skip to main content
10.1145/2656434.2656438acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Probabilistically detecting steganography within MP3 files

Published:13 October 2014Publication History

ABSTRACT

A powerful application named MP3Stegazaurus was recently created by Illinois Institute of Technology (IIT) student Mikhail Zaturenskiy which exploits a not-so-well-known feature present in MP3 files. [8] By overwriting areas that are either skipped or ignored by MP3 playing and decoding applications, MP3Stegazaurus can use any MP3 file to safely store covert information in a manner that is difficult, if not impossible, for the average user to detect. This is especially true since it leaves an MP3 file's audio information untouched. As a result of research and work which took place during the first half of a student project, the author developed MP3StegDetector; an application which examines the interesting, non-audio-information-containing portions of MP3 files in order to determine and report whether, and where, steganography may be present. In addition to detecting the potential presence of steganography, MP3StegDetector extracts and outputs the information contained within each of the interesting portions of a given MP3 file. If a complete file such as a JPEG image, PDF document, or AES-encrypted file is identified within this extracted information, MP3StegDetector will extract and recompose it. In order to determine exactly where in MP3 files these interesting portions exist, the author carried out extensive research on the MP3 file's post-encoding format. This research is included in this document along with details of how MP3StegDetector's various scanning functions and features have been implemented.

References

  1. Bosi, Marina, and Richard E. Goldberg. Introduction to Digital Audio Coding and Standards. Boston: Kluwer Academic, 2003. Print. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Hacker, Scot. MP3: The Definitive Guide. Sebastopol: O'Reilly Media, 2000. Print. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Maciak, Lukasz G., Michael A. Ponniah, and Renu Sharma. MP3 Steganography: Applying Steganography to Music Captioning.Google ScholarGoogle Scholar
  4. Nilsson, Martin, "ID3 tag version 2.3.0", 1999 ID3, http://www.id3.org/id3v2.3.0Google ScholarGoogle Scholar
  5. Raissi, Rassol. The Theory Behind MP3.Google ScholarGoogle Scholar
  6. Ruckert, Martin. Understanding MP3: Syntax, Semantics, Mathematics, and Algorithms. Wiesbaden: Vieweg, 2005. Print. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Supurovic, Predrag, "MPEG Audio Frame Header", 1999 DataVoyage, http://www.datavoyage.com/mpgscript/mpeghdr.htmGoogle ScholarGoogle Scholar
  8. Zaturenskiy, Mikhail. "MP3 Files as a Steganography Medium." Illinois Institute of Technology, 2013.Google ScholarGoogle Scholar

Index Terms

  1. Probabilistically detecting steganography within MP3 files

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              RIIT '14: Proceedings of the 3rd annual conference on Research in information technology
              October 2014
              98 pages
              ISBN:9781450327114
              DOI:10.1145/2656434

              Copyright © 2014 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 13 October 2014

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              RIIT '14 Paper Acceptance Rate14of39submissions,36%Overall Acceptance Rate51of116submissions,44%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader