Peak-Shaped-Based Steganographic Technique for MP3 Audio

Abstract

The aim of this work is the development of a steganographic technique for the MP3 audio format, which is based on the Peak Shaped Model algorithm used for JPEG images. The proposed method relies on the statistical properties of MP3 samples, which are compressed by a Modified Discrete Cosine Transform (MDCT). After the conversion of MP3, it’s possible to hide some secret information by replacing the least significant bit of the MDCT coefficients. Those coefficients are chosen according to the statistical relevance of each coefficient within the distribution. The performance analysis has been made by calculating three steganographic parameters: the Embedding Capacity, the Embedding Efficiency and the PSNR. It has been also simulated an attack with the Chi-Square test and the results have been used to plot the ROC curve, in order to calculate the error probability. Performances have been compared with performances of other existing techniques, showing interesting results.

Share and Cite:

R. Pinardi, F. Garzia and R. Cusani, "Peak-Shaped-Based Steganographic Technique for MP3 Audio," Journal of Information Security, Vol. 4 No. 1, 2013, pp. 12-18. doi: 10.4236/jis.2013.41003.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] G. Kipper, “Investigator’s Guide to Steganography,” Auerbach Publications, Boca Raton, 2003. doi:10.1201/9780203504765
[2] P. Sallee, “Model-based Steganography,” Springer Verlang, Berlin, 2004.
[3] A. Spanias, T. Painter and V. Atti, “Audio Signal Process And Coding,” John Wiley and Sons, Hoboken, 2007. doi:10.1002/0470041978
[4] U. Zolzer, “Digital Audio Signal Processing,” John Wiley and Sons, Hoboken, 2008. doi:10.1002/9780470680018
[5] J. S. Jacaba, “Audio Compression Using Modified Discrete Cosine Transform: The MP3 Coding Standard,” University of the Philippines, Manila, 2001.
[6] L. Rossi, F. Garzia and R. Cusani, “Peak-Shaped-Based Steganographic Technique for JPEG Images,” EURASIP Journal on Information Security, 2009, Article ID: 382310-382317. doi:10.1155/2009/382310
[7] R. Yu, X. Lin, S. Rahardja and C. C. Ko, “A Statistic Study of the MDCT Coefficient Distribution for Audio,” IEEE International Conference on Multimedia and Expo, Taipei, 30-30 June 2004, pp. 1483-1486.
[8] D. Liu, H. Zhang, M. Polycaropou, C. Alippi and H. He, “Advances in Neural Networks,” Springer Verlag, Berlin, 2011.
[9] R. Bohme, “Advanced Statistical Steganalysis,” Springer, Berlin, 2010.
[10] K. B. Shiva Kumar, K. B. Raja and R. K. Chhotaray, “Sabyasachi Pattanaik, Bit Length Replacement Steganography Based on DCT Coefficients,” International Journal of Engineering Science and Technology, Vol. 2, No. 8, 2010, pp. 3561-3570.
[11] A. Westfeld, “F5-A Steganographic Algorithm,” Springer Verlang, Berlin, 2001.
[12] K. Lee, A. Westfeld and S. Lee, “Category Attack for LSB Steganalysis of JPEG Images,” Springer Verlang, Berlin, 2006.
[13] T. Zhang and X. Ping, “A Fast and Effective Steganalytic Technique against Jsteg-Like Algorithms,” Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), Melbourne, 9-12 March 2003, pp. 307-311.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.