommendation G.723.1-Annex A: Silence Compression Scheme for G.723.1. ITU-T, Geneva. Krätzer, C., Dittmann, J., Vogel, T., Hillert, R., 2006. Design and Evaluation of Steganography for Voice-Over-IP. Proc. IEEE Int. Symp. on Circuits and Systems, p.2397–2400. [doi:10.1109/ISCAS.2006.1693105] Li, X., Yu, H.H., 2000. Transparent and Robust Audio Data Hiding in Cepstrum Domain. IEEE Int. Conf. on Multi-media and Expo, p.397–400. [doi:10.1109/ICME.2000.869624] Liu, Q., Sung, A.H., Qiao, M., 2009. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forens. Secur., 4(3):359–368. [doi:10.1109/TIFS.2009.2024718] Lu, Z.M., Yan, B., Sun, S.H., 2005. Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst., E88-D(2):330–334. [doi:10.1093/ietisy/E88-D.2.330] Mazurczyk, W., Szczypiorski, K., 2008. Steganography of VoIP Streams. Proc. 3rd Int. Symp. on Information Security, p.1001–1018. [doi:10.1007/978-3-540-88873-4-6] Tan, L., Wu, B., Liu, Z., Zhou, M., 2010. An audio information hiding algorithm with high-capacity which based on chaotic and wavelet transform. Acta Electron. Sin., 38(8): 1812–1824 (in Chinese). Thomas, Q.F., 2002. Discrete-Time Speech Signal Processing: Principles and Practice. Prentice Hall PTR, NJ, USA, p.45–60. Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D., 2009. An Adaptive Steganography Scheme for Voice Over IP. Proc. IEEE Int. Symp. on Circuits and Systems, p.2921–2925. [doi:10.1109/ISCAS.2009.5118414] Wang, C.T., Chen, T.S., Chao, W.H., 2004. A New Audio Watermarking Based on Modified Discrete Cosine Transform of MPEG/Audio Layer III. Proc. IEEE Int. Conf. on Networking, Sensing and Control, p.265–277. [doi:10.1109/ICNSC.2004.1297081] Wang, F.H., Jain, L.C., Pan, J.S., 2007. VQ-based watermarking scheme with genetic codebook partition. J. Network Comput. Appl., 30(1):4–23. [doi:10.1016/j.jnca.2005.08.002] Wu, Q., Li, W., Yu, X.Y., 2009. Revisit Steganalysis on QIM-Based Data Hiding. Proc. 5th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, p.929–932. [doi:10.1109/IIH-MSP.2009.316] Wu, S., Huang, J., Huang, D., 2005. Efficiently self-synchronized audio watermarking for assured audio data transmission. IEEE Trans. Broadcast., 51(1):69–76. [doi:10.1109/TBC.2004.838265] Xiao, B., Huang, Y., Tang, S., 2008. An Approach to Information Hiding in Low Bit-Rate Speech Stream. Proc. IEEE Global Communications Conf., p.1940–1944. [doi:10.1109/GLOCOM.2008.ECP.375]