Paper
1 March 2007 Mel-cepstrum-based steganalysis for VoIP steganography
Author Affiliations +
Abstract
Steganography and steganalysis in VoIP applications are important research topics as speech data is an appropriate cover to hide messages or comprehensive documents. In our paper we introduce a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages. In particular we combine known and established audio steganalysis features with the features derived from Melcepstrum based analysis for an investigation on the improvement of the detection performance. Our main focus considers the application environment of VoIP-steganography scenarios. The evaluation of the enhanced feature space is performed for classical steganographic as well as for watermarking algorithms. With this strategy we show how general forensic approaches can detect information hiding techniques in the field of hidden communication as well as for DRM applications. For the later the detection of the presence of a potential watermark in a specific feature space can lead to new attacks or to a better design of the watermarking pattern. Following that the usefulness of Mel-cepstrum domain based features for detection is discussed in detail.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Christian Kraetzer and Jana Dittmann "Mel-cepstrum-based steganalysis for VoIP steganography", Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 650505 (1 March 2007); https://doi.org/10.1117/12.704040
Lens.org Logo
CITATIONS
Cited by 61 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Steganalysis

Steganography

Statistical analysis

Digital watermarking

Analytical research

Data hiding

Evolutionary algorithms

RELATED CONTENT

Active steganalysis of sequential steganography
Proceedings of SPIE (June 20 2003)
StegoWall: blind statistical detection of hidden data
Proceedings of SPIE (April 29 2002)
T-order statistics and secure adaptive steganography
Proceedings of SPIE (August 30 2005)
ML detection of steganography
Proceedings of SPIE (March 21 2005)
Steganalysis of recorded speech
Proceedings of SPIE (March 21 2005)

Back to Top