<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1012-2354</issn>
                                                                                                        <publisher>
                    <publisher-name>Erciyes Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                                                                                                                                            <title-group>
                                                                                                                        <article-title>An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="tr">
                                    <trans-title>Farklı İçeriklere Sahip Wav Ses Dosyalarında Ki-kare Steganaliz Atağına Karşı Sağlamlık Değerlendirmesi</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-5347-4491</contrib-id>
                                                                <name>
                                    <surname>Durdu</surname>
                                    <given-names>Ali</given-names>
                                </name>
                                                                    <aff>Ankara Sosyal Bilimler Üniversitesi Hukuk Fakültesi</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20200817">
                    <day>08</day>
                    <month>17</month>
                    <year>2020</year>
                </pub-date>
                                        <volume>36</volume>
                                        <issue>2</issue>
                                        <fpage>178</fpage>
                                        <lpage>192</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20180801">
                        <day>08</day>
                        <month>01</month>
                        <year>2018</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20200806">
                        <day>08</day>
                        <month>06</month>
                        <year>2020</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1985, Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi</copyright-statement>
                    <copyright-year>1985</copyright-year>
                    <copyright-holder>Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Abstract: This paper presents the  performance of the chi-square method for steganalysis purposes on audio files  through various content. Predetermined rates of stego data have been embedded  into 4500 distinct cover wav files via LSB (Least Significant Bit) method  using three types of audio input files: music, human voice, animal sounds.  Results of the experiment have revealed that hidden data in wav files  containing dissimilar audio samples cannot be easily detected by chi-square  steganalysis method. However, wav files containing similar audio samples  demonstrate better performance compared to dissimilar samples.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="tr">
                            <p>Özet: Bu çalışmada, farklı  içerikli wav ses dosyalarına LSB(Least Significant Bit) yöntemi ile gizlenen  veriler ki-kare yöntemiyle steganaliz edilmiştir. Çalışmada müzik, insan ve  hayvan seslerinden 3 kategoride 4500 farklı wav ses dosyasına farklı  oranlarda veriler gizlenmiştir. Bu çalışmada ki-kare steganaliz yöntemi diğer  çalışmalardan farklı olarak imgeler yerine wav ses dosyalarına uyarlanmıştır.  Deney sonuçlarına göre benzersiz ses örnekleri (insan veya müzik ses  örnekleri) içeren wav ses dosyalarına gizlenen verilerin ki-kare steganaliz  yöntemi tarafından tespit edilemediği gözlenmiştir. Benzer ses örnekleri  (hayvan ses örnekleri) içeren dosyalarda ise gizlenen veriler ki-kare  steganaliz yöntemi tarafından tespit edilmiştir.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Chi-square</kwd>
                                                    <kwd>  Data security</kwd>
                                                    <kwd>  Hidden data</kwd>
                                                    <kwd>  Steganalysis</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="tr">
                                                    <kwd>Ki-kare</kwd>
                                                    <kwd>  Veri güvenliği</kwd>
                                                    <kwd>  Gizli veri</kwd>
                                                    <kwd>  Steganaliz</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Kuo, W.-C., Kuo, S.-H., Wang, C.-C., Wuu, L.-C. 2016. High capacity data hiding scheme based on multi-bit encoding function. Opt. - Int. J. Light Electron Opt, 127(2016), 4, 1762–1769.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Wu, A., Feng, G., Zhang, X., Ren, Y. 2016. Unbalanced JPEG image steganalysis via multiview data match. J. Vis. Commun. Image Represent, 34(2016), 103–107.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Li, M., Liu, Q. 2015. Steganalysis of SS Steganography: Hidden Data Identification and Extraction. Circuits, Syst. Signal Process, 34(2015), 10, 3305–3324.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Holub, V., Fridrich, J. 2015, Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur., 10(2015), 2, 219–228.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Nouri, R., Mansouri, A. 2015. Blind image steganalysis based on reciprocal singular value curve. in Machine Vision and Image Processing (MVIP), 2015 9th Iranian Conference on, 124–127.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Mohammadi, F. G., Abadeh, M. S. 2014. Image steganalysis using a bee colony based feature selection algorithm. Eng. Appl. Artif. Intell., 31(2014), 35–43.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Zhang, H., Ping, X. J., Xu, M. K., Wang, R. 2014, Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction. Sci. China Inf. Sci., 57(2014), 4, 1–7.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Lu, J. C., Liu, F. L., Luo, X. Y. 2014, Selection of image features for steganalysis based on the Fisher criterion, Digit. Investig., 11(2014), 1, 57–66.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Pathak, P., Selvakumar, S. 2014, Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation, Digit. Investig., 11(2014), 1, 67–77.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Holub, V., Fridrich, J. 2013, Random projections of residuals for digital image steganalysis, IEEE Trans. Inf. Forensics Secur., 8(2013), 12, 1996–2006.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Gul, G., Kurugollu, F. 2013, JPEG image steganalysis using multivariate PDF estimates with MRF cliques, IEEE Trans. Inf. Forensics Secur., 8(2013), 3, 578–587.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	Cho, S., Cha, B.-H., Gawecki, M., Jay Kuo, C.-C. 2013, Block-based image steganalysis: Algorithm and performance evaluation. J. Vis. Commun. Image Represent., 24(2013), 7, 846–856.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	Chen, G., Zhang, D., Zhu, W., Tao, Q., Zhang, C., Ruan, J. 2012, On optimal feature selection using harmony search for image steganalysis. in Proceedings - International Conference on Natural Computation, 1074–1078.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Zong, H., Liu, F. L., Luo, X. Y. 2012, Blind image steganalysis based on wavelet coefficient correlation, Digit. Investig., 9(2012), 1, 58–68.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	Dai, Z., Xiong, Q., Peng, Y., Gao, H. 2012, Research on the large scale image steganalysis technology based on cloud computing and BP neutral network, in Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012, 415–419.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	Liu Q., M., Sung, A. H., Qiao, M., 2008, Detecting information-hiding in WAV audios,. Pattern Recognition, 19th International Conference on,  1051-4651.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Ren, Y. , Cai, T., Tang, M., Wang, L. 2015, AMR steganalysis based on the probability of same pulse position, IEEE Trans. Inf. Forensics Secur., 10(2015), 9, 1801–1811.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Yavanoglu, U., Ozcakmak, B., Milletsever, O. 2012,  A New Intelligent Steganalysis Method for Waveform Audio Files, 11th Int. Conf. Mach. Learn. Appl., Dec, 233–239.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	Microsoft Wave. 2018. http://soundfile.sapp.org/doc/WaveFormat (Accessed: 29.04.2018).</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Stanley, C. A. 2005, Pairs of Values and the Chi-squared Attack, 1–45.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	Westfeld, A., Pfitzmann, A. 2000, Attacks on Steganographic Systems Steganos,  S-Tools and Some Lessons Learned, 1–16.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	Şahin, A. 2007, “New Methods on Image Steganography and Their Reliabilities, Trakya University, Natural and Applied Sciences, Ph.D. Thesis, Trakya.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	Yalman, Y. 2010, Design And Implementation Of A Steganography Method Based On Histogram Modification For Digital Images, Kocaeli University, Natural and Applied Sciences,  Ph.D. Thesis, Kocaeli.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	Fridrich, J., Long, M. 2000, Steganalysis of LSB encoding in color images, IEEE Int. Conf. Multimed. Expo. ICME2000. Proceedings. Latest Adv. Fast Chang. World Multimed. 3(2000), c, 1279–1282.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	Fridrich, J., Goljan, M. 2002, Practical Steganalysis of Digital Images – State of the Art, Apr., 1–13.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26]	Farid, H. 2002, Detecting hidden messages using higher-order statistical models, in Proceedings. International Conference on Image Processing, 2, II-905-II-908.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	Farid, H. 2001, Detecting Steganographic Messages in Digital Images, Technical Report, Oct.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	Youtube, 2018. http://www.youtube.com (Accessed: 29.04.2018).</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29]	Audacity, 2018. http://www.audacityteam.org (Accessed: 29.04.2018).</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	Wav source, 2018. http://www.wavsource.com (Accessed: 29.04.2018).</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31]	Daily Wav, 2018. http://www.dailywav.com (Accessed: 29.04.2018).</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
