Skip to main content
Log in

Detection of MP3Stego exploiting recompression calibration-based feature

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

MP3Stego is a typical steganographic tool for MP3 audio. Once the cover audio is unavailable, it is hard to distinguish between background noise and steganographic distortion. In this work, the MP3Stego algorithm has been analyzed from a warden’s perspective. It is observed that the number of bits in the bit reservoir will be disturbed when the secret message is embedded. In addition, a reliable estimation of cover audio is obtained by the proposed recompression calibration. The calibrated features are classified with support vector machine technique. Experimental results show that the proposed scheme is effective and gets good performance, especially when the embedding rate is not less than 0.01 %. The results also shows that the proposed scheme can achieve lower false positive rate comparing to the existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Achmad Z (2002) Stego-Lame, http://sourceforge.net/projects/mp3stegz

  2. Avcibas I (2006) Audio steganalysis with content-independent distortion measures. IEEE Signal Process Lett 13(2):92–95

    Article  Google Scholar 

  3. Bohme R, Westfeld A (2004) Statistical characterisation of MP3 encoders for steganalysis. Proceedings of ACM Workshop on Multimedia and Security, ACM, New York, USA, p 25–34

  4. Cha SH (2007) Comprehensive survey on distance/similarity measures between probability density functions. Int J Math Models Methods Appl Sci 1(4):300–307

    MathSciNet  Google Scholar 

  5. Chang CC, Lin CJ (2001) LIBSVM: A library for support vector machines. http://www.csie.ntu.edu.tw/~cjlin/libsvm

  6. Dittmann J, Hesse D (2004) Network based intrusion detection to detect steganographic communication channels: on the example of audio data. Proceedings of IEEE International Workshop on Multimedia Signal Processing, IEEE, Siena, Italy, p 343–346

  7. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  Google Scholar 

  8. Fridrich J (2004) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proceedings of International Conference on Information Hiding, Vol. 3200, Springer, Berlin, LNCS, p 67–81

  9. ISO/IEC 11172–3 (1993) Information technology—coding of moving pictures and associated audio for digital storage media at up to about 1.5 M bit/s—part3: audio

  10. Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444

    Article  Google Scholar 

  11. Ker AD, Bohme R (2008) Revisiting weighted stego-image steganalysis. Proceedings of SPIE on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, SPIE, Vol. 6819, p 5–17

  12. Kraetzer C, Dittman J (2007) Pros and cons of mel-cepstrum based audio steganalysis using SVM classification. Proceedings of International Conference on Information Hiding, Vol. 4567, Springer, LNCS, p 359–377

  13. Malik H (2008) Steganalysis of qim steganography using irregularity measure. Proceedings of ACM Workshop on Multimedia and Security, ACM, New York, USA, p 149–158

  14. Ozer H, Sankur B, Memon N, Avcibas I (2006) Detection of audio covert channels using statistical footprints of hidden messages. Digit Signal Process 16(4):389–401

    Article  Google Scholar 

  15. Petitcolas FAP (2002) MP3Stego. http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego

  16. Platt C (2004) UnderMP3Cover. http://sourceforge.net/projects/ump3c

  17. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32–44

    Article  Google Scholar 

  18. Qiao M, Sung A, Liu Q (2009) Steganalysis of MP3Stego. Proceedings of International Joint Conference on Neural Networks, IEEE, New Jersey, USA, p 2566–2571

  19. Qiao M, Sung A, Liu Q (2009) Feature mining and intelligent computing for MP3 steganalysis. Proceedings of International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing, IEEE, Washington, DC, USA, p 627–630

  20. Westfeld A (2003) Detecting low embedding rates. Proceedings of International Conference on Information Hiding, Vol. 2578, Springer, LNCS, p 324–339

  21. Yan D, Wang R (2011) Huffman table swapping-based steganography for MP3 audio. Multimedia Tools Appl 52(2–3):291–305

    Article  Google Scholar 

  22. Yan D, Wang R, Zhang L (2009) Quantization step parity-based steganography for MP3 audio. Fundam Inform 97(1–2):1–14

    Google Scholar 

Download references

Acknowledgment

This work was supported by the National Natural Science Foundation of China (Grant No. 6117037), Doctoral Fund of Ministry of Education of China (Grant No. 20103305110002), Ningbo University Fund (Grant No. XK1087, XYL10002), Zhejiang Scientific and Technical Key Innovation Team of New Generation Mobile Internet Client Software (Grant No. 2010R50009), Scientific Research Fund of Zhejiang Provincial Education Department (Grant No. Y201119434) and K.C. Wong Magna Fund in Ningbo University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Diqun Yan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yan, D., Wang, R. Detection of MP3Stego exploiting recompression calibration-based feature. Multimed Tools Appl 72, 865–878 (2014). https://doi.org/10.1007/s11042-013-1406-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1406-z

Keywords

Navigation