skip to main content
10.1145/1411328.1411356acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Impact of feature selection in classification for hidden channel detection on the example of audio data hiding

Published:22 September 2008Publication History

ABSTRACT

The classification accuracy achieved in applied classification problems depends strongly on the choice of classifiers and, if a model based approach is chosen, on the quality of the model. In this paper, for a selected classification problem from the area of determination of the existence of hidden channels in audio data, the relevance of single features for model generation in a support vector machine based classification procedure is determined.

Here we consider nine audio data hiding algorithms as well as an existing audio steganalysis approach. The goal is to sharpen the model used for classification by algorithm specific generation of the feature set used and thereby reducing its dimensionality while keeping the same degree of classification accuracy for hidden channel detection on audio data. We show that for a multi-genre audio test set the impact of feature space reduction is less severe than for a set containing only speech. The fractions of the feature space considered significant in the performed multi-genre and speech evaluations (best results for the percentage of the available feature space considered significant in the tests performed here: 37.4% and 54.5% respectively) are determined for different thresholds of considering a feature significant in single feature classification. A first evaluation on embedding domain distinction is performed, distinguishing between time- and frequency/wavelet-domain.

The results for application specific steganalysis achieved here are compared to the results achieved in current image steganalysis schemes.

References

  1. Pevny, T.; and Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. Electronic Imaging Conf. on Security, Steganography, and Watermarking of Multimedia Contents, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  2. Avcibas, I.; Memon, N. and Sankur, B.: Steganalysis using Image Quality Metrics; Electronic Imaging Conf. on Security and Watermarking of Multimedia Contents, 2001.Google ScholarGoogle Scholar
  3. Hand, D.; Mannila, H.; Smyth, P.: Principles of Data Mining. MIT Press, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Kung, S. Y.; Mak, M. W.; Lin, S. H.: Biometric Authentication: A Machine Learning Approach. Prentice Hall, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Miche, Y.; Roue, B.; Lendasse, A. and Bas, P.: A feature selection methodology for steganalysis. In Proceedings of the International Workshop on Multimedia Content Representation, Classification and Security, Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Avcibas, I.: Audio steganalysis with contentindependent distortion measures. IEEE Signal Processing Letters, Vol. 13, No. 2, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  7. Solanki, K.; Sarkar, A; and Manjunath, B. S.: YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. Proceedings of Information Hiding 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ozer H.; Avcibas I.; Sankur B.; and Memon N.: Steganalysis of audio based on audio quality metrics. SPIE Electronic Imaging Conf. on Security and Watermarking of Multimedia Contents, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  9. Kraetzer, C. and Dittmann, J.: Pros and Cons of Melcepstrum based Audio Steganalysis using SVM Classification. Proceedings of Information Hiding 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kludas, J.; Bruno, E.; and Marchand-Maillet, S.: Can Feature Information Interaction help for Information Fusion in Multimedia Problems? First International Workshop on Metadata Mining for Image Understanding, 2008.Google ScholarGoogle Scholar
  11. Chang, C.-C. and Lin, C.-J.: LIBSVM: a Library for Support Vector Machines. 2001Google ScholarGoogle Scholar
  12. Johnson, M. .; Lyu, S.; and Farid, H.: Steganalysis of recorded speech. Electronic Imaging Conf. on Security and Watermarking of Multimedia Contents, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  13. Ru, X.-M.; Zhang, H.-J.; and Huang, X.: Steganalysis of audio: Attacking the steghide. Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, 2005.Google ScholarGoogle Scholar
  14. Kraetzer, C.; and Dittmann, J.: Cover Signal Specific Steganalysis: the Impact of Training on the Example of two Selected Audio Steganalysis Approaches. To appear in Proceedings of the Electronic Imaging Conf. on Security, Forensics, Steganography, and Watermarking of Multimedia Contents, 2008.Google ScholarGoogle Scholar

Index Terms

  1. Impact of feature selection in classification for hidden channel detection on the example of audio data hiding

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
      September 2008
      242 pages
      ISBN:9781605580586
      DOI:10.1145/1411328

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 September 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader