Discop: Provably secure steganography in practice based on" distribution copies"

J Ding, K Chen, Y Wang, N Zhao… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Steganography is the act of disguising the transmission of secret information as seemingly
innocent. Although provably secure steganography has been proposed for decades, it has …

Audio steganography based on iterative adversarial attacks against convolutional neural networks

J Wu, B Chen, W Luo, Y Fang - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Recently, convolutional neural networks (CNNs) have demonstrated superior performance
on digital multimedia steganalysis. However, some studies have noted that most CNN …

Robust copy–move detection of speech recording using similarities of pitch and formant

Q Yan, R Yang, J Huang - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Copy-move forgery on very short speech segments, followed by post-processing operations
to eliminate traces of the forgery, presents a great challenge to forensic detection. In this …

Provably secure public-key steganography based on elliptic curve cryptography

X Zhang, K Chen, J Ding, Y Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Steganography is the technique of hiding secret messages within seemingly harmless
covers to elude examination by censors. Despite having been proposed several decades …

Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression

W Su, J Ni, X Hu, B Li - IEEE Transactions on Information …, 2024 - ieeexplore.ieee.org
Recent advances in content-adaptive Audio Steganography in Temporal Domain (ASTD)
suggest that modification of micro-amplitude samples may compromise its security. To …

Audio steganalysis with improved convolutional neural network

Y Lin, R Wang, D Yan, L Dong, X Zhang - Proceedings of the ACM …, 2019 - dl.acm.org
Deep learning, especially the convolutional neural network (CNN), has enjoyed significant
success in many fields, eg, image recognition. Recently, CNN has successfully applied to …

Adaptive audio steganography based on improved syndrome-trellis codes

K Ying, R Wang, Y Lin, D Yan - IEEE Access, 2021 - ieeexplore.ieee.org
Syndrome-Trellis Code (STC) is a near-optimal convolutional method for adaptive
steganography. Hitherto, the existing adaptive steganography commonly depends on the …

Distribution-preserving steganography based on text-to-speech generative models

K Chen, H Zhou, H Zhao, D Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Steganography is the art and science of hiding secret messages in public communication so
that the presence of secret messages cannot be detected. There are two distribution …

A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition

Y Huang, H Hou, Y Wang, Y Zhang, M Fan - IEEE Access, 2020 - ieeexplore.ieee.org
Most speech authentication algorithms are over-optimized for robustness and efficiency,
resulting in poor discrimination. Hashing shorter sequence is likely to cause the same …

Derivative-based steganographic distortion and its non-additive extensions for audio

K Chen, H Zhou, W Li, K Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Steganography is the art of covert communication, which aims to hide the secret messages
into cover medium while achieving high undetectability. To this end, the framework of …