TY - GEN
T1 - An active audio steganography attacking method using discrete spring transform
AU - Qi, Qilin
AU - Sharp, Aaron
AU - Peng, Dongming
AU - Yang, Yaoqing
AU - Sharif, Hamid
PY - 2013
Y1 - 2013
N2 - The significant development of cell phone and mobile network in recent years leads to some security concerns casued by increasing capacity of the networks and the large margin of the multimedia data. Audio steganography is a proven way to hide information in digital audio signals, where many schemes have been effective at hiding large amounts of data. In order to prevent the malicious threat of the audio steganog-raphy, the countermeasure of audio steganography is also an important topic. In this paper, we propose a novel steganographic attack which can defeat audio steganography algorithms while maintaining an acceptable audio distortion level. The attacking method is based on a proposed transform called discrete spring transform. Similar to the time scale modification, the spring transform disables the synchronization of the hidden information. Furthermore, the proposed method has some advantages over the traditional time scale modification, therefore the steganography method which can resist to the time scale modification still can be defeated by the proposed method. The simulation results show that the proposed method successfully defeat some audio steganography methods which are resistant to the time scale modification with subjective auditory quality score no worse than -0.1.
AB - The significant development of cell phone and mobile network in recent years leads to some security concerns casued by increasing capacity of the networks and the large margin of the multimedia data. Audio steganography is a proven way to hide information in digital audio signals, where many schemes have been effective at hiding large amounts of data. In order to prevent the malicious threat of the audio steganog-raphy, the countermeasure of audio steganography is also an important topic. In this paper, we propose a novel steganographic attack which can defeat audio steganography algorithms while maintaining an acceptable audio distortion level. The attacking method is based on a proposed transform called discrete spring transform. Similar to the time scale modification, the spring transform disables the synchronization of the hidden information. Furthermore, the proposed method has some advantages over the traditional time scale modification, therefore the steganography method which can resist to the time scale modification still can be defeated by the proposed method. The simulation results show that the proposed method successfully defeat some audio steganography methods which are resistant to the time scale modification with subjective auditory quality score no worse than -0.1.
UR - http://www.scopus.com/inward/record.url?scp=84893246916&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893246916&partnerID=8YFLogxK
U2 - 10.1109/PIMRC.2013.6666746
DO - 10.1109/PIMRC.2013.6666746
M3 - Conference contribution
AN - SCOPUS:84893246916
SN - 9781467362351
T3 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
SP - 3456
EP - 3460
BT - 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013
T2 - 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013
Y2 - 8 September 2013 through 11 September 2013
ER -