Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Pulsar: Secure Steganography for Diffusion Models
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4703–4717https://doi.org/10.1145/3658644.3690218Widespread efforts to subvert access to strong cryptography has renewed interest in steganography, the practice of embedding sensitive messages in mundane cover messages. Recent efforts at provably secure steganography have focused on text-based ...
- short-paperOctober 2024
Practical Deep Learning Models for QIM-based VoIP Steganalysis
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 11132–11136https://doi.org/10.1145/3664647.3685646Quantization index modulation (QIM) based VoIP steganography can conceal secret information in VoIP streams. Malicious users could use this technology to conduct illegal activities, threatening network and public security. Hence, practical steganalysis ...
- research-articleOctober 2024
From Covert Hiding To Visual Editing: Robust Generative Video Steganography
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 2757–2765https://doi.org/10.1145/3664647.3681149Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process. Although ...
- research-articleJuly 2024
Natural Language Steganography by ChatGPT
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 81, Pages 1–9https://doi.org/10.1145/3664476.3670930Natural language steganography as well as natural language watermarking have been challenging because of the complexity and lack of noise in natural language. But with the advent of LLMs like ChatGPT, controlled synthesis of written language has become ...
-
- research-articleJuly 2024
A Comprehensive Pattern-based Overview of Stegomalware
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 77, Pages 1–10https://doi.org/10.1145/3664476.3670886In recent years, malware increasingly applies steganography methods to remain undetected as long as possible. Such malware is called stegomalware. Stegomalware not only covers its tracks on the infected system, but also hides its communication with ...
- research-articleJuly 2024
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 80–95https://doi.org/10.1145/3634737.3637676An ongoing challenge in censorship circumvention is optimizing the stealthiness of communications, enabled by covert channels. Recently, a new variant called history covert channels has been proposed. Instead of modifying or mimicking legitimate data, ...
- short-paperJune 2024
A Development Framework for TCP/IP Network Steganography Malware Detection
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 95–100https://doi.org/10.1145/3658664.3659651Stegomalware poses a rising threat in the security landscape as more and more malware samples use steganography to disguise their network traffic, rendering traditional detection approaches less and less useful. To detect such advanced threats, it is ...
- research-articleJune 2024Best Student Paper
Improving Steganographic Security with Source Biasing
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 19–30https://doi.org/10.1145/3658664.3659646By selecting covers in which steganographic embedding is harder to detect, the steganographer can decrease the chances of being caught by the Warden. On the other hand, sampling from the cover source with a bias is detectable on its own. In this paper, ...
- research-articleJune 2024
Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 113–124https://doi.org/10.1145/3658664.3659637Steganography describes techniques and algorithms for hiding secret information in a cover medium such as images, audio or text files. Malware that makes use of steganographic techniques, known as stegomalware, is becoming increasingly common. This paper ...
- research-articleJune 2024
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 67–78https://doi.org/10.1145/3626232.3653264State of the art generative models of human-produced content are the focus of many recent papers that explore their use for steganographic communication. In particular, generative models of natural language text. Loosely, these works (invertibly) encode ...
- research-articleJune 2024
Joint Steganography and Encryption Techniques for Security Enhancement Using Deep Learning Models
IVSP '24: Proceedings of the 2024 6th International Conference on Image, Video and Signal ProcessingPages 171–174https://doi.org/10.1145/3655755.3655778In today’s rapidly expanding digital landscape, safeguarding sensitive data and privacy has become imperative. Traditional security measures and authentication technologies are facing increasing challenges, particularly steganography. Steganography ...
- research-articleMay 2024
Comparison of computational complexity of neural network models for detection of steganographic algorithms
ICSCA '24: Proceedings of the 2024 13th International Conference on Software and Computer ApplicationsPages 7–11https://doi.org/10.1145/3651781.3651783The purpose of the paper is to compare the computational complexity of the steganalytic method created by the authors in previously developed and presented by other academics to detect three steganographic algorithms, including jUniward, nsF5 and UERD, ...
- research-articleOctober 2023
Securing Fixed Neural Network Steganography
MM '23: Proceedings of the 31st ACM International Conference on MultimediaPages 7943–7951https://doi.org/10.1145/3581783.3611920Image steganography is the art of concealing secret information in images in a way that is imperceptible to unauthorized parties. Recent advances show that is possible to use a fixed neural network (FNN) for secret embedding and extraction. Such fixed ...
- research-articleAugust 2023
Proof-of-work based new encoding scheme for information hiding purposes
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 45, Pages 1–8https://doi.org/10.1145/3600160.3605085Steganography techniques often assume that the secret message looks randomly or is encrypted. If encryption is required, it leads to a random-looking message, but key exchange may be problematic and jeopardize covert communication. If encryption is not ...
- keynoteJune 2023
Steganography on Mobile Apps
IH&MMSec '23: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia SecurityPage 3https://doi.org/10.1145/3577163.3595114Steganography is an ancient communication technique that hides a message inside a common object so that the message escapes scrutiny - today, we use digital files like photos and videos to hide and pass messages. Code to execute the message hiding inside ...
- research-articleJune 2023
Limits of Data Driven Steganography Detectors
IH&MMSec '23: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia SecurityPages 81–90https://doi.org/10.1145/3577163.3595094While deep learning has revolutionized image steganalysis in terms of performance, little is known about how much modern data driven detectors can still be improved. In this paper, we approach this difficult and currently wide open question by working ...
- research-articleJune 2023
Compatibility and Timing Attacks for JPEG Steganalysis
IH&MMSec '23: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia SecurityPages 29–35https://doi.org/10.1145/3577163.3595093This paper introduces a novel compatibility attack to detect a steganographic message embedded in the DCT domain of a JPEG image at high-quality factors (close to 100). Because the JPEG compression is not a surjective function, i.e. not every DCT blocks ...
- research-articleJune 2023
Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice
IH&MMSec '23: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia SecurityPages 67–79https://doi.org/10.1145/3577163.3595090The JPEG compatibility attack is a steganalysis method for detecting messages embedded in the spatial representation of an image under the assumption that the cover image was a decompressed JPEG. This paper addresses a number of open problems in previous ...
- research-articleDecember 2022
FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided DesignArticle No.: 41, Pages 1–9https://doi.org/10.1145/3508352.3549357Steganography and digital watermarking are the tasks of hiding recoverable data in image pixels. Deep neural network (DNN) based image steganography and watermarking techniques are quickly replacing traditional hand-engineered pipelines. DNN based water-...