Skip to main content

Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10431))

Abstract

Statistical undetectability is a common problem in current MP3 steganography. In this paper, a novel adaptive scheme of MP3 steganography is proposed for obtaining higher secure payload under the framework of distortion minimization. To avoid disabling MP3 encoder in the embedding process, a mapping construction algorithm using Huffman codes of equal length is realized to hold the length of stego codestream. Furthermore, a content-aware distortion function is designed to achieve optimal masking effect via the psychoacoustic model (PAM). Experimental results show that our method achieves better performance than others in terms of security and secure payload, the detection accuracy of the proposed method is lower than \(55\%\) under 128 kbps when the relative payload is equal to 0.25.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Dong, Y.: Research on information hiding based on mp3. Master’s thesis, Beijing University of Posts and Telecommunications (BUPT), Beijing (2015)

    Google Scholar 

  2. Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)

    Article  Google Scholar 

  3. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)

    Book  MATH  Google Scholar 

  4. Fridrich, J.: Steganalysis of JPEG images using rich models. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 8303, pp. 7–20 (2012)

    Google Scholar 

  5. Gao, H.: The mp3 steganography algorithm based on huffman coding. Acta Scientiarum Naturalium Univ. Sunyatseni 46(4), 32–35 (2007)

    Google Scholar 

  6. Jin, C., Wang, R., Yan, D.: Steganalysis of mp3stego with low embedding-rate using markov feature. Multimed. Tools Appl. 76(5), 6143–6158 (2017)

    Article  Google Scholar 

  7. Liu, W., Wang, S., Zhang, X.: Audio watermarking based on partial mp3 encoding. Acta Scientiarum Naturalium Univ. Sunyatseni 43(S2), 26–33 (2004)

    Google Scholar 

  8. Petitcolas, F.A.: MP3Stego (1998)

    Google Scholar 

  9. Smith, J.O., Abel, J.S.: ISO/IEC 11172–3: Information Technology - Coding of Moving Pictures and Associated Audio for Digital Storage Media at Up to about 1.5 Mbit/s - Part 3: Audio (1993)

    Google Scholar 

  10. Thiede, T.: PEAQ-the ITU standard for objective measurement of perceived audio quality. J. Audio Eng. Soc. Audio Eng. Soc. 48(1), 3–29 (2000)

    Google Scholar 

  11. Wang, C., Chen, T., Chao, W.: A new audio watermarking based on modified discrete cosine transform of MPEG/audio layer III. In: Proceedings of 2004 IEEE International Conference on Networking, Sensing and Control, pp. 984–989 (2004)

    Google Scholar 

  12. Wu, G., Zhuang, Y., Wu, F., Pan, Y.: Adaptive audio watermarking based on snr in localized regions. J. Zhejiang Univ. Sci. A (Sci. Eng.) 6A, 53–57 (2005)

    Article  Google Scholar 

  13. Yan, D.: Steganography and Steganalysis of Compressed Domain Audio. Ph.D. thesis, Ningbo University, Ningbo (2012)

    Google Scholar 

  14. Yan, D., Wang, R., Yu, X., Zhu, J.: Steganography for MP3 audio by exploiting the rule of window switching. Comput. Secur. 31(5), 704–716 (2012)

    Article  Google Scholar 

  15. Yan, D., Wang, R., Zhang, L.: A large capacity MP3 steganography algorithm based on huffman coding. J. Sichuan Univ. (Nat. Sci. Ed.) 48(6), 1281–1286 (2011)

    Google Scholar 

  16. Zhang, Y., Pan, F., Shen, J., Li, N.: A post-adaptive steganography algorithm based on MP3. Comput. Sci. 43(8), 114–117 (2016)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the NSFC under U1636102, U1536207 and U1536105, and National Key Technology R&D Program under 2014BAH41B01, 2016YFB0801003, 2016QY15Z2500 and 2016QY08D1600.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaowei Yi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Yang, K., Yi, X., Zhao, X., Zhou, L. (2017). Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution. In: Kraetzer, C., Shi, YQ., Dittmann, J., Kim, H. (eds) Digital Forensics and Watermarking. IWDW 2017. Lecture Notes in Computer Science(), vol 10431. Springer, Cham. https://doi.org/10.1007/978-3-319-64185-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64185-0_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64184-3

  • Online ISBN: 978-3-319-64185-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics