Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "d36ed843-0e10-464e-94ef-adaeef79f1ff"}, "_deposit": {"id": "3997", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3997"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3997", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Active Steganalysis of MP3Stego", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The goal of steganalysis is to detect and/or estimatepotentially hidden information from observed data.Steganalysis not only plays a significant role ininformation countermeasures, but also can preventthe illicit use of steganography. This paper developsan active steganalysis system for detecting hiddenmessages, by estimating frames with hidden messageand message length in compressed audio filesproduced by MP3Stego. Principle ComponentAnalysis (PCA) is applied not only to estimateuncorrelated components but also help to detectwhether the received MP3 streams are steganographyor original. In this steganalysis system, hiddenmessages can be detected in the PCA (whitening)stage. Independent Component Analysis (ICA)attempts to separate a set of steganographic signalsfrom original signals. By analyzing the nature ofMP3 signals (frame header, side information), framewith secret message can be detected. The results ofempirical tests reach 97% and conclude thatdetection accuracy of the proposed steganalysissystem is convenient for MP3Stego embeddedcontents. Experiments shows that the proposedmethod can be used quite effectively to detectlocations of messages embedded using nature of MP3signal."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Steganalysis"}, {"interim": "MP3"}, {"interim": "Principle Component Analysis (PCA)"}, {"interim": "Independent Component Analysis (ICA)"}, {"interim": "Part2_3_length"}, {"interim": "Global_gain"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12066.pdf", "filesize": [{"value": "353 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 353000.0, "url": {"url": "https://meral.edu.mm/record/3997/files/12066.pdf"}, "version_id": "7636c596-9c5d-47da-85c3-ec022602ddfa"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Twelfth International Conference On Computer Applications (ICCA 2014)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Tint, Yawai"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2014-02-17"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/171"}, "item_title": "Active Steganalysis of MP3Stego", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003997", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3997", "relation": {}, "relation_version_is_last": true, "title": ["Active Steganalysis of MP3Stego"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Active Steganalysis of MP3Stego

http://hdl.handle.net/20.500.12678/0000003997
http://hdl.handle.net/20.500.12678/0000003997
479fabad-12c1-4e31-9f05-ad274f67102e
d36ed843-0e10-464e-94ef-adaeef79f1ff
None
Preview
Name / File License Actions
12066.pdf 12066.pdf (353 Kb)
Publication type
Article
Upload type
Publication
Title
Title Active Steganalysis of MP3Stego
Language en
Publication date 2014-02-17
Authors
Tint, Yawai
Mya, Khin Than
Description
The goal of steganalysis is to detect and/or estimatepotentially hidden information from observed data.Steganalysis not only plays a significant role ininformation countermeasures, but also can preventthe illicit use of steganography. This paper developsan active steganalysis system for detecting hiddenmessages, by estimating frames with hidden messageand message length in compressed audio filesproduced by MP3Stego. Principle ComponentAnalysis (PCA) is applied not only to estimateuncorrelated components but also help to detectwhether the received MP3 streams are steganographyor original. In this steganalysis system, hiddenmessages can be detected in the PCA (whitening)stage. Independent Component Analysis (ICA)attempts to separate a set of steganographic signalsfrom original signals. By analyzing the nature ofMP3 signals (frame header, side information), framewith secret message can be detected. The results ofempirical tests reach 97% and conclude thatdetection accuracy of the proposed steganalysissystem is convenient for MP3Stego embeddedcontents. Experiments shows that the proposedmethod can be used quite effectively to detectlocations of messages embedded using nature of MP3signal.
Keywords
Steganalysis, MP3, Principle Component Analysis (PCA), Independent Component Analysis (ICA), Part2_3_length, Global_gain
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/171
Journal articles
Twelfth International Conference On Computer Applications (ICCA 2014)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:52:47.209735
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL