Steganalysis of audio: attacking the Steghide

Slides:



Advertisements
Similar presentations
An Introduction of Support Vector Machine
Advertisements

1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Filter implementation of the Haar wavelet Multiresolution approximation in general Filter implementation of DWT Applications - Compression The Story of.
Overview What : Stroke type Transformation: Timbre Rhythm When: Stroke timing Resynthesis.
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack 42 nd Hawaii International Conference on System Sciences, Electrical.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
A Robust Pedestrian Detection Approach Based on Shapelet Feature and Haar Detector Ensembles Wentao Yao, Zhidong Deng TSINGHUA SCIENCE AND TECHNOLOGY ISSNl.
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Hanlin Hu and Xiao Zhang.
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
Fifth International Conference on Information
Page 0 of 8 Time Series Classification – phoneme recognition in reconstructed phase space Sanjay Patil Intelligent Electronics Systems Human and Systems.
Speech Enhancement Based on a Combination of Spectral Subtraction and MMSE Log-STSA Estimator in Wavelet Domain LATSI laboratory, Department of Electronic,
Wavelet Transform A very brief look.
1 How Realistic is Photorealistic?. 2 Yaniv Lefel Hagay Pollak Based on the work of - Siwei Lyu and Hany Farid.
2001/07/18Chin-Kai Wu, CS, NTHU1 A Voicing-Driven Packet Loss Recovery Algorithm for Analysis- by-Synthesis Predictive Speech Coders over Internet Jhing-Fa.
1 Music Classification Using SVM Ming-jen Wang Chia-Jiu Wang.
DIGITAL SIGNAL PROCESSING IN ANALYSIS OF BIOMEDICAL IMAGES Prof. Aleš Procházka Institute of Chemical Technology in Prague Department of Computing and.
Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG Video Steganography with Perturbed Motion Estimation.
Steganography By: Joe Jupin Supervised by: Dr. Longin Jan Latecki.
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
Air Force Institute of Technology I n t e g r i t y - S e r v i c e - E x c e l l e n c e Educating the World’s Best Air Force Capt Jacob T. Jackson Gregg.
Ryan Irwin Intelligent Electronics Systems Human and Systems Engineering Center for Advanced Vehicular Systems URL:
Project 1 : Eigen-Faces Applied to Speech Style Classification Brad Keserich, Senior, Computer Engineering College of Engineering and Applied Science;
Secure Steganography in Audio using Inactive Frames of VoIP Streams
1 An Efficient Classification Approach Based on Grid Code Transformation and Mask-Matching Method Presenter: Yo-Ping Huang Tatung University.
Presented by Tienwei Tsai July, 2005
CS654: Digital Image Analysis Lecture 15: Image Transforms with Real Basis Functions.
Jacob Zurasky ECE5526 – Spring 2011
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Speaker independent Digit Recognition System Suma Swamy Research Scholar Anna University, Chennai 10/22/2015 9:10 PM 1.
Overview of Part I, CMSC5707 Advanced Topics in Artificial Intelligence KH Wong (6 weeks) Audio signal processing – Signals in time & frequency domains.
ICASSP Speech Discrimination Based on Multiscale Spectro–Temporal Modulations Nima Mesgarani, Shihab Shamma, University of Maryland Malcolm Slaney.
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Mel-Cepstrum Based Steganalysis for VoIP-Steganography Christian Kraetzer and Jana Dittmann Electronic Imaging International Society for Optics and.
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines Siwei Lyu and Hany Farid Department of Computer Science, Dartmouth.
DCT.
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
Lori Mann Bruce and Abhinav Mathur
Using Feed Forward NN for EEG Signal Classification Amin Fazel April 2006 Department of Computer Science and Electrical Engineering University of Missouri.
Singer similarity / identification Francois Thibault MUMT 614B McGill University.
SVM based Spam Filtering in SEWM2007 Pan Weike, Lu Guanzhong, Xu Congfu
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
A VLSI Architecture for the 2-D Discrete Wavelet Transform Zhiyu Liu Xin Zhou May 2004.
Automated Fingertip Detection
Subband Feature Statistics Normalization Techniques Based on a Discrete Wavelet Transform for Robust Speech Recognition Jeih-weih Hung, Member, IEEE, and.
1 An Efficient Classification Approach Based on Grid Code Transformation and Mask-Matching Method Presenter: Yo-Ping Huang.
Cryptographic Anonymity Project Alan Le
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
1 Detecting Hidden Messages using higher-order stats and SVMs Siwei Lyu and Hany Farid.
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Ashish Ratnakar and.
Presenter : r 余芝融 1 EE lab.530. Overview  Introduction to image compression  Wavelet transform concepts  Subband Coding  Haar Wavelet  Embedded.
A New Generation of Artificial Neural Networks.  Support Vector Machines (SVM) appeared in the early nineties in the COLT92 ACM Conference.  SVM have.
1 A Statistical Matching Method in Wavelet Domain for Handwritten Character Recognition Presented by Te-Wei Chiang July, 2005.
Measures for Classification and Detection
Recognition of arrhythmic Electrocardiogram using Wavelet based Feature Extraction Authors Atrija Singh Dept. Of Electronics and Communication Engineering.
Supervised Time Series Pattern Discovery through Local Importance
ABSTRACT FACE RECOGNITION RESULTS
Model-based Steganography
Hybrid Features based Gender Classification
Machine Learning Week 1.
Deep Learning Hierarchical Representations for Image Steganalysis
Zhengjun Pan and Hamid Bolouri Department of Computer Science
Steganography in digital images
Data hiding based Hamming code
A High Embedding Capacity Approach to Adaptive Steganography
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Steganalysis of audio: attacking the Steghide Ru, Xue-Min, Hong-Juan Zhang, and Xiao Huang College of Computer Science, Zhejiang University, Hangzhou Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on. IEEE

Outline Description of the Attack Experimental Results Conclusion Discrete Wavelet Transform Linear predictive coding Support Vector Machine Experimental Results Conclusion References

Description of the Attack The schematic of this paper

Description of the Attack Discrete Wavelet Transform (DWT) x1,L[n] x1,H[n] g[n] x[n] h[n]  2 lowpass filter highpass filter down sampling xL[n] xH[n] N-points L-points

Description of the Attack Haar wavelet(2-point Haar wavelet) h[0] = 1/2, h[−1] = −1/2, h[n] = 0 otherwise g[n] = 1/2 for n = −1, 0 g[n] = 0 otherwise n h[n] -3 -2 -1 0 1 2 3 ½ -½ n g[n] -3 -2 -1 0 1 2 3 ½ ½

Description of the Attack Linear predictive coding (LPC) is the predicted wavelet coefficients the previous values the predictor coefficients

Description of the Attack can be calculated using the efficient Levinson-Durbin recursive procedure. We extract mean, variance, skewness and kurtosis of is the true wavelet coefficient value

Description of the Attack In our work, we used the freely available package LIBSVM. We selected a non-linear with 40 input features consisting of two set of statistical features extracted from above steps

Experimental Results Embedded messages by steghide at five different capacities:5%,10%, 20%, 40%, and 60% steganographic capacity. Half files in each type are for training the SVM, and the files left for test.

Experimental Results

Experimental Results 60% steganographic capacity Trained at20% steganographic capacity.

Conclusion Experimental results indicate that the messages embedded as small as 5%of the steganographic capacity can be reliably detected.

References Nehe, Navnath S., and Raghunath S. Holambe. "DWT and LPC based feature extraction methods for isolated word recognition." EURASIP Journal on Audio, Speech, and Music Processing 2012.1 (2012): 1-7. Johnson, Micah K., Siwei Lyu, and Hany Farid. "Steganalysis of recorded speech." Electronic Imaging 2005. International Society for Optics and Photonics, 2005.