Discop: Provably secure steganography in practice based on" distribution copies"
Steganography is the act of disguising the transmission of secret information as seemingly
innocent. Although provably secure steganography has been proposed for decades, it has …
innocent. Although provably secure steganography has been proposed for decades, it has …
Audio steganography based on iterative adversarial attacks against convolutional neural networks
Recently, convolutional neural networks (CNNs) have demonstrated superior performance
on digital multimedia steganalysis. However, some studies have noted that most CNN …
on digital multimedia steganalysis. However, some studies have noted that most CNN …
Robust copy–move detection of speech recording using similarities of pitch and formant
Q Yan, R Yang, J Huang - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Copy-move forgery on very short speech segments, followed by post-processing operations
to eliminate traces of the forgery, presents a great challenge to forensic detection. In this …
to eliminate traces of the forgery, presents a great challenge to forensic detection. In this …
Provably secure public-key steganography based on elliptic curve cryptography
Steganography is the technique of hiding secret messages within seemingly harmless
covers to elude examination by censors. Despite having been proposed several decades …
covers to elude examination by censors. Despite having been proposed several decades …
Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression
Recent advances in content-adaptive Audio Steganography in Temporal Domain (ASTD)
suggest that modification of micro-amplitude samples may compromise its security. To …
suggest that modification of micro-amplitude samples may compromise its security. To …
Audio steganalysis with improved convolutional neural network
Deep learning, especially the convolutional neural network (CNN), has enjoyed significant
success in many fields, eg, image recognition. Recently, CNN has successfully applied to …
success in many fields, eg, image recognition. Recently, CNN has successfully applied to …
Adaptive audio steganography based on improved syndrome-trellis codes
Syndrome-Trellis Code (STC) is a near-optimal convolutional method for adaptive
steganography. Hitherto, the existing adaptive steganography commonly depends on the …
steganography. Hitherto, the existing adaptive steganography commonly depends on the …
Distribution-preserving steganography based on text-to-speech generative models
Steganography is the art and science of hiding secret messages in public communication so
that the presence of secret messages cannot be detected. There are two distribution …
that the presence of secret messages cannot be detected. There are two distribution …
A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition
Y Huang, H Hou, Y Wang, Y Zhang, M Fan - IEEE Access, 2020 - ieeexplore.ieee.org
Most speech authentication algorithms are over-optimized for robustness and efficiency,
resulting in poor discrimination. Hashing shorter sequence is likely to cause the same …
resulting in poor discrimination. Hashing shorter sequence is likely to cause the same …
Derivative-based steganographic distortion and its non-additive extensions for audio
Steganography is the art of covert communication, which aims to hide the secret messages
into cover medium while achieving high undetectability. To this end, the framework of …
into cover medium while achieving high undetectability. To this end, the framework of …