Audio Stego Intrusion Detection System through Hybrid Neural Tree Model

Audio Stego Intrusion Detection System through Hybrid Neural Tree Model

S. Geetha, Siva S. Sivatha Sindhu
DOI: 10.4018/978-1-5225-0105-3.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Steganography and steganalysis in audio covers are significant research topics since audio data is becoming an appropriate cover to hide comprehensive documents or confidential data. This article proposes a hybrid neural tree model to enhance the performance of the AQM steganalyser. Practically, false negative errors are more expensive than the false positive errors, since they cause a greater loss to organizations. The proposed neural model is operating with the cost ratio of false negative errors to false positive errors of the steganalyser as the activation function. Empirical results show that the evolutionary neural tree model designed based on the asymmetric costs of false negative and false positive errors proves to be more effective and provides higher accuracy than the basic AQM steganalyser.
Chapter Preview
Top

Introduction

The aggressive environment, in which the electronic connection happening between two parties becomes susceptible, has led to a keen awareness to insist on communication security in networks. The emerging possibilities of contemporary hostilities by the adversaries have forced the use of new methodologies to protect resources and data from vulnerabilities, disclosures and also to safeguard the systems from network based attacks (Katzenbeisser et al., 2000). The significance of information confidentiality and integrity has led to an explosive growth in the domain of information hiding.

The two important aspects of information security are - Cryptography (Katzenbeisser et al., 2000) and steganography (Bender, 1996). Even though cryptography is a fundamental method of securing valuable information by making the message indecipherable to outsiders (Katzenbeisser et al., 2000), steganography is one step ahead by rendering the total communication invisible (Ozer et al., 2006). Steganography is thus the art of hiding the existence of communication by embedding secret messages into naive, innocuous looking cover files, such as digital images, videos, sound files etc. (Ozer et al., 2006). Clearly the purpose of steganography is to evade drawing suspicion towards the transmission of hidden information. Many creative methods have been devised and employed in hiding process that reduces the detectable artifacts of the stego documents. A message could be hidden information in any form – raw text, cipher text, audios, images, i.e., anything that can be represented as bit stream (Katzenbeisser et al., 2000). This message is hidden inside a cover- object to create a stego-object. The process may be represented as:

Cover Object + Embedded Secret Message + Stego-Key = Stego Object(1)

Just like any other technology, even steganography has been observed to be misused by criminals and anti-social elements across the internet (Westfeld et al., 1999) (Siwei et al., 2006). With the extensive use and profusion of free steganography tools on the internet, law enforcement authorities have serious concerns over the trafficking of superfluous and unsolicited material in the form of web page images, audio and other files. Hence methods which detect such hidden information and understand the overall organization of this technology is vital in revealing these activities. To accomplish the intention of exposing such activities, steganalysis is being employed.

Steganalysis is the art and science of finding the presence of secret messages hidden using steganography (Westfeld et al., 1999). The aim of steganalysis process is to collect ample evidence about the presence of embedded information and to crack the security of its carrier object, thus defeating the primary purpose of steganography. The significance of steganalytic techniques that can reliably find the presence of hidden information in digital media is increasing. Steganalysis is thus fitting itself as an inevitable element into cyber warfare, computer forensics, internet-based criminal activity tracking, and collecting enough evidence for investigations particularly against the anti-social constituents (Westfeld et al., 1999; Cachin, 1998).

Key Terms in this Chapter

Audio Quality Metrics: The quality metrics measured between an audio and its de-noised version, that will vary considerably between a clean and a stego audio file and thus provide clues for audio steganalysis.

Audio Stego Intrusion Detection Systems: The complete security system that will be deployed in the gateway of a network that will perform audio steganalaysis and inform the system administrator in case of finding any suspicious stego audio files.

Audio Steganalysis: The process of detecting the presence or absence of hidden messages inside audio files.

Hybrid Neural Tree Classifier: The ensemble neural network-C4.5 decision tree machine learning paradigm that is used to develop the audio steganalyser model which possess good generalization ability as well as descriptive power for explaining the knowledge in constructing the model.

Feature Normalization: The process carried out on the features extracted from the test audio files so as to make all the values available in a uniform range of 0 to 1.

Audio Cover Object: The audio file that is used to hide the secret as a payload inside it by any of the steganographic algorithms.

Blind Steganalysis: The process of performing steganalysis without any knowledge about the cover audio file used, steganography algorithm used and the type of payload.

Complete Chapter List

Search this Book:
Reset