skip to main content
10.1145/2656434.2656438acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Probabilistically detecting steganography within MP3 files

Published: 13 October 2014 Publication History

Abstract

A powerful application named MP3Stegazaurus was recently created by Illinois Institute of Technology (IIT) student Mikhail Zaturenskiy which exploits a not-so-well-known feature present in MP3 files. [8] By overwriting areas that are either skipped or ignored by MP3 playing and decoding applications, MP3Stegazaurus can use any MP3 file to safely store covert information in a manner that is difficult, if not impossible, for the average user to detect. This is especially true since it leaves an MP3 file's audio information untouched. As a result of research and work which took place during the first half of a student project, the author developed MP3StegDetector; an application which examines the interesting, non-audio-information-containing portions of MP3 files in order to determine and report whether, and where, steganography may be present. In addition to detecting the potential presence of steganography, MP3StegDetector extracts and outputs the information contained within each of the interesting portions of a given MP3 file. If a complete file such as a JPEG image, PDF document, or AES-encrypted file is identified within this extracted information, MP3StegDetector will extract and recompose it. In order to determine exactly where in MP3 files these interesting portions exist, the author carried out extensive research on the MP3 file's post-encoding format. This research is included in this document along with details of how MP3StegDetector's various scanning functions and features have been implemented.

References

[1]
Bosi, Marina, and Richard E. Goldberg. Introduction to Digital Audio Coding and Standards. Boston: Kluwer Academic, 2003. Print.
[2]
Hacker, Scot. MP3: The Definitive Guide. Sebastopol: O'Reilly Media, 2000. Print.
[3]
Maciak, Lukasz G., Michael A. Ponniah, and Renu Sharma. MP3 Steganography: Applying Steganography to Music Captioning.
[4]
Nilsson, Martin, "ID3 tag version 2.3.0", 1999 ID3, http://www.id3.org/id3v2.3.0
[5]
Raissi, Rassol. The Theory Behind MP3.
[6]
Ruckert, Martin. Understanding MP3: Syntax, Semantics, Mathematics, and Algorithms. Wiesbaden: Vieweg, 2005. Print.
[7]
Supurovic, Predrag, "MPEG Audio Frame Header", 1999 DataVoyage, http://www.datavoyage.com/mpgscript/mpeghdr.htm
[8]
Zaturenskiy, Mikhail. "MP3 Files as a Steganography Medium." Illinois Institute of Technology, 2013.

Cited By

View all
  • (2015)MP3 Steganography TechniquesProceedings of the 4th Annual ACM Conference on Research in Information Technology10.1145/2808062.2808074(51-54)Online publication date: 29-Sep-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
RIIT '14: Proceedings of the 3rd annual conference on Research in information technology
October 2014
98 pages
ISBN:9781450327114
DOI:10.1145/2656434
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 October 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. MP3
  2. anomaly detection
  3. blind detection
  4. hidden information
  5. secret writing
  6. steganalysis
  7. steganography

Qualifiers

  • Research-article

Conference

SIGITE/RIIT'14
Sponsor:
SIGITE/RIIT'14: SIGITE/RIIT 2014
October 15 - 18, 2014
Georgia, Atlanta, USA

Acceptance Rates

RIIT '14 Paper Acceptance Rate 14 of 39 submissions, 36%;
Overall Acceptance Rate 51 of 116 submissions, 44%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2015)MP3 Steganography TechniquesProceedings of the 4th Annual ACM Conference on Research in Information Technology10.1145/2808062.2808074(51-54)Online publication date: 29-Sep-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media