1 March 2007 Mel-cepstrum-based steganalysis for VoIP steganography
Author Affiliations +
Abstract
Steganography and steganalysis in VoIP applications are important research topics as speech data is an appropriate cover to hide messages or comprehensive documents. In our paper we introduce a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages. In particular we combine known and established audio steganalysis features with the features derived from Melcepstrum based analysis for an investigation on the improvement of the detection performance. Our main focus considers the application environment of VoIP-steganography scenarios. The evaluation of the enhanced feature space is performed for classical steganographic as well as for watermarking algorithms. With this strategy we show how general forensic approaches can detect information hiding techniques in the field of hidden communication as well as for DRM applications. For the later the detection of the presence of a potential watermark in a specific feature space can lead to new attacks or to a better design of the watermarking pattern. Following that the usefulness of Mel-cepstrum domain based features for detection is discussed in detail.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Christian Kraetzer, Christian Kraetzer, Jana Dittmann, Jana Dittmann, } "Mel-cepstrum-based steganalysis for VoIP steganography", Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 650505 (1 March 2007); doi: 10.1117/12.704040; https://doi.org/10.1117/12.704040
PROCEEDINGS
12 PAGES


SHARE
RELATED CONTENT

Active steganalysis of sequential steganography
Proceedings of SPIE (June 20 2003)
A comprehensive bibliography of linguistic steganography
Proceedings of SPIE (March 02 2007)
Model-based steganalysis using invariant features
Proceedings of SPIE (February 04 2009)
Minimax eigenvector decomposition for data hiding
Proceedings of SPIE (September 16 2005)
ML detection of steganography
Proceedings of SPIE (March 21 2005)
Steganalysis of recorded speech
Proceedings of SPIE (March 21 2005)

Back to Top