Araştırma Makalesi
BibTex RIS Kaynak Göster

An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content

Yıl 2020, Cilt: 36 Sayı: 2, 178 - 192, 17.08.2020

Öz



Abstract: This paper presents the
performance of the chi-square method for steganalysis purposes on audio files
through various content. Predetermined rates of stego data have been embedded
into 4500 distinct cover wav files via LSB (Least Significant Bit) method
using three types of audio input files: music, human voice, animal sounds.
Results of the experiment have revealed that hidden data in wav files
containing dissimilar audio samples cannot be easily detected by chi-square
steganalysis method. However, wav files containing similar audio samples
demonstrate better performance compared to dissimilar samples.


Kaynakça

  • [1] Kuo, W.-C., Kuo, S.-H., Wang, C.-C., Wuu, L.-C. 2016. High capacity data hiding scheme based on multi-bit encoding function. Opt. - Int. J. Light Electron Opt, 127(2016), 4, 1762–1769.
  • [2] Wu, A., Feng, G., Zhang, X., Ren, Y. 2016. Unbalanced JPEG image steganalysis via multiview data match. J. Vis. Commun. Image Represent, 34(2016), 103–107.
  • [3] Li, M., Liu, Q. 2015. Steganalysis of SS Steganography: Hidden Data Identification and Extraction. Circuits, Syst. Signal Process, 34(2015), 10, 3305–3324.
  • [4] Holub, V., Fridrich, J. 2015, Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur., 10(2015), 2, 219–228.
  • [5] Nouri, R., Mansouri, A. 2015. Blind image steganalysis based on reciprocal singular value curve. in Machine Vision and Image Processing (MVIP), 2015 9th Iranian Conference on, 124–127.
  • [6] Mohammadi, F. G., Abadeh, M. S. 2014. Image steganalysis using a bee colony based feature selection algorithm. Eng. Appl. Artif. Intell., 31(2014), 35–43.
  • [7] Zhang, H., Ping, X. J., Xu, M. K., Wang, R. 2014, Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction. Sci. China Inf. Sci., 57(2014), 4, 1–7.
  • [8] Lu, J. C., Liu, F. L., Luo, X. Y. 2014, Selection of image features for steganalysis based on the Fisher criterion, Digit. Investig., 11(2014), 1, 57–66.
  • [9] Pathak, P., Selvakumar, S. 2014, Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation, Digit. Investig., 11(2014), 1, 67–77.
  • [10] Holub, V., Fridrich, J. 2013, Random projections of residuals for digital image steganalysis, IEEE Trans. Inf. Forensics Secur., 8(2013), 12, 1996–2006.
  • [11] Gul, G., Kurugollu, F. 2013, JPEG image steganalysis using multivariate PDF estimates with MRF cliques, IEEE Trans. Inf. Forensics Secur., 8(2013), 3, 578–587.
  • [12] Cho, S., Cha, B.-H., Gawecki, M., Jay Kuo, C.-C. 2013, Block-based image steganalysis: Algorithm and performance evaluation. J. Vis. Commun. Image Represent., 24(2013), 7, 846–856.
  • [13] Chen, G., Zhang, D., Zhu, W., Tao, Q., Zhang, C., Ruan, J. 2012, On optimal feature selection using harmony search for image steganalysis. in Proceedings - International Conference on Natural Computation, 1074–1078.
  • [14] Zong, H., Liu, F. L., Luo, X. Y. 2012, Blind image steganalysis based on wavelet coefficient correlation, Digit. Investig., 9(2012), 1, 58–68.
  • [15] Dai, Z., Xiong, Q., Peng, Y., Gao, H. 2012, Research on the large scale image steganalysis technology based on cloud computing and BP neutral network, in Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012, 415–419.
  • [16] Liu Q., M., Sung, A. H., Qiao, M., 2008, Detecting information-hiding in WAV audios,. Pattern Recognition, 19th International Conference on, 1051-4651.
  • [17] Ren, Y. , Cai, T., Tang, M., Wang, L. 2015, AMR steganalysis based on the probability of same pulse position, IEEE Trans. Inf. Forensics Secur., 10(2015), 9, 1801–1811.
  • [18] Yavanoglu, U., Ozcakmak, B., Milletsever, O. 2012, A New Intelligent Steganalysis Method for Waveform Audio Files, 11th Int. Conf. Mach. Learn. Appl., Dec, 233–239.
  • [19] Microsoft Wave. 2018. http://soundfile.sapp.org/doc/WaveFormat (Accessed: 29.04.2018).
  • [20] Stanley, C. A. 2005, Pairs of Values and the Chi-squared Attack, 1–45.
  • [21] Westfeld, A., Pfitzmann, A. 2000, Attacks on Steganographic Systems Steganos, S-Tools and Some Lessons Learned, 1–16.
  • [22] Şahin, A. 2007, “New Methods on Image Steganography and Their Reliabilities, Trakya University, Natural and Applied Sciences, Ph.D. Thesis, Trakya.
  • [23] Yalman, Y. 2010, Design And Implementation Of A Steganography Method Based On Histogram Modification For Digital Images, Kocaeli University, Natural and Applied Sciences, Ph.D. Thesis, Kocaeli.
  • [24] Fridrich, J., Long, M. 2000, Steganalysis of LSB encoding in color images, IEEE Int. Conf. Multimed. Expo. ICME2000. Proceedings. Latest Adv. Fast Chang. World Multimed. 3(2000), c, 1279–1282.
  • [25] Fridrich, J., Goljan, M. 2002, Practical Steganalysis of Digital Images – State of the Art, Apr., 1–13.
  • [26] Farid, H. 2002, Detecting hidden messages using higher-order statistical models, in Proceedings. International Conference on Image Processing, 2, II-905-II-908.
  • [27] Farid, H. 2001, Detecting Steganographic Messages in Digital Images, Technical Report, Oct.
  • [28] Youtube, 2018. http://www.youtube.com (Accessed: 29.04.2018).
  • [29] Audacity, 2018. http://www.audacityteam.org (Accessed: 29.04.2018).
  • [30] Wav source, 2018. http://www.wavsource.com (Accessed: 29.04.2018).
  • [31] Daily Wav, 2018. http://www.dailywav.com (Accessed: 29.04.2018).

Farklı İçeriklere Sahip Wav Ses Dosyalarında Ki-kare Steganaliz Atağına Karşı Sağlamlık Değerlendirmesi

Yıl 2020, Cilt: 36 Sayı: 2, 178 - 192, 17.08.2020

Öz



Özet: Bu çalışmada, farklı
içerikli wav ses dosyalarına LSB(Least Significant Bit) yöntemi ile gizlenen
veriler ki-kare yöntemiyle steganaliz edilmiştir. Çalışmada müzik, insan ve
hayvan seslerinden 3 kategoride 4500 farklı wav ses dosyasına farklı
oranlarda veriler gizlenmiştir. Bu çalışmada ki-kare steganaliz yöntemi diğer
çalışmalardan farklı olarak imgeler yerine wav ses dosyalarına uyarlanmıştır.
Deney sonuçlarına göre benzersiz ses örnekleri (insan veya müzik ses
örnekleri) içeren wav ses dosyalarına gizlenen verilerin ki-kare steganaliz
yöntemi tarafından tespit edilemediği gözlenmiştir. Benzer ses örnekleri
(hayvan ses örnekleri) içeren dosyalarda ise gizlenen veriler ki-kare
steganaliz yöntemi tarafından tespit edilmiştir.


Kaynakça

  • [1] Kuo, W.-C., Kuo, S.-H., Wang, C.-C., Wuu, L.-C. 2016. High capacity data hiding scheme based on multi-bit encoding function. Opt. - Int. J. Light Electron Opt, 127(2016), 4, 1762–1769.
  • [2] Wu, A., Feng, G., Zhang, X., Ren, Y. 2016. Unbalanced JPEG image steganalysis via multiview data match. J. Vis. Commun. Image Represent, 34(2016), 103–107.
  • [3] Li, M., Liu, Q. 2015. Steganalysis of SS Steganography: Hidden Data Identification and Extraction. Circuits, Syst. Signal Process, 34(2015), 10, 3305–3324.
  • [4] Holub, V., Fridrich, J. 2015, Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur., 10(2015), 2, 219–228.
  • [5] Nouri, R., Mansouri, A. 2015. Blind image steganalysis based on reciprocal singular value curve. in Machine Vision and Image Processing (MVIP), 2015 9th Iranian Conference on, 124–127.
  • [6] Mohammadi, F. G., Abadeh, M. S. 2014. Image steganalysis using a bee colony based feature selection algorithm. Eng. Appl. Artif. Intell., 31(2014), 35–43.
  • [7] Zhang, H., Ping, X. J., Xu, M. K., Wang, R. 2014, Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction. Sci. China Inf. Sci., 57(2014), 4, 1–7.
  • [8] Lu, J. C., Liu, F. L., Luo, X. Y. 2014, Selection of image features for steganalysis based on the Fisher criterion, Digit. Investig., 11(2014), 1, 57–66.
  • [9] Pathak, P., Selvakumar, S. 2014, Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation, Digit. Investig., 11(2014), 1, 67–77.
  • [10] Holub, V., Fridrich, J. 2013, Random projections of residuals for digital image steganalysis, IEEE Trans. Inf. Forensics Secur., 8(2013), 12, 1996–2006.
  • [11] Gul, G., Kurugollu, F. 2013, JPEG image steganalysis using multivariate PDF estimates with MRF cliques, IEEE Trans. Inf. Forensics Secur., 8(2013), 3, 578–587.
  • [12] Cho, S., Cha, B.-H., Gawecki, M., Jay Kuo, C.-C. 2013, Block-based image steganalysis: Algorithm and performance evaluation. J. Vis. Commun. Image Represent., 24(2013), 7, 846–856.
  • [13] Chen, G., Zhang, D., Zhu, W., Tao, Q., Zhang, C., Ruan, J. 2012, On optimal feature selection using harmony search for image steganalysis. in Proceedings - International Conference on Natural Computation, 1074–1078.
  • [14] Zong, H., Liu, F. L., Luo, X. Y. 2012, Blind image steganalysis based on wavelet coefficient correlation, Digit. Investig., 9(2012), 1, 58–68.
  • [15] Dai, Z., Xiong, Q., Peng, Y., Gao, H. 2012, Research on the large scale image steganalysis technology based on cloud computing and BP neutral network, in Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012, 415–419.
  • [16] Liu Q., M., Sung, A. H., Qiao, M., 2008, Detecting information-hiding in WAV audios,. Pattern Recognition, 19th International Conference on, 1051-4651.
  • [17] Ren, Y. , Cai, T., Tang, M., Wang, L. 2015, AMR steganalysis based on the probability of same pulse position, IEEE Trans. Inf. Forensics Secur., 10(2015), 9, 1801–1811.
  • [18] Yavanoglu, U., Ozcakmak, B., Milletsever, O. 2012, A New Intelligent Steganalysis Method for Waveform Audio Files, 11th Int. Conf. Mach. Learn. Appl., Dec, 233–239.
  • [19] Microsoft Wave. 2018. http://soundfile.sapp.org/doc/WaveFormat (Accessed: 29.04.2018).
  • [20] Stanley, C. A. 2005, Pairs of Values and the Chi-squared Attack, 1–45.
  • [21] Westfeld, A., Pfitzmann, A. 2000, Attacks on Steganographic Systems Steganos, S-Tools and Some Lessons Learned, 1–16.
  • [22] Şahin, A. 2007, “New Methods on Image Steganography and Their Reliabilities, Trakya University, Natural and Applied Sciences, Ph.D. Thesis, Trakya.
  • [23] Yalman, Y. 2010, Design And Implementation Of A Steganography Method Based On Histogram Modification For Digital Images, Kocaeli University, Natural and Applied Sciences, Ph.D. Thesis, Kocaeli.
  • [24] Fridrich, J., Long, M. 2000, Steganalysis of LSB encoding in color images, IEEE Int. Conf. Multimed. Expo. ICME2000. Proceedings. Latest Adv. Fast Chang. World Multimed. 3(2000), c, 1279–1282.
  • [25] Fridrich, J., Goljan, M. 2002, Practical Steganalysis of Digital Images – State of the Art, Apr., 1–13.
  • [26] Farid, H. 2002, Detecting hidden messages using higher-order statistical models, in Proceedings. International Conference on Image Processing, 2, II-905-II-908.
  • [27] Farid, H. 2001, Detecting Steganographic Messages in Digital Images, Technical Report, Oct.
  • [28] Youtube, 2018. http://www.youtube.com (Accessed: 29.04.2018).
  • [29] Audacity, 2018. http://www.audacityteam.org (Accessed: 29.04.2018).
  • [30] Wav source, 2018. http://www.wavsource.com (Accessed: 29.04.2018).
  • [31] Daily Wav, 2018. http://www.dailywav.com (Accessed: 29.04.2018).
Toplam 31 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Diğer
Yazarlar

Ali Durdu 0000-0002-5347-4491

Yayımlanma Tarihi 17 Ağustos 2020
Yayımlandığı Sayı Yıl 2020 Cilt: 36 Sayı: 2

Kaynak Göster

APA Durdu, A. (2020). An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi, 36(2), 178-192.
AMA Durdu A. An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi. Ağustos 2020;36(2):178-192.
Chicago Durdu, Ali. “An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files With Various Content”. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi 36, sy. 2 (Ağustos 2020): 178-92.
EndNote Durdu A (01 Ağustos 2020) An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi 36 2 178–192.
IEEE A. Durdu, “An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content”, Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi, c. 36, sy. 2, ss. 178–192, 2020.
ISNAD Durdu, Ali. “An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files With Various Content”. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi 36/2 (Ağustos 2020), 178-192.
JAMA Durdu A. An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi. 2020;36:178–192.
MLA Durdu, Ali. “An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files With Various Content”. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi, c. 36, sy. 2, 2020, ss. 178-92.
Vancouver Durdu A. An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi. 2020;36(2):178-92.

✯ Etik kurul izni gerektiren, tüm bilim dallarında yapılan araştırmalar için etik kurul onayı alınmış olmalı, bu onay makalede belirtilmeli ve belgelendirilmelidir.
✯ Etik kurul izni gerektiren araştırmalarda, izinle ilgili bilgilere (kurul adı, tarih ve sayı no) yöntem bölümünde, ayrıca makalenin ilk/son sayfalarından birinde; olgu sunumlarında, bilgilendirilmiş gönüllü olur/onam formunun imzalatıldığına dair bilgiye makalede yer verilmelidir.
✯ Dergi web sayfasında, makalelerde Araştırma ve Yayın Etiğine uyulduğuna dair ifadeye yer verilmelidir.
✯ Dergi web sayfasında, hakem, yazar ve editör için ayrı başlıklar altında etik kurallarla ilgili bilgi verilmelidir.
✯ Dergide ve/veya web sayfasında, ulusal ve uluslararası standartlara atıf yaparak, dergide ve/veya web sayfasında etik ilkeler ayrı başlık altında belirtilmelidir. Örneğin; dergilere gönderilen bilimsel yazılarda, ICMJE (International Committee of Medical Journal Editors) tavsiyeleri ile COPE (Committee on Publication Ethics)’un Editör ve Yazarlar için Uluslararası Standartları dikkate alınmalıdır.
✯ Kullanılan fikir ve sanat eserleri için telif hakları düzenlemelerine riayet edilmesi gerekmektedir.