Mel-Cepstrum Based Steganalysis for VoIP-Steganography Christian Kraetzer and Jana Dittmann Electronic Imaging 2007. International Society for Optics and.

Slides:



Advertisements
Similar presentations
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Advertisements

Franz de Leon, Kirk Martinez Web and Internet Science Group  School of Electronics and Computer Science  University of Southampton {fadl1d09,
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Toward Semantic Indexing and Retrieval Using Hierarchical Audio Models Wei-Ta Chu, Wen-Huang Cheng, Jane Yung-Jen Hsu and Ja-LingWu Multimedia Systems,
F 鍾承道 Acoustic Features for Speech Recognition: From Mel-Frequency Cepstrum Coefficients (MFCC) to BottleNeck Features(BNF)
Fifth International Conference on Information
A STUDY ON SPEECH RECOGNITION USING DYNAMIC TIME WARPING CS 525 : Project Presentation PALDEN LAMA and MOUNIKA NAMBURU.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
A STUDY ON SPEECH RECOGNITION USING DYNAMIC TIME WARPING CS 525 : Project Presentation PALDEN LAMA and MOUNIKA NAMBURU.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Real-Time Speech Recognition Thang Pham Advisor: Shane Cotter.
Representing Acoustic Information
Audio Processing for Ubiquitous Computing Uichin Lee KAIST KSE.
Normalization of the Speech Modulation Spectra for Robust Speech Recognition Xiong Xiao, Eng Siong Chng, and Haizhou Li Wen-Yi Chu Department of Computer.
Kinect Player Gender Recognition from Speech Analysis
Basics of Signal Processing. SIGNALSOURCE RECEIVER describe waves in terms of their significant features understand the way the waves originate effect.
Project 1 : Eigen-Faces Applied to Speech Style Classification Brad Keserich, Senior, Computer Engineering College of Engineering and Applied Science;
Digital Steganography
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Nguyen Thi Huong Lien - Hirota Lab 1/10 Echo Hiding using Exponential Time-spread Echo Kernel (ETEK-EH) and Its Applications to Audio Digital Watermarking.
Seminar Title Possible Subtitle Author 1 Author 2... Author N.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Jacob Zurasky ECE5526 – Spring 2011
1 Detection and Discrimination of Sniffing and Panting Sounds of Dogs Ophir Azulai(1), Gil Bloch(1), Yizhar Lavner (1,2), Irit Gazit (3) and Joseph Terkel.
Supervisor: Dr. Eddie Jones Co-supervisor: Dr Martin Glavin Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification.
1 PATTERN COMPARISON TECHNIQUES Test Pattern:Reference Pattern:
Steganalysis of audio: attacking the Steghide
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
MUMT611: Music Information Acquisition, Preservation, and Retrieval Presentation on Timbre Similarity Alexandre Savard March 2006.
1 Wave Steganography Approach by Modified LSB 2009 Adviser: 吳坤熹 Student: 陳奕君 Presentation Data:2013/11/5 Second International Conference on Emerging Trends.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Overview ► Recall ► What are sound features? ► Feature detection and extraction ► Features in Sphinx III.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Speech Recognition Feature Extraction. Speech recognition simplified block diagram Speech Capture Speech Capture Feature Extraction Feature Extraction.
VOCODERS. Vocoders Speech Coding Systems Implemented in the transmitter for analysis of the voice signal Complex than waveform coders High economy in.
Audio processing methods on marine mammal vocalizations Xanadu Halkias Laboratory for the Recognition and Organization of Speech and Audio
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering,
Wavelets, Filter Banks and Applications Wavelet-Based Feature Extraction for Phoneme Recognition and Classification Ghinwa Choueiter.
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Techniques and Applications for Audio 謝育任 劉威麟.
A STUDY ON SPEECH RECOGNITION USING DYNAMIC TIME WARPING CS 525 : Project Presentation PALDEN LAMA and MOUNIKA NAMBURU.
EEL 6586: AUTOMATIC SPEECH PROCESSING Speech Features Lecture Mark D. Skowronski Computational Neuro-Engineering Lab University of Florida February 27,
MSc Project Musical Instrument Identification System MIIS Xiang LI ee05m216 Supervisor: Mark Plumbley.
Cryptographic Anonymity Project Alan Le
VoIP Steganography and Its Detection – A Survey 1 ACM Computing Surveys (CSUR) Volume 46 Issue 2, November 2013 WOJCIECH MAZURCZYK Warsaw University of.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Iris-based Authentication System Daniel Schonberg and Darko Kirovski, “Iris Compression for Cryptographically Secure Person Identification”, in Proceedings.
EEL 6586: AUTOMATIC SPEECH PROCESSING Speech Features Lecture Mark D. Skowronski Computational Neuro-Engineering Lab University of Florida February 20,
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Date of download: 6/1/2016 Copyright © 2016 SPIE. All rights reserved. Diagrams of the (a) OC-SVM classifier and (b) MHOC-SVM classifier. Figure Legend:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Speech Processing Dr. Veton Këpuska, FIT Jacob Zurasky, FIT.
Introduction to Steganography
CS 445/656 Computer & New Media
PATTERN COMPARISON TECHNIQUES
Introduction to Audio Watermarking Schemes N. Lazic and P
Steganography Example
Spoken Digit Recognition
PCM (Pulse Code Modulation)
3. Applications to Speaker Verification
Zhengjun Pan and Hamid Bolouri Department of Computer Science
Neuro-Fuzzy and Soft Computing for Speaker Recognition (語者辨識)
Audio and Speech Computers & New Media.
AUDIO SURVEILLANCE SYSTEMS: SUSPICIOUS SOUND RECOGNITION
Source: Pattern Recognition Letters, Article In Press, 2007
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
LSB matching revisited
Presentation transcript:

Mel-Cepstrum Based Steganalysis for VoIP-Steganography Christian Kraetzer and Jana Dittmann Electronic Imaging International Society for Optics and Photonics, 2007 Research Group Multimedia and Security, Department of Computer Science, Otto-von-Guericke-University of Magdeburg, Germany 1

Outline The proposed steganalyser The cepstrum Mel-frequency cepstrum Test scenario Conclusion References 2

The proposed steganalyser 1.pre-processing of the audio/speech data 2.feature extraction from the signal 3.post-processing of the resulting feature vectors 4.analysis (classification for steganalysis) 3

The cepstrum Basically a cepstrum is the result of taking the Fourier transform (FT) or short-time Fourier Analysis of the decibel spectrum as if it were a signal. It was originally invented for characterising seismic echoes resulting from earthquakes and bomb explosions. FT → abs() → log → IFT 4

Mel-frequency cepstrum Mel-cepstrum can be used in speaker identification and the general description of the Human Auditory System. 5

Mel-frequency cepstral coefficients 6

Mel-frequency cepstrum 7

Modification of the Mel-cepstral based signal analysis – led to the idea of removing the speech relevant frequency bands in the spectral representation of a signal before computing the cepstral. 8

Test scenario LSB in VOIP – sampling rate 44.1 kHz – PCM 9

Test scenario A s1 - LSB A S2 - Publima A S 3- WaSpStego A S 4- Steghide A S 5- Steghide 10 A w1 - Spread Spectrum A w2 - 2A2W A w 3- Least Significant Bit A w 4- VAWW

Conclusion first a reliable detection of a hidden channel constructed using LSB within the defined application scenario of VoIP steganography, second the demonstration of the general applicability of our approach and the Mel- cepstral based features in speech and audio steganalysis have been successfully reached. 11

References J. Dittmann, D. Hesse, and R. Hillert, “Steganography and steganalysis in Voice-over IP scenarios: operational aspects and firstexperiences with a new steganalysis tool set,” in Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE Vol.5681, P. W. Wong and E. J. Delp, eds., SPIE and IS&T Proceedings, pp. 607–618, (San Jose, California USA), Jan M. K. Johnson, S. Lyu, and H. Farid, “Steganalysis of recorded speech,” in in Proc. SPIE, vol. 5681, Mar. 2005, pp. 664–672, 王小川, 語音訊號處理, 修訂二版,