A universal audio steganalysis scheme based on multiscale spectrograms and DeepResNet
Y Ren, D Liu, C Liu, Q Xiong, J Fu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Given the popularity of audio and video applications, compressed audio has become an
important carrier of covert communication on the Internet. Many novel compressed audio …
important carrier of covert communication on the Internet. Many novel compressed audio …
Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD)
Y Ren, S Cai, L Wang - Journal of Information Security and Applications, 2021 - Elsevier
Abstract Advanced Audio Coding (AAC) is currently the most widely used audio
compression standard in Internet applications. In this paper, a large capacity secure …
compression standard in Internet applications. In this paper, a large capacity secure …
MP3 steganalysis based on joint point-wise and block-wise correlations
With the growing attention on multimedia security, various MP3 steganographic and
steganalytic algorithms have been proposed increasingly. However, the existing MP3 …
steganalytic algorithms have been proposed increasingly. However, the existing MP3 …
An adaptive double-layered embedding scheme for MP3 steganography
Y Yang, H Yu, X Zhao, X Yi - IEEE Signal Processing Letters, 2020 - ieeexplore.ieee.org
In this letter, we devise an adaptive double-layered embedding scheme that is suitable for
MP3 steganography. According to the encoding characteristics of MP3, the linbits are used …
MP3 steganography. According to the encoding characteristics of MP3, the linbits are used …
Message-Driven Generative Music Steganography Using MIDI-GAN
Z Su, G Zhang, Z Shi, D Hu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Generative steganography has become a popular research topic in the field of generative AI,
including generative image and synthetic speech steganography. However, music files have …
including generative image and synthetic speech steganography. However, music files have …
Global texture sensitive convolutional transformer for medical image steganalysis
Steganography is often used by hackers or illegal organizations as a vehicle for information
interception of medical images. Exchanged between PACS or communicated during …
interception of medical images. Exchanged between PACS or communicated during …
Approaching optimal embedding in audio steganography with GAN
Audio steganography is a technology that embeds messages into audio without raising any
suspicion from hearing it. Current steganography methods are based on heuristic cost …
suspicion from hearing it. Current steganography methods are based on heuristic cost …
Improving robustness of speech anti-spoofing system using resnext with neighbor filters
Z Zhang, X Zhao, X Yi - 2022 IEEE International Conference on …, 2022 - ieeexplore.ieee.org
Since recent advances in speech synthesis techniques, it is important to develop robust
speech anti-spoofing systems against all major spoofing attacks. In this paper, we propose a …
speech anti-spoofing systems against all major spoofing attacks. In this paper, we propose a …
Audio steganalysis using multi‐scale feature fusion‐based attention neural network
J Peng, Y Liao, S Tang - IET Communications, 2024 - Wiley Online Library
Deep learning techniques have shown promise in audio steganalysis, which involves
detecting the presence of hidden information (steganography) in audio files. However, deep …
detecting the presence of hidden information (steganography) in audio files. However, deep …
Tackling the cover source mismatch problem in audio steganalysis with unsupervised domain adaptation
Nowadays, the convolutional neural network (CNN) based steganalysis has achieved
remarkable performance in the well-controlled lab environment. However, the cover source …
remarkable performance in the well-controlled lab environment. However, the cover source …