4.5 Article

Steganography for MP3 audio by exploiting the rule of window switching

Journal

COMPUTERS & SECURITY
Volume 31, Issue 5, Pages 704-716

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2012.04.006

Keywords

Steganography; Window switching; MP3; Encoding parameters; Undetectability

Funding

  1. National Natural Science Foundation of China [61170137]
  2. Doctoral Foundation of Ministry of Education of China [20103305110002]
  3. Scientific Research Fund of Zhejiang Provincial Education Department [Y201119434]
  4. Zhejiang Scientific and Technical Key Innovation Team of New Generation Mobile Internet Client Software [2010R50009]
  5. Outstanding (Postgraduate) Dissertation Growth Foundation of Ningbo University [10Y20100002]
  6. Ningbo University Foundation [XYL10002, XK1087]
  7. K.C. Wong Magna Fund in Ningbo University

Ask authors/readers for more resources

MP3 audio is a promising carrier format for covert communication because of its popularization. In this paper, we propose an MP3 steganographic method by exploiting the rule of window switching during encoding. The method carries out embedding by establishing a mapping relationship between the secret bit and the encoding parameter, namely window type. The proposed algorithm is fully compliant with MP3 compression standard and the distortion caused by steganography can be controlled automatically by the distortion adjustment mechanism of the encoder. Experimental results demonstrate that the proposed method introduces insignificant perceptual distortion and is statistically undetectable for the attack of block size analysis. (c) 2012 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Anti-forensics of fake stereo audio using generative adversarial network

Tianyun Liu, Diqun Yan, Nan Yan, Gang Chen

Summary: Fake-quality audio detection, specifically in the context of stereo-faked audio, is an important field in digital audio forensics. This study proposes an anti-forensic framework based on generative adversarial network to expose the weaknesses of stereo-faking detectors. By generating fake stereo audio using a mono audio, the researchers demonstrate that detection accuracy can significantly decrease while the false acceptance rate increases.

MULTIMEDIA TOOLS AND APPLICATIONS (2022)

Article Computer Science, Artificial Intelligence

Semi-supervised semantic segmentation with cross teacher training

Hui Xiao, Dong Li, Hao Xu, Shuibo Fu, Diqun Yan, Kangkang Song, Chengbin Peng

Summary: This study proposes a cross-teacher training framework with three modules, including a cross-teacher module, high-level contrastive learning module, and low-level contrastive learning module, to significantly improve traditional semi-supervised learning methods. Experimental results demonstrate that our framework outperforms state-of-the-art methods on benchmark datasets.

NEUROCOMPUTING (2022)

Review Acoustics

Black-box adversarial attacks through speech distortion for speech emotion recognition

Jinxing Gao, Diqun Yan, Mingyu Dong

Summary: This article introduces speech emotion recognition as a key branch of affective computing and explores the performance of different emotion recognition methods. The author improves the robustness of the model by using black-box attacks and finds the effectiveness of adversarial training in combating attacks.

EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING (2022)

Article Computer Science, Information Systems

NLPC: A nimble low-priority congestion control algorithm for high-speed and lossy networks

Yi Xie, Xianliang Jiang, Guang Jin, Ziyi Jiang, DiQun Yan

Summary: This paper introduces an enhanced LEDBAT protocol called NLPC, which aims to solve the throughput degradation issue of LEDBAT in high-speed and lossy networks. By introducing a variable gain value that can dynamically adapt to the network congestion degree to update the sending rate, NLPC increases throughput up to 40% compared to LEDBAT in high-speed lossy networks, while maintaining the low-priority feature as other LBE protocols.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Acoustics

Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise

Mingyu Dong, Diqun Yan, Yongkang Gong

Summary: This paper proposes a defense method to enhance the robustness and security of automatic speech recognition (ASR) systems against adversarial examples. It introduces an algorithm for devastating and detecting adversarial examples that can attack advanced ASR systems.

JOURNAL OF THE AUDIO ENGINEERING SOCIETY (2023)

Correction Computer Science, Artificial Intelligence

Semi-supervised semantic segmentation with cross teacher training (vol 508, pg 36, 2022)

Hui Xiao, Li Dong, Hao Xu, Shuibo Fu, Diqun Yan, Kangkang Song, Chengbin Peng

NEUROCOMPUTING (2023)

Article Computer Science, Information Systems

Imperceptible adversarial audio steganography based on psychoacoustic model

Lang Chen, Rangding Wang, Li Dong, Diqun Yan

Summary: Recently, deep learning based audio steganalysis methods have posed significant challenges to conventional audio steganography by demonstrating superior performance in detecting it. In this work, the authors propose an imperceptible audio steganography method based on a psychoacoustic model, taking into consideration the vulnerability of neural networks to adversarial examples. They use a two-stage optimization strategy to minimize the loss function and add perturbation to the stego audio to deceive the steganalyzer. Experimental results show that the proposed method outperforms conventional audio steganography schemes in terms of imperceptibility and undetectability.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Engineering, Electrical & Electronic

Non-intrusive speech quality assessment with attention-based ResNet-BiLSTM

Kailai Shen, Diqun Yan, Zhe Ye, Xianbo Xu, JinXing Gao, Li Dong, Chengbin Peng, Kun Yang

Summary: Speech quality in online conferencing applications is often influenced by various factors like background noise, reverberation, packet loss, and network jitter. It is challenging to evaluate the quality of conferencing speech without a clean reference signal. Therefore, an effective non-intrusive speech quality assessment method is needed. This paper proposes a network framework for NISQA based on ResNet and BiLSTM, which can extract local features and integrate representative features with long-term time dependencies and sequential characteristics. Experimental results show a strong correlation between the proposed method and the mean opinion score of clean, noisy, and processed speech.

SIGNAL IMAGE AND VIDEO PROCESSING (2023)

Article Acoustics

MSQAT: A multi-dimension non-intrusive speech quality assessment transformer utilizing self-supervised representations

Kailai Shen, Diqun Yan, Li Dong

Summary: This research proposes a framework called MSQAT, which includes three modules - ASTB, TAB, and RSTB, to enhance the interactions between local and global speech regions. Additionally, a two-branch structure is designed for better speech quality evaluation. Experimental results demonstrate that MSQAT achieves state-of-the-art performance on three standard datasets, and the pure attention model can achieve or surpass the performance of other CNN-attention hybrid models.

APPLIED ACOUSTICS (2023)

Article Engineering, Electrical & Electronic

Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger

Zhe Ye, Diqun Yan, Li Dong, Jiacheng Deng, Shui Yu

Summary: Deep learning has made significant progress in speaker recognition, but malicious third-party platforms pose a serious security threat through backdoor attacks. Existing speech backdoor attack methods use fixed and unnoticeable perturbations as triggers, which can still be detected. To overcome this, we propose PhaseBack, a novel backdoor attack paradigm that injects triggers in the phase spectrum, leveraging the insensitivity of the human ear to phase information. PhaseBack's effectiveness and stealthiness are demonstrated through extensive experiments on the Voxceleb1 dataset, and it also shows strong resistance against several defense methods.

IEEE SIGNAL PROCESSING LETTERS (2023)

Proceedings Paper Computer Science, Information Systems

Physical Anti-copying Semi-robust Random Watermarking for QR Code

Jiale Chen, Li Dong, Rangding Wang, Diqun Yan, Weiwei Sun, Hang-Yu Fan

Summary: In this work, a physical anti-copying semi-robust randomly watermarking system for QR code is proposed. By exploiting the distortion characteristics between authentic and counterfeit channels, a randomly watermark embedding system is devised. Experimental results demonstrate the effectiveness of the proposed watermarking system.

DIGITAL FORENSICS AND WATERMARKING, IWDW 2022 (2023)

Proceedings Paper Computer Science, Information Systems

Robust Document Image Forgery Localization Against Image Blending

Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan, Yuanman Li

Summary: Digital documents are increasingly being used as credible evidence, but they are vulnerable to forgery and manipulation. This study proposes a robust method for detecting document image forgery, using a neural network architecture and attention mechanisms to extract features and identify forgeries.

2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM (2022)

Article Engineering, Electrical & Electronic

Decision-Based Attack to Speaker Recognition System via Local Low-Frequency Perturbation

Jiacheng Deng, Li Dong, Rangding Wang, Rui Yang, Diqun Yan

Summary: This letter proposes a two-step query-efficient decision-based attack based on local low-frequency perturbation for speaker recognition systems, which achieves a higher attacking success rate.

IEEE SIGNAL PROCESSING LETTERS (2022)

Article Computer Science, Information Systems

Defending and Detecting Audio Adversarial Example using Frame Offsets

Yongkang Gong, Diqun Yan, Terui Mao, Donghua Wang, Rangding Wang

Summary: This study focuses on countermeasures against audio adversarial examples, finding that frame offsets with silence clip appended at the beginning of an audio can degenerate adversarial perturbations to normal noise. Different strategies like defending, detecting, and hybrid strategies are proposed to exploit frame offsets for various scenarios, offering a simpler, more generic, and efficient defense method against audio adversarial examples.

KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS (2021)

Article Computer Science, Information Systems

Adaptive Audio Steganography Based on Improved Syndrome-Trellis Codes

Kaiyu Ying, Rangding Wang, Yuzhen Lin, Diqun Yan

Summary: Syndrome-Trellis Code (STC) is a near-optimal convolutional method for adaptive steganography that improves embedding position control; an Adaptive-STC approach utilizes an adaptive parity-check matrix generation method to enhance steganography performance; the proposed method outperforms existing techniques in reducing embedding changes and improving audio quality.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)