Yıl: 2020 Cilt: 36 Sayı: 2 Sayfa Aralığı: 178 - 192 Metin Dili: İngilizce İndeks Tarihi: 22-10-2020

An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content

Öz:
This paper presents the performance of the chi-square method for steganalysis purposes on audio files through various content. Predetermined rates of stego data have been embedded into 4500 distinct cover wav files via LSB (Least Significant Bit) method using three types of audio input files: music, human voice, animal sounds. Results of the experiment have revealed that hidden data in wav filescontaining dissimilar audio samples cannot be easily detected by chi-square steganalysis method. However, wav files containing similar audio samplesdemonstrate better performance compared to dissimilar samples
Anahtar Kelime:

Farklı İçeriklere Sahip Wav Ses Dosyalarında Ki-kare Steganaliz Atağına Karşı Sağlamlık Değerlendirmesi

Öz:
Bu çalışmada, farklı içerikli wav ses dosyalarına LSB(Least Significant Bit) yöntemi ile gizlenen veriler ki-kare yöntemiyle steganaliz edilmiştir. Çalışmada müzik, insan ve hayvan seslerinden 3 kategoride 4500 farklı wav ses dosyasına farklı oranlarda veriler gizlenmiştir. Bu çalışmada ki-kare steganaliz yöntemi diğer çalışmalardan farklı olarak imgeler yerine wav ses dosyalarına uyarlanmıştır. Deney sonuçlarına göre benzersiz ses örnekleri (insan veya müzik ses örnekleri) içeren wav ses dosyalarına gizlenen verilerin ki-kare steganaliz yöntemi tarafından tespit edilemediği gözlenmiştir. Benzer ses örnekleri (hayvan ses örnekleri) içeren dosyalarda ise gizlenen veriler ki-kare steganaliz yöntemi tarafından tespit edilmiştir
Anahtar Kelime:

Belge Türü: Makale Makale Türü: Araştırma Makalesi Erişim Türü: Erişime Açık
  • [1] Kuo, W.-C., Kuo, S.-H., Wang, C.-C., Wuu, L.-C. 2016. High capacity data hiding scheme based on multi-bit encoding function. Opt. - Int. J. Light Electron Opt, 127(2016), 4, 1762–1769.
  • [2] Wu, A., Feng, G., Zhang, X., Ren, Y. 2016. Unbalanced JPEG image steganalysis via multiview data match. J. Vis. Commun. Image Represent, 34(2016), 103–107.
  • [3] Li, M., Liu, Q. 2015. Steganalysis of SS Steganography: Hidden Data Identification and Extraction. Circuits, Syst. Signal Process, 34(2015), 10, 3305–3324.
  • [4] Holub, V., Fridrich, J. 2015, Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur., 10(2015), 2, 219–228.
  • [5] Nouri, R., Mansouri, A. 2015. Blind image steganalysis based on reciprocal singular value curve. in Machine Vision and Image Processing (MVIP), 2015 9th Iranian Conference on, 124–127.
  • [6] Mohammadi, F. G., Abadeh, M. S. 2014. Image steganalysis using a bee colony based feature selection algorithm. Eng. Appl. Artif. Intell., 31(2014), 35–43.
  • [7] Zhang, H., Ping, X. J., Xu, M. K., Wang, R. 2014, Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction. Sci. China Inf. Sci., 57(2014), 4, 1–7.
  • [8] Lu, J. C., Liu, F. L., Luo, X. Y. 2014, Selection of image features for steganalysis based on the Fisher criterion, Digit. Investig., 11(2014), 1, 57–66.
  • [9] Pathak, P., Selvakumar, S. 2014, Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation, Digit. Investig., 11(2014), 1, 67–77.
  • [10] Holub, V., Fridrich, J. 2013, Random projections of residuals for digital image steganalysis, IEEE Trans. Inf. Forensics Secur., 8(2013), 12, 1996–2006.
  • [11] Gul, G., Kurugollu, F. 2013, JPEG image steganalysis using multivariate PDF estimates with MRF cliques, IEEE Trans. Inf. Forensics Secur., 8(2013), 3, 578–587.
  • [12] Cho, S., Cha, B.-H., Gawecki, M., Jay Kuo, C.-C. 2013, Block-based image steganalysis: Algorithm and performance evaluation. J. Vis. Commun. Image Represent., 24(2013), 7, 846–856.
  • [13] Chen, G., Zhang, D., Zhu, W., Tao, Q., Zhang, C., Ruan, J. 2012, On optimal feature selection using harmony search for image steganalysis. in Proceedings - International Conference on Natural Computation, 1074–1078.
  • [14] Zong, H., Liu, F. L., Luo, X. Y. 2012, Blind image steganalysis based on wavelet coefficient correlation, Digit. Investig., 9(2012), 1, 58–68.
  • [15] Dai, Z., Xiong, Q., Peng, Y., Gao, H. 2012, Research on the large scale image steganalysis technology based on cloud computing and BP neutral network, in Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012, 415–419.
  • [16] Liu Q., M., Sung, A. H., Qiao, M., 2008, Detecting information-hiding in WAV audios,. Pattern Recognition, 19th International Conference on, 1051-4651.
  • [17] Ren, Y. , Cai, T., Tang, M., Wang, L. 2015, AMR steganalysis based on the probability of same pulse position, IEEE Trans. Inf. Forensics Secur., 10(2015), 9, 1801–1811.
  • [18] Yavanoglu, U., Ozcakmak, B., Milletsever, O. 2012, A New Intelligent Steganalysis Method for Waveform Audio Files, 11th Int. Conf. Mach. Learn. Appl., Dec, 233–239.
  • [19] Microsoft Wave. 2018. http://soundfile.sapp.org/doc/WaveFormat (Accessed: 29.04.2018).
  • [20] Stanley, C. A. 2005, Pairs of Values and the Chi-squared Attack, 1–45.
  • [21] Westfeld, A., Pfitzmann, A. 2000, Attacks on Steganographic Systems Steganos, S-Tools and Some Lessons Learned, 1–16.
  • [22] Şahin, A. 2007, “New Methods on Image Steganography and Their Reliabilities, Trakya University, Natural and Applied Sciences, Ph.D. Thesis, Trakya.
  • [23] Yalman, Y. 2010, Design And Implementation Of A Steganography Method Based On Histogram Modification For Digital Images, Kocaeli University, Natural and Applied Sciences, Ph.D. Thesis, Kocaeli.
  • [24] Fridrich, J., Long, M. 2000, Steganalysis of LSB encoding in color images, IEEE Int. Conf. Multimed. Expo. ICME2000. Proceedings. Latest Adv. Fast Chang. World Multimed. 3(2000), c, 1279–1282.
  • [25] Fridrich, J., Goljan, M. 2002, Practical Steganalysis of Digital Images – State of the Art, Apr., 1–13.
  • [26] Farid, H. 2002, Detecting hidden messages using higher-order statistical models, in Proceedings. International Conference on Image Processing, 2, II-905-II-908.
  • [27] Farid, H. 2001, Detecting Steganographic Messages in Digital Images, Technical Report, Oct.
  • [28] Youtube, 2018. http://www.youtube.com (Accessed: 29.04.2018).
  • [29] Audacity, 2018. http://www.audacityteam.org (Accessed: 29.04.2018).
  • [30] Wav source, 2018. http://www.wavsource.com (Accessed: 29.04.2018).
  • [31] Daily Wav, 2018. http://www.dailywav.com (Accessed: 29.04.2018).
APA DURDU A (2020). An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. , 178 - 192.
Chicago DURDU Ali An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. (2020): 178 - 192.
MLA DURDU Ali An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. , 2020, ss.178 - 192.
AMA DURDU A An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. . 2020; 178 - 192.
Vancouver DURDU A An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. . 2020; 178 - 192.
IEEE DURDU A "An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content." , ss.178 - 192, 2020.
ISNAD DURDU, Ali. "An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content". (2020), 178-192.
APA DURDU A (2020). An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 36(2), 178 - 192.
Chicago DURDU Ali An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi 36, no.2 (2020): 178 - 192.
MLA DURDU Ali An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi, vol.36, no.2, 2020, ss.178 - 192.
AMA DURDU A An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi. 2020; 36(2): 178 - 192.
Vancouver DURDU A An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi. 2020; 36(2): 178 - 192.
IEEE DURDU A "An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content." Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 36, ss.178 - 192, 2020.
ISNAD DURDU, Ali. "An Evaluation of the Robustness Chi-Square Steganalysis Method on Wav Audio Files with Various Content". Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi 36/2 (2020), 178-192.