2014
DOI: 10.1002/sec.1150
|View full text |Cite
|
Sign up to set email alerts
|

Real-time audio steganography attack based on automatic objective quality feedback

Abstract: Digital audio signal provides a large capacity for embedding hidden messages using digital steganography techniques. How to prevent hazardous steganography embedding on the Internet becomes an important task in the field of network security. For the Internet environment, the steganography attack method is required to be generic and real time. An active wardenbased attack method is potential to be a generic method for the steganography attack. A discrete spring transform (DST)-based generic active warden stegan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…The similar methods used in video and audio data have been proposed in Refs. [23,[25][26][27][28][29]. In this paper, the proposed method emphasizes on the generic attacking architecture in the image domain.…”
Section: Active Attack Methodsmentioning
confidence: 99%
“…The similar methods used in video and audio data have been proposed in Refs. [23,[25][26][27][28][29]. In this paper, the proposed method emphasizes on the generic attacking architecture in the image domain.…”
Section: Active Attack Methodsmentioning
confidence: 99%
“…DST was first proposed as a way to attack the steganography embedded in the multimedia signal [12][13][14][15][16][17]. The basic idea of DST is to eliminate the perceptual redundancy of the multimedia signal [18][19][20].…”
Section: Introductionmentioning
confidence: 99%
“…It should be noted that the equivalent signal can only preserve the perceptual quality; therefore, the theoretical information capacity could be reduced by DST. A real-time DST algorithm is proposed in [14] for a real-time voice processing. Compared to [12,14,15] where we proposed DST and presented as an effective method to attack steganography, in this paper, we proposed a DST-LACK scheme to embed the steganography in the VoIP streams.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation