Skip to main content

Post-processing for Enhancing Audio Steganographic Undetectability

  • Conference paper
  • First Online:
Security and Privacy in Digital Economy (SPDE 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1268))

Included in the following conference series:

  • 1642 Accesses

Abstract

Currently, the conventional steganography method often only perform data embedding, without additional post-processing to enhance undetectability. In this work, we propose a new audio post-processing steganography model, which further hiding the traces to a certain extent. Specifically, we design the Signal-to-Noise Ratio (SNR) threshold to determine whether the current stego is suitable for adding disturbance or not, and use JS divergence to decide whether the added disturbance is kept or not, respectively. The designed two measures will process the traces frame-by-frame by adding appropriate disturbances on needed sampling points of the stego audio. Experimental results illustrate that, with the proposed post-processing, the undetectability can be successfully improved without affecting the message extraction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, B., Luo, W., Zheng, P.: Enhancing steganography via stego post-processing by reducing image residual difference. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 63–68 (2019)

    Google Scholar 

  2. Chen, K., Zhou, H., Li, W., Yang, K., Zhang, W., Yu, N.: Derivative-based steganographic distortion and its non-additive extensions for audio. IEEE Trans. Circuits Syst. Video Technol. 30, 2027–2032 (2019)

    Article  Google Scholar 

  3. Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)

    Article  Google Scholar 

  4. Gong, C., Yi, X., Zhao, X.: Pitch delay based adaptive steganography for AMR speech stream. In: Yoo, C.D., Shi, Y.-Q., Kim, H.J., Piva, A., Kim, G. (eds.) IWDW 2018. LNCS, vol. 11378, pp. 275–289. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11389-6_21

    Chapter  Google Scholar 

  5. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234–239. IEEE (2012)

    Google Scholar 

  6. Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information Hiding and Multimedia Security, pp. 59–68. ACM (2013)

    Google Scholar 

  7. Li, B., Tan, S., Wang, M., Huang, J.: Investigation on cost assignment in spatial image steganography. IEEE Trans. Inf. Forensics Secur. 9(8), 1264–1277 (2014)

    Article  Google Scholar 

  8. Lin, Y., Wang, R., Yan, D., Dong, L., Zhang, X.: Audio steganalysis with improved convolutional neural network. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 210–215. ACM (2019)

    Google Scholar 

  9. Luo, W., Li, H., Yan, Q., Yang, R., Huang, J.: Improved audio steganalytic feature and its applications in audio forensics. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 14(2), 43 (2018)

    Google Scholar 

  10. Luo, W., Zhang, Y., Li, H.: Adaptive audio steganography based on advanced audio coding and syndrome-trellis coding. In: Kraetzer, C., Shi, Y.-Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 177–186. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-64185-0_14

    Chapter  Google Scholar 

  11. Menéndez, M., Pardo, J., Pardo, L., Pardo, M.: The jensen-shannon divergence. J. Franklin Inst. 334(2), 307–318 (1997)

    Article  MathSciNet  Google Scholar 

  12. Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)

    Article  Google Scholar 

  13. Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16435-4_13

    Chapter  Google Scholar 

  14. Recommendation, ITUR: Methods for objective measurements of perceived audio quality. ITU-R BS, vol. 13871 (2001)

    Google Scholar 

  15. Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2015)

    Article  Google Scholar 

  16. Thiede, T., et al.: PEAQ-the ITU standard for objective measurement of perceived audio quality. J. Audio Eng. Soc. 48(1/2), 3–29 (2000)

    Google Scholar 

  17. Yi, X., Yang, K., Zhao, X., Wang, Y., Yu, H.: Ahcm: Adaptive huffman codemapping for audio steganography based on psychoacoustic model. IEEE Trans. Inf. Forensics Secur. 14, 2217–2231 (2019)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No. U1736215, 61672302, 61901237), Zhejiang Natural Science Foundation (Grant No. LY20F020010, LY17F020010), Ningbo Natural Science Foundation (Grant No. 2019A610103) and K.C. Wong Magna Fund in Ningbo University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rangding Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, X., Wang, R., Dong, L., Yan, D. (2020). Post-processing for Enhancing Audio Steganographic Undetectability. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9129-7_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9128-0

  • Online ISBN: 978-981-15-9129-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics