13,258 research outputs found

    Adversarial Audio: A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models

    Full text link
    Audio is an important medium in people's daily life, hidden information can be embedded into audio for covert communication. Current audio information hiding techniques can be roughly classed into time domain-based and transform domain-based techniques. Time domain-based techniques have large hiding capacity but low imperceptibility. Transform domain-based techniques have better imperceptibility, but the hiding capacity is poor. This paper proposes a new audio information hiding technique which shows high hiding capacity and good imperceptibility. The proposed audio information hiding method takes the original audio signal as input and obtains the audio signal embedded with hidden information (called stego audio) through the training of our private automatic speech recognition (ASR) model. Without knowing the internal parameters and structure of the private model, the hidden information can be extracted by the private model but cannot be extracted by public models. We use four other ASR models to extract the hidden information on the stego audios to evaluate the security of the private model. The experimental results show that the proposed audio information hiding technique has a high hiding capacity of 48 cps with good imperceptibility and high security. In addition, our proposed adversarial audio can be used to activate an intrinsic backdoor of DNN-based ASR models, which brings a serious threat to intelligent speakers.Comment: Submitted to RAID201

    Audio Steganography: LSB Technique Using a Pyramid Structure and Range of Bytes

    Full text link
    The demand for keeping the information secure and confidential simultaneously has been progressively increasing. Among various techniques- Audio Steganography, a technique of embedding information transparently in a digital media thereby restricting the access to such information has been prominently developed. Imperceptibility, robustness, and payload or hiding capacity are the main character for it. In earlier, LSB techniques increased payload capacity would hamper robustness as well as imperceptibility of the cover media and vice versa. The proposed technique overcomes the problem. It provides relatively good improvement in the payload capacity by dividing the bytes of cover media into ranges to hide the bits of secret message appropriately. As well as due to the use of ranges of bytes the robustness of cover media has maintained and imperceptibility preserved by using a pyramid structure.Comment: 12 page, 16 Figure

    Genetic Algorithm in Audio Steganography

    Full text link
    With the advancement of communication technology,data is exchanged digitally over the network. At the other side the technology is also proven as a tool for unauthorized access to attackers. Thus the security of data to be transmitted digitally should get prime focus. Data hiding is the common approach to secure data. In steganography technique, the existence of data is concealed. GA is an emerging component of AI to provide suboptimal solutions. In this paper the use of GA in Steganography is explored to find future scope of research.Comment: 6 pages,2 figures Published with International Journal of Engineering Trends and Technology (IJETT). arXiv admin note: text overlap with arXiv:1003.4084, arXiv:1205.2800 by other authors without attributio

    Hiding Sound in Image by K-LSB Mutation

    Full text link
    In this paper a novel approach to hide sound files in a digital image is proposed and implemented such that it becomes difficult to conclude about the existence of the hidden data inside the image. In this approach, we utilize the rightmost k-LSB of pixels in an image to embed MP3 sound bits into a pixel. The pixels are so chosen that the distortion in image would be minimized due to embedding. This requires comparing all the possible permutations of pixel values, which may would lead to exponential time computation. To speed up this, Cuckoo Search (CS) could be used to find the most optimal solution. The advantage of using proposed CS is that it is easy to implement and is very effective at converging in relatively less iterations/generations.Comment: appears in ISCBI 201

    A reversible high embedding capacity data hiding technique for hiding secret data in images

    Full text link
    As the multimedia and internet technologies are growing fast, the transmission of digital media plays an important role in communication. The various digital media like audio, video and images are being transferred through internet. There are a lot of threats for the digital data that are transferred through internet. Also, a number of security techniques have been employed to protect the data that is transferred through internet. This paper proposes a new technique for sending secret messages securely, using steganographic technique. Since the proposed system uses multiple level of security for data hiding, where the data is hidden in an image file and the stego file is again concealed in another image. Previously, the secret message is being encrypted with the encryption algorithm which ensures the achievement of high security enabled data transfer through internet.Comment: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 3, March 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis

    Data Hiding using Graphical Code based Steganography Technique

    Full text link
    Data hiding has received much attention due to rapid development of internet and multimedia technologies where security of information is a very important concern. This is achieved by Steganography, which is the art or science of hiding data into another data, so that human eyes cannot catch the hidden information easily. There are many ways to hide information-like inside an image, text, audio/ video etc. Among them image steganography is a very attractive research area. The goal is to transmit a data within a modified image (called stego-image)by minimizing the number of bit flips. In this paper, a new steganography technique has been proposed using Graphical codes and also comparison with steganography technique using BCH codes has been studied.Comment: 5 pages, 3 figures, 2 tables, International Journal of Engineering Trends and Technology (IJETT),Volume 27 Number 3, September 201

    Improved information security using robust Steganography system

    Full text link
    Steganography is an emerging area which is used for secured data transmission over any public media.Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver knowing the existence of this information. In this paper, a specific image based steganography technique for communicating information more securely between two locations is proposed. The author incorporated the idea of secret key and password security features for authentication at both ends in order to achieve high level of security. As a further improvement of security level, the information has been permuted, encoded and then finally embedded on an image to form the stego image. In addition segmented objects extraction and reassembly of the stego image through normalized cut method has been carried out at the sender side and receiver side respectively in order to prevent distortion of the Stego image during transmission

    Embedding of binary image in the Gray planes

    Full text link
    For watermarking of the digital grayscale image its Gray planes have been used. With the help of the introduced representation over Gray planes the LSB embedding method and detection have been discussed. It found that data, a binary image, hidden in the Gray planes is more robust to JPEG lossy compression than in the bit planes.Comment: 7 pages, 3 figures, Proceeding of 24rd International Conference on Computer Graphics and Vision GraphiCon'2014, Sept.30 - Oct.3,2014, Rostov-on-Don, Russi

    Robust Audio Watermarking Against the D/A and A/D conversions

    Full text link
    Audio watermarking has played an important role in multimedia security. In many applications using audio watermarking, D/A and A/D conversions (denoted by DA/AD in this paper) are often involved. In previous works, however, the robustness issue of audio watermarking against the DA/AD conversions has not drawn sufficient attention yet. In our extensive investigation, it has been found that the degradation of a watermarked audio signal caused by the DA/AD conversions manifests itself mainly in terms of wave magnitude distortion and linear temporal scaling, making the watermark extraction failed. Accordingly, a DWT-based audio watermarking algorithm robust against the DA/AD conversions is proposed in this paper. To resist the magnitude distortion, the relative energy relationships among different groups of the DWT coefficients in the low-frequency sub-band are utilized in watermark embedding by adaptively controlling the embedding strength. Furthermore, the resynchronization is designed to cope with the linear temporal scaling. The time-frequency localization characteristics of DWT are exploited to save the computational load in the resynchronization. Consequently, the proposed audio watermarking algorithm is robust against the DA/AD conversions, other common audio processing manipulations, and the attacks in StirMark Benchmark for Audio, which has been verified by experiments.Comment: Pages 2

    Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

    Full text link
    Voice interfaces are becoming accepted widely as input methods for a diverse set of devices. This development is driven by rapid improvements in automatic speech recognition (ASR), which now performs on par with human listening in many tasks. These improvements base on an ongoing evolution of DNNs as the computational core of ASR. However, recent research results show that DNNs are vulnerable to adversarial perturbations, which allow attackers to force the transcription into a malicious output. In this paper, we introduce a new type of adversarial examples based on psychoacoustic hiding. Our attack exploits the characteristics of DNN-based ASR systems, where we extend the original analysis procedure by an additional backpropagation step. We use this backpropagation to learn the degrees of freedom for the adversarial perturbation of the input signal, i.e., we apply a psychoacoustic model and manipulate the acoustic signal below the thresholds of human perception. To further minimize the perceptibility of the perturbations, we use forced alignment to find the best fitting temporal alignment between the original audio sample and the malicious target transcription. These extensions allow us to embed an arbitrary audio input with a malicious voice command that is then transcribed by the ASR system, with the audio signal remaining barely distinguishable from the original signal. In an experimental evaluation, we attack the state-of-the-art speech recognition system Kaldi and determine the best performing parameter and analysis setup for different types of input. Our results show that we are successful in up to 98% of cases with a computational effort of fewer than two minutes for a ten-second audio file. Based on user studies, we found that none of our target transcriptions were audible to human listeners, who still understand the original speech content with unchanged accuracy
    corecore