Real-time audio steganography attack based on automatic objective quality feedback

Qilin Qi, Aaron Sharp, Dongming Peng, Hamid Sharif

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Digital audio signal provides a large capacity for embedding hidden messages using digital steganography techniques. How to prevent hazardous steganography embedding on the Internet becomes an important task in the field of network security. For the Internet environment, the steganography attack method is required to be generic and real time. An active warden-based attack method is potential to be a generic method for the steganography attack. A discrete spring transform (DST)-based generic active warden steganography attack framework has been proposed by us. In this paper, based on the DST, a real-time steganography attack method is proposed. The potential unauthorized hidden message is removed in a real-time manner when uploading or downloading the audio signal. The real-time signal perceptual quality control is achieved by the automatic feedback from the objective audio quality evaluation model. The attack parameters are adaptively changed to reach a balance between the attack performance and the audio signal quality. The simulation results validate the proposed method in terms of the steganography attack performance and the audio signal quality after the attack.

Original languageEnglish (US)
Pages (from-to)737-746
Number of pages10
JournalSecurity and Communication Networks
Volume9
Issue number8
DOIs
StatePublished - May 25 2016

Fingerprint

Steganography
Feedback
Internet
Network security
Quality control

Keywords

  • Audio signal processing
  • Objective audio quality
  • Steganography

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Cite this

Real-time audio steganography attack based on automatic objective quality feedback. / Qi, Qilin; Sharp, Aaron; Peng, Dongming; Sharif, Hamid.

In: Security and Communication Networks, Vol. 9, No. 8, 25.05.2016, p. 737-746.

Research output: Contribution to journalArticle

@article{d804a8b1dfce49468e42ddcc6206c6b3,
title = "Real-time audio steganography attack based on automatic objective quality feedback",
abstract = "Digital audio signal provides a large capacity for embedding hidden messages using digital steganography techniques. How to prevent hazardous steganography embedding on the Internet becomes an important task in the field of network security. For the Internet environment, the steganography attack method is required to be generic and real time. An active warden-based attack method is potential to be a generic method for the steganography attack. A discrete spring transform (DST)-based generic active warden steganography attack framework has been proposed by us. In this paper, based on the DST, a real-time steganography attack method is proposed. The potential unauthorized hidden message is removed in a real-time manner when uploading or downloading the audio signal. The real-time signal perceptual quality control is achieved by the automatic feedback from the objective audio quality evaluation model. The attack parameters are adaptively changed to reach a balance between the attack performance and the audio signal quality. The simulation results validate the proposed method in terms of the steganography attack performance and the audio signal quality after the attack.",
keywords = "Audio signal processing, Objective audio quality, Steganography",
author = "Qilin Qi and Aaron Sharp and Dongming Peng and Hamid Sharif",
year = "2016",
month = "5",
day = "25",
doi = "10.1002/sec.1150",
language = "English (US)",
volume = "9",
pages = "737--746",
journal = "Security and Communication Networks",
issn = "1939-0114",
publisher = "John Wiley and Sons Inc.",
number = "8",

}

TY - JOUR

T1 - Real-time audio steganography attack based on automatic objective quality feedback

AU - Qi, Qilin

AU - Sharp, Aaron

AU - Peng, Dongming

AU - Sharif, Hamid

PY - 2016/5/25

Y1 - 2016/5/25

N2 - Digital audio signal provides a large capacity for embedding hidden messages using digital steganography techniques. How to prevent hazardous steganography embedding on the Internet becomes an important task in the field of network security. For the Internet environment, the steganography attack method is required to be generic and real time. An active warden-based attack method is potential to be a generic method for the steganography attack. A discrete spring transform (DST)-based generic active warden steganography attack framework has been proposed by us. In this paper, based on the DST, a real-time steganography attack method is proposed. The potential unauthorized hidden message is removed in a real-time manner when uploading or downloading the audio signal. The real-time signal perceptual quality control is achieved by the automatic feedback from the objective audio quality evaluation model. The attack parameters are adaptively changed to reach a balance between the attack performance and the audio signal quality. The simulation results validate the proposed method in terms of the steganography attack performance and the audio signal quality after the attack.

AB - Digital audio signal provides a large capacity for embedding hidden messages using digital steganography techniques. How to prevent hazardous steganography embedding on the Internet becomes an important task in the field of network security. For the Internet environment, the steganography attack method is required to be generic and real time. An active warden-based attack method is potential to be a generic method for the steganography attack. A discrete spring transform (DST)-based generic active warden steganography attack framework has been proposed by us. In this paper, based on the DST, a real-time steganography attack method is proposed. The potential unauthorized hidden message is removed in a real-time manner when uploading or downloading the audio signal. The real-time signal perceptual quality control is achieved by the automatic feedback from the objective audio quality evaluation model. The attack parameters are adaptively changed to reach a balance between the attack performance and the audio signal quality. The simulation results validate the proposed method in terms of the steganography attack performance and the audio signal quality after the attack.

KW - Audio signal processing

KW - Objective audio quality

KW - Steganography

UR - http://www.scopus.com/inward/record.url?scp=84962915588&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84962915588&partnerID=8YFLogxK

U2 - 10.1002/sec.1150

DO - 10.1002/sec.1150

M3 - Article

AN - SCOPUS:84962915588

VL - 9

SP - 737

EP - 746

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

IS - 8

ER -