March 2025
·
8 Reads
Journal of Information Security and Applications
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
March 2025
·
8 Reads
Journal of Information Security and Applications
February 2025
Steganography is the art and science of covert writing, with a broad range of applications interwoven within the realm of cybersecurity. As artificial intelligence continues to evolve, its ability to synthesise realistic content emerges as a threat in the hands of cybercriminals who seek to manipulate and misrepresent the truth. Such synthetic content introduces a non-trivial risk of overwriting the subtle changes made for the purpose of steganography. When the signals in both the spatial and temporal domains are vulnerable to unforeseen overwriting, it calls for reflection on what can remain invariant after all. This study proposes a paradigm in steganography for audiovisual media, where messages are concealed beyond both spatial and temporal domains. A chain of multimodal agents is developed to deconstruct audiovisual content into a cover text, embed a message within the linguistic domain, and then reconstruct the audiovisual content through synchronising both aural and visual modalities with the resultant stego text. The message is encoded by biasing the word sampling process of a language generation model and decoded by analysing the probability distribution of word choices. The accuracy of message transmission is evaluated under both zero-bit and multi-bit capacity settings. Fidelity is assessed through both biometric and semantic similarities, capturing the identities of the recorded face and voice, as well as the core ideas conveyed through the media. Secrecy is examined through statistical comparisons between cover and stego texts. Robustness is tested across various scenarios, including audiovisual compression, face-swapping, voice-cloning and their combinations.
January 2025
·
7 Reads
As the cornerstone of artificial intelligence, machine perception confronts a fundamental threat posed by adversarial illusions. These adversarial attacks manifest in two primary forms: deductive illusion, where specific stimuli are crafted based on the victim model's general decision logic, and inductive illusion, where the victim model's general decision logic is shaped by specific stimuli. The former exploits the model's decision boundaries to create a stimulus that, when applied, interferes with its decision-making process. The latter reinforces a conditioned reflex in the model, embedding a backdoor during its learning phase that, when triggered by a stimulus, causes aberrant behaviours. The multifaceted nature of adversarial illusions calls for a unified defence framework, addressing vulnerabilities across various forms of attack. In this study, we propose a disillusion paradigm based on the concept of an imitation game. At the heart of the imitation game lies a multimodal generative agent, steered by chain-of-thought reasoning, which observes, internalises and reconstructs the semantic essence of a sample, liberated from the classic pursuit of reversing the sample to its original state. As a proof of concept, we conduct experimental simulations using a multimodal generative dialogue agent and evaluates the methodology under a variety of attack scenarios.
January 2025
·
9 Reads
As artificial intelligence increasingly automates the recognition and analysis of visual content, it poses significant risks to privacy, security, and autonomy. Computer vision systems can surveil and exploit data without consent. With these concerns in mind, we introduce a novel method to control whether images can be recognized by computer vision systems using reversible adversarial examples. These examples are generated to evade unauthorized recognition, allowing only systems with permission to restore the original image by removing the adversarial perturbation with zero-bit error. A key challenge with prior methods is their reliance on merely restoring the examples to a state in which they can be correctly recognized by the model; however, the restored images are not fully consistent with the original images, and they require excessive auxiliary information to achieve reversibility. To achieve zero-bit error restoration, we utilize the differential evolution algorithm to optimize adversarial perturbations while minimizing distortion. Additionally, we introduce a dual-color space detection mechanism to localize perturbations, eliminating the need for extra auxiliary information. Ultimately, when combined with reversible data hiding, adversarial attacks can achieve reversibility. Experimental results demonstrate that the PSNR and SSIM between the restored images by the method and the original images are ∞ and 1, respectively. The PSNR and SSIM between the reversible adversarial examples and the original images are 48.32 dB and 0.9986, respectively. Compared to state-of-the-art methods, the method maintains high visual fidelity at a comparable attack success rate.
January 2025
·
4 Reads
A critical requirement for deep learning models is ensuring their robustness against adversarial attacks. These attacks commonly introduce noticeable perturbations, compromising the visual fidelity of adversarial examples. Another key challenge is that while white-box algorithms can generate effective adversarial perturbations, they require access to the model gradients, limiting their practicality in many real-world scenarios. Existing attack mechanisms struggle to achieve similar efficacy without access to these gradients. In this paper, we introduce GreedyPixel, a novel pixel-wise greedy algorithm designed to generate high-quality adversarial examples using only query-based feedback from the target model. GreedyPixel improves computational efficiency in what is typically a brute-force process by perturbing individual pixels in sequence, guided by a pixel-wise priority map. This priority map is constructed by ranking gradients obtained from a surrogate model, providing a structured path for perturbation. Our results demonstrate that GreedyPixel achieves attack success rates comparable to white-box methods without the need for gradient information, and surpasses existing algorithms in black-box settings, offering higher success rates, reduced computational time, and imperceptible perturbations. These findings underscore the advantages of GreedyPixel in terms of attack efficacy, time efficiency, and visual quality.
January 2025
·
8 Reads
Steganography, the art of information hiding, has continually evolved across visual, auditory and linguistic domains, adapting to the ceaseless interplay between steganographic concealment and steganalytic revelation. This study seeks to extend the horizons of what constitutes a viable steganographic medium by introducing a steganographic paradigm in robotic motion control. Based on the observation of the robot's inherent sensitivity to changes in its environment, we propose a methodology to encode messages as environmental stimuli influencing the motions of the robotic agent and to decode messages from the resulting motion trajectory. The constraints of maximal robot integrity and minimal motion deviation are established as fundamental principles underlying secrecy. As a proof of concept, we conduct experiments in simulated environments across various manipulation tasks, incorporating robotic embodiments equipped with generalist multimodal policies.
January 2025
·
4 Reads
·
1 Citation
IEEE Access
The problem of subliminal communication has been addressed in various forms of steganography, primarily relying on visual, auditory and linguistic media. However, the field faces a fundamental paradox: as the art of concealment advances, so too does the science of revelation, leading to an ongoing evolutionary interplay. This study seeks to extend the boundaries of what is considered a viable steganographic medium. We explore a steganographic paradigm, where hidden information is communicated through the episodes of multiple agents interacting with an environment. Each agent, acting as an encoder, learns a policy to disguise the very existence of hidden messages within actions seemingly directed toward innocent objectives. Meanwhile, an observer, serving as a decoder, learns to associate behavioural patterns with their respective agents despite their dynamic nature, thereby unveiling the hidden messages. The interactions of agents are governed by the framework of multi-agent reinforcement learning and shaped by feedback from the observer. This framework encapsulates a game-theoretic dilemma, wherein agents face decisions between cooperating to create distinguishable behavioural patterns or defecting to pursue individually optimal yet potentially overlapping episodic actions. As a proof of concept, we exemplify action steganography through the game of labyrinth, a navigation task where subliminal communication is concealed within the act of steering toward a destination. The stego-system has been systematically validated through experimental evaluations, assessing its distortion and capacity alongside its secrecy and robustness when subjected to simulated passive and active adversaries.
December 2024
·
19 Reads
Cryptography
To reduce bandwidth usage in communications, absolute moment block truncation coding is employed to compress cover images. Confidential data are embedded into compressed images using reversible data-hiding technology for purposes such as image management, annotation, or authentication. As data size increases, enhancing embedding capacity becomes essential to accommodate larger volumes of secret data without compromising image quality or reversibility. Instead of using conventional absolute moment block truncation coding to encode each image block, this work proposes an effective reversible data-hiding scheme that enhances the embedding results by utilizing the traditional set of values: a bitmap, a high value, and a low value. In addition to the traditional set of values, a value is calculated using arithmetical differential coding and may be used for embedding. A process involving joint neighborhood coding and logical differential coding is applied to conceal the secret data in two of the three value tables, depending on the embedding capacity evaluation. An indicator is recorded to specify which two values are involved in the embedding process. The embedded secret data can be correctly extracted using a corresponding two-stage extraction process based on the indicator. To defeat the state-of-the-art scheme, bitmaps are also used as carriers in our scheme yet are compacted even more with Huffman coding. To reconstruct the original image, the low and high values of each block are reconstructed after data extraction. Experimental results show that our proposed scheme typically achieves an embedding rate exceeding 30%, surpassing the latest research by more than 2%. Our scheme reaches outstanding embedding rates while allowing the image to be perfectly restored to its original absolute moment block truncation coding form.
December 2024
·
5 Reads
December 2024
·
8 Reads
The problem of subliminal communication has been addressed in various forms of steganography, primarily relying on visual, auditory and linguistic media. However, the field faces a fundamental paradox: as the art of concealment advances, so too does the science of revelation, leading to an ongoing evolutionary interplay. This study seeks to extend the boundaries of what is considered a viable steganographic medium. We explore a steganographic paradigm, where hidden information is communicated through the episodes of multiple agents interacting with an environment. Each agent, acting as an encoder, learns a policy to disguise the very existence of hidden messages within actions seemingly directed toward innocent objectives. Meanwhile, an observer, serving as a decoder, learns to associate behavioural patterns with their respective agents despite their dynamic nature, thereby unveiling the hidden messages. The interactions of agents are governed by the framework of multi-agent reinforcement learning and shaped by feedback from the observer. This framework encapsulates a game-theoretic dilemma, wherein agents face decisions between cooperating to create distinguishable behavioural patterns or defecting to pursue individually optimal yet potentially overlapping episodic actions. As a proof of concept, we exemplify action steganography through the game of labyrinth, a navigation task where subliminal communication is concealed within the act of steering toward a destination. The stego-system has been systematically validated through experimental evaluations, assessing its distortion and capacity alongside its secrecy and robustness when subjected to simulated passive and active adversaries.
... S TEGANOGRAPHY is the study of covert writing, which has evolved from rudimentary arts, such as the use of invisible ink, into a sophisticated scientific discipline, interwoven within the field of cybersecurity [1]- [3]. The applications of steganography are vast and varied, encompassing secret communication [4]- [9], anti-counterfeit watermarking [10]- [14], provenance tracking [15]- [17] and forensic analysis [18]- [20], among others [21]- [23]. In general, a steganographic system involves the process of embedding a message into a cover medium and then extracting the hidden message from the resulting stego medium. ...
January 2025
IEEE Access
... Consequently, it is not surprising that our method outperforms the current state-of-the-art techniques. [47] 60.81 57.63 --Kim et al. [51] 59.24 56.14 --Ou et al. [52] 59.97 56.78 --Zhang et al. [53] 60.38 57.20 --Xiang & Ruan [54] 60.51 57.29 --Mao et al. [48] 59.51 55.94 --Yu et al. [49] 60.12 56.64 52.26 -Yao et al. [55] 60.50 57.11 --Chang et al. [56] 59.75 55.81 --Guo et al. [57] 61. 10 ≈ − > ≈ − . In addition, the p-value (in percentage) in the marked image reflects the estimated ratio of the message size relative to the entire image. ...
January 2024
IEEE Transactions on Circuits and Systems for Video Technology
... To verify the performance of our proposed scheme on texture images, we compar with other algorithms that also compress the VQ index table, namely the search ord coding (SOC) algorithm [14], the SOC-based state codebook (SOC+SC) algorithm [16], a the SOC-based side match (SOC+SM) algorithm [17]. Our experimental environment co sists of a Windows 11 laptop with a 3.20 GHz AMD Ryzen 7 CPU and 16 GB RAM. ...
August 2024
... Using generative adversarial networks (GANs) with cycle consistency loss, the approach converted facial images between de-identified and re-identified states, preserving privacy without permanent data loss. It mitigated risks of replay and reconstruction attacks by anonymizing sensitive biometric features [29]. ...
August 2024
EURASIP Journal on Information Security
... Different embedding methods are applied to hide the given message based on the complexity characteristics of these trios, thereby enhancing EC. In contrast, instead of using trios to embed secret data, AMBTC-based RDH Type-II approaches [10,11,16,17] hide message bits directly in reconstructed pixels. As a result, the obtained EC is higher than that of Type-I approaches because the number of reconstructed pixels is equal to that of the uncompressed/original image. ...
July 2024
... Coefficients in contours are embedded with higher intensity, those in textures with medium intensity, and those in homogeneous areas with low intensity. This approach is consistent with the analogy between water-filling and watermarking, as described in previous research [14,15]. ...
June 2024
... To solve adversarial evidence forgery, we need to incorporate adversarial purification into the verification process as shown in Figure 2. While purification can effectively reduce the impact of adversarial perturbations, it also comes with the side effect of lowering the accuracy of true evidence [24]- [28]. While the hash values are still computed from the original images, the predictions are made from the purified images, which may not be correctly predicted as the pre-defined class labels as purification may also introduce a small amount of distortion to the images. ...
April 2024
Lecture Notes in Computer Science
... Spirgi et al. (2024) Evidence shows that ChatGPT-generated text detectors require improvement; there is a need to protect academic integrity against automatically generated texts. Dou et al. (2024) While ChatGPT can be useful, it also poses risks, such as dependency and the deterioration of typing skills. Rezaei et al. (2024) This study determines the need for students to assume greater responsibility and ethics in their writing process. ...
April 2024
... These methods require pretraining from scratch and, therefore, don't benefit from the advanced reasoning capabilities and world knowledge of large pretrained models. Shalabi et al. (2023) use synthetic multi-modal data to establish the authenticity of image-text pairs. They use BLIP-2 ) to generate a caption for the original image and Stable Diffusion (Rombach et al. (2022)) to generate an image for the given original caption. ...
October 2023
... This study will verify the applicability and reliability of this model for different time periods and passenger flow changes and prove its effectiveness in practical applications. Currently, methods for traffic flow prediction mainly include deep learning, machine learning, and statistical techniques [1]. In terms of statistical techniques, Liu et al. used the Autoregressive Integrated Moving Average Model (AIMAM) for predictive research on rail traffic flow [2]. ...
November 2023
Expert Systems with Applications