17 results on '"Xiangui Kang"'
Search Results
2. Synthetic Speech Detection Based on Local Autoregression and Variance Statistics
- Author
-
Sanshuai Cui, Bingyuan Huang, Jiwu Huang, and Xiangui Kang
- Subjects
Applied Mathematics ,Signal Processing ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
3. Boosting Query Efficiency of Meta Attack With Dynamic Fine-Tuning
- Author
-
Da Lin, Yuan-Gen Wang, Weixuan Tang, and Xiangui Kang
- Subjects
Applied Mathematics ,Signal Processing ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
4. An Adaptive IPM-based HEVC Video Steganography Via Minimizing Non-additive Distortion
- Author
-
Jie Wang, Xuemei Yin, Yifang Chen, Jiwu Huang, and Xiangui Kang
- Subjects
Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
5. SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation
- Author
-
Xiangui Kang, Jian Yu, Qiben Yan, and Yuewang He
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Genetic programming ,computer.software_genre ,Encryption ,Internet security ,Visualization ,Obfuscation (software) ,Data visualization ,Malware ,Data mining ,Malware analysis ,Safety, Risk, Reliability and Quality ,business ,computer - Abstract
With the rapid development of automation tools including polymorphic and metamorphic engines, generic packers, and genetic programming, many variants of malware have emerged, which pose a significant threat to the Internet security. To effectively detect malware variants, researchers have developed visualization-based approaches that can visualize malware adaptations for in-depth malware analysis. However, most existing visualization approaches rely on the binary image of a malware sample, which fail to provide an effective texture feature representation and thus often result in low efficiency in coping with challenging malware samples. In this paper, we propose SpecView , a malware spectrum visualization framework with singular spectrum transformation. SpecView converts malware binary code into one-dimensional time series spectrum data, and leverages the singular spectrum transformation method to obtain the structural changes preserved in the time series spectrum data. Then, we utilize the particle swarm optimization algorithm to optimize the singular spectrum transformation performance in SpecView. We apply SpecView in the task of malware classification. Extensive experimental results show that SpecView is effective and efficient in malware classification on the Malimg, Malheur, Drebin, and PRAGuard Malgenome Class Encryption datasets, with classification accuracy exceeding 99%, and it can effectively identify malware variants that use evasive techniques such as packer and encryption obfuscation. The proposed method outperforms the state-of-the-art methods on all datasets and the classification accuracy reaches 100% for 5 malware families packed by the UPX packer on the Malimg dataset, as well as 9 malware families that use Class Encryption obfuscation techniques on the PRAGuard Malgenome Class Encryption datasets.
- Published
- 2021
- Full Text
- View/download PDF
6. Automated Design of Neural Network Architectures With Reinforcement Learning for Detection of Global Manipulations
- Author
-
Zheng Wang, Yifang Chen, Xiangui Kang, and Z. Jane Wang
- Subjects
Artificial neural network ,Contextual image classification ,Process (engineering) ,Computer science ,business.industry ,Construct (python library) ,Machine learning ,computer.software_genre ,Convolutional neural network ,Image (mathematics) ,Signal Processing ,Domain knowledge ,Reinforcement learning ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer - Abstract
Deep Convolutional Neural Networks (DCNNs) have been widely used in detection of global manipulations. However, designing effective DCNNs for specific image forensics tasks generally requires domain knowledge and experience gained from abundant experiments, which is time-consuming and labor-expensive. Approaches of automated network designing have been proposed for image classification tasks which are image-content focused, however they may not be suitable to image forensics tasks which rely on identifying subtle traces left by certain image operations. In this paper, we make the first attempt to automate the neural network architecture design for detection of global manipulations. The process of constructing a network is modeled as sequentially selecting optimal architecture modules to generate high-performing CNNs for specific forensic tasks through reinforcement learning. The module-based search space is proposed to make the designing process efficient. Advanced connection patterns (e.g., dense connectivity), which were shown preferred for global manipulation detections, are included in the modules to improve the representational power of the network. Experimental results show that the proposed approach can adaptively construct effective CNN architectures for two common forensic tasks, including multi-purpose forensics and the processing history detection. The auto-designed networks can outperform the state-of-the-art manually designed networks.
- Published
- 2020
- Full Text
- View/download PDF
7. An Embedding Cost Learning Framework Using GAN
- Author
-
Jiwu Huang, Jianhua Yang, Xiangui Kang, Danyang Ruan, and Yun Q. Shi
- Subjects
Distortion function ,Steganalysis ,021110 strategic, defence & security studies ,Steganography ,Computer Networks and Communications ,Computer science ,business.industry ,Deep learning ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Convolutional neural network ,Distortion ,Embedding ,Artificial intelligence ,Safety, Risk, Reliability and Quality ,business ,Algorithm - Abstract
Successful adaptive steganography has mainly focused on embedding the payload while minimizing an appropriately defined distortion function. The application of deep learning to steganalysis has greatly challenged present adaptive steganographic methods, but has also shown the potential for the improvement of steganography. This paper proposes a distortion function generating a framework for steganography. It has three modules: a generator with a U-Net architecture to translate a cover image into an embedding change probability map, a no-pre-training-required double-tanh function to approximate the optimal embedding simulator while preserving gradient norm during backpropagation in the adversarial training, and an enhanced steganalyzer based on a convolution neural network together with multiple high pass filters as the discriminator. Extensive experimental results on different datasets have shown that the proposed framework outperforms the current state-of-the-art steganographic schemes. Moreover, the adversarial training time is reduced dramatically compared with the GAN-based automatic steganographic distortion learning framework (ASDL-GAN).
- Published
- 2020
- Full Text
- View/download PDF
8. A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode
- Author
-
Jie Wang, Xiangui Kang, Yun Q. Shi, and Xiaoqing Jia
- Subjects
HEVC ,General Computer Science ,Cover (telecommunications) ,Steganography ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,General Engineering ,Mode (statistics) ,Data_CODINGANDINFORMATIONTHEORY ,computer.software_genre ,Video steganography ,IPM ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Data mining ,lcsh:TK1-9971 ,computer ,cover selection rule ,Selection (genetic algorithm) - Abstract
Existing video steganography puts much emphasis on the design of algorithms such as mapping rules or distortion functions, thereby ignoring the selection of cover to embed secret information. However, this is just one of the major differences between image steganography and video steganography. In addition, since HEVC is the latest standard in the video codec field, it is of important academic significance and applied value to study HEVC-based steganography. This paper proposes a novel video steganography in HEVC, based on intra-prediction mode (IPM). Firstly, this paper analyzes the probability distribution of 4 × 4 IPMs. Then a cover selection rule combined with the Coding Unit (CU) and Prediction Unit (PU) coding information is proposed, which can improve the security performance of a stego video stream. In addition, matrix coding is used as a coding example to implement the steganography on HEVC video streams. Experimental results show that the proposed algorithm can not only maintain the video quality and the security performance but is also easy to implement. Furthermore, the proposed cover selection rule can also be integrated into other HEVC IPM based steganography.
- Published
- 2019
- Full Text
- View/download PDF
9. A Framework of Camera Source Identification Bayesian Game
- Author
-
Xiangui Kang, Jingjing Yu, Jingxian Liu, Z. Jane Wang, Yun Q. Shi, and Hui Zeng
- Subjects
Computer Science::Computer Science and Game Theory ,Computer science ,0211 other engineering and technologies ,02 engineering and technology ,Computer security ,computer.software_genre ,Image (mathematics) ,Bayesian game ,symbols.namesake ,Information asymmetry ,Complete information ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Computer Science::Cryptography and Security ,021110 strategic, defence & security studies ,Stochastic game ,Computer Science Applications ,Human-Computer Interaction ,Identification (information) ,Control and Systems Engineering ,Nash equilibrium ,symbols ,020201 artificial intelligence & image processing ,Data mining ,computer ,Software ,Information Systems - Abstract
Image forensics with the presence of an adversary, such as the interplay between the sensor-based camera source identification (CSI) and the fingerprint-copy attack, has attracted increasing attention recently. In this paper, we propose a framework of CSI game with both complete information and incomplete information. A noise level-based counter anti-forensic method is presented to detect the potential fingerprint-copy attack, and unlike the state-of-the-art countermeasure of the triangle test, it does not need to collect the candidate image set. With the existence of countermeasure, a rational forger needs to balance the tradeoff between synthesizing source information and leaving new detectable evidence of raising the noise level of a forged image. The mixed-strategy other than the sequential-move assumption is adopted to solve the games. The Bayesian game is introduced to address the information asymmetry in practice. The Nash equilibrium of both the complete information game and Bayesian game are theoretically analyzed, and the expected Nash equilibrium payoff of a Bayesian game is obtained. Nash equilibrium receiver operating characteristic curves are adopted to evaluate the detection performance. Simulation results show that the information asymmetry can remarkably affect the final detection performance. To our knowledge, this paper is the first attempt in analyzing a Bayesian forensic game with practical information asymmetry.
- Published
- 2017
- Full Text
- View/download PDF
10. Audio Recapture Detection With Convolutional Neural Networks
- Author
-
Xiaodan Lin, Jingxian Liu, and Xiangui Kang
- Subjects
021110 strategic, defence & security studies ,Artificial neural network ,Computer science ,Time delay neural network ,Speech recognition ,0211 other engineering and technologies ,02 engineering and technology ,Convolutional neural network ,Computer Science Applications ,Visualization ,Sound recording and reproduction ,Feature (computer vision) ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Spectrogram ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering - Abstract
In this paper, we investigate how features can be effectively learned by deep neural networks for audio forensic problems. By providing a preliminary feature preprocessing based on electric network frequency (ENF) analysis, we propose a convolutional neural network (CNN) for training and classification of genuine and recaptured audio recordings. Hierarchical representations which contain levels of details of the ENF components are learned from the deep neural networks and can be used for further classification. The proposed method works for small audio clips of 2 second duration, whereas the state of the art may fail with such small audio clips. Experimental results demonstrate that the proposed network yields high detection accuracy with each ENF harmonic component represented as a single-channel input. The performance can be further improved by a combined input representation which incorporates both the fundamental ENF and its harmonics. The convergence property of the network and the effect of using an analysis window with various sizes are also studied. Performance comparison against the support tensor machine demonstrates the advantage of using CNN for the task of audio recapture detection. Moreover, visualization of the intermediate feature maps provides some insight into what the deep neural networks actually learn and how they make decisions.
- Published
- 2016
- Full Text
- View/download PDF
11. Median Filtering Forensics Based on Convolutional Neural Networks
- Author
-
Ye Liu, Jiansheng Chen, Xiangui Kang, and Z. Jane Wang
- Subjects
business.industry ,Computer science ,Applied Mathematics ,Pooling ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Filter (signal processing) ,Image editing ,Residual ,computer.software_genre ,Convolutional neural network ,Convolution ,Kernel (image processing) ,Signal Processing ,Median filter ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer ,Feature detection (computer vision) - Abstract
Median filtering detection has recently drawn much attention in image editing and image anti-forensic techniques. Current image median filtering forensics algorithms mainly extract features manually. To deal with the challenge of detecting median filtering from small-size and compressed image blocks, by taking into account of the properties of median filtering, we propose a median filtering detection method based on convolutional neural networks (CNNs), which can automatically learn and obtain features directly from the image. To our best knowledge, this is the first work of applying CNNs in median filtering image forensics. Unlike conventional CNN models, the first layer of our CNN framework is a filter layer that accepts an image as the input and outputs its median filtering residual (MFR). Then, via alternating convolutional layers and pooling layers to learn hierarchical representations, we obtain multiple features for further classification. We test the proposed method on several experiments. The results show that the proposed method achieves significant performance improvements, especially in the cut-and-paste forgery detection.
- Published
- 2015
- Full Text
- View/download PDF
12. Robust Median Filtering Forensics Using an Autoregressive Model
- Author
-
Xiangui Kang, Matthew C. Stamm, Anjie Peng, and K. J. Ray Liu
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Filter (signal processing) ,Image editing ,Residual ,computer.software_genre ,Image (mathematics) ,Digital image ,Dimension (vector space) ,Autoregressive model ,Median filter ,Computer vision ,Artificial intelligence ,Safety, Risk, Reliability and Quality ,business ,computer - Abstract
In order to verify the authenticity of digital images, researchers have begun developing digital forensic techniques to identify image editing. One editing operation that has recently received increased attention is median filtering. While several median filtering detection techniques have recently been developed, their performance is degraded by JPEG compression. These techniques suffer similar degradations in performance when a small window of the image is analyzed, as is done in localized filtering or cut-and-paste detection, rather than the image as a whole. In this paper, we propose a new, robust median filtering forensic technique. It operates by analyzing the statistical properties of the median filter residual (MFR), which we define as the difference between an image in question and a median filtered version of itself. To capture the statistical properties of the MFR, we fit it to an autoregressive (AR) model. We then use the AR coefficients as features for median filter detection. We test the effectiveness of our proposed median filter detection techniques through a series of experiments. These results show that our proposed forensic technique can achieve important performance gains over existing methods, particularly at low false-positive rates, with a very small dimension of features.
- Published
- 2013
- Full Text
- View/download PDF
13. Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise
- Author
-
Zhenhua Qu, Yinxiang Li, Xiangui Kang, and Jiwu Huang
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Feature extraction ,White noise ,Object detection ,Noise ,Digital image ,symbols.namesake ,Additive white Gaussian noise ,Interference (communication) ,Frequency domain ,symbols ,Computer vision ,Artificial intelligence ,Safety, Risk, Reliability and Quality ,business - Abstract
Sensor pattern noise (SPN) extracted from digital images has been proved to be a unique fingerprint of digital cameras. However, SPN can be contaminated largely in the frequency domain by image content and nonunique artefacts of JPEG compression, on-sensor signal transfer, sensor design, color interpolation. The source camera identification (CI) performance based on SPN needs to be improved for small sizes of images and especially in resisting JPEG compression. Because the SPN is modelled as an additive white Gaussian noise (AWGN) in its extraction process from an image, it is reasonable to assume the camera reference SPN to be a white noise signal in order to remove the interference mentioned above. The noise residues (SPN) extracted from the original images are whitened first, then they are averaged to generate the camera reference SPN. Motivated by Goljan 's test statistic peak to correlation energy (PCE), we propose to use correlation to circular correlation norm (CCN) as the test statistic, which can lower the false positive rate to be a half of that with PCE. Theoretical analysis shows that the proposed CI method can remove the interference and raise the CCN value of a positive sample and thus achieve greater CI performance, CCN values of the negative sample class with the proposed method follow the normal distribution N (0,1) and the false positive rate can be calculated. Compared with the existing state of the art on seven cameras, 1400 photos totally (200 for each camera), the experimental results show that the proposed CI method achieves the best receiver operating characteristic (ROC) performance among all CI methods in all cases and especially achieves much better resistance to JPEG compression than all of the existing state-of-the-art CI methods.
- Published
- 2012
- Full Text
- View/download PDF
14. Geometric Invariant Audio Watermarking Based on an LCM Feature
- Author
-
Jiwu Huang, Rui Yang, and Xiangui Kang
- Subjects
Normalization (statistics) ,Signal processing ,business.industry ,Computer science ,Feature extraction ,Fast Fourier transform ,Watermark ,Filter (signal processing) ,Computer Science Applications ,Distortion ,Signal Processing ,Media Technology ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,Invariant (mathematics) ,Sound quality ,business ,Digital watermarking ,Fourier series ,Interpolation - Abstract
The development of a geometric invariant audio watermarking scheme without degrading acoustical quality is challenging work. This paper proposes a multi-bit spread-spectrum audio watermarking scheme based on a geometric invariant log coordinate mapping (LCM) feature. The LCM feature is very robust to audio geometric distortions. The watermark is embedded in the LCM feature, but it is actually embedded in the Fourier coefficients which are mapped to the feature via LCM, so the embedding is actually performed in the DFT domain without interpolation, thus eliminating completely the severe distortion resulted from the non-uniform interpolation mapping. The watermarked audio achieves high auditory quality in both objective and subjective quality assessments. A mixed correlation between the LCM feature and a key-generated PN tracking sequence is proposed to align the log-coordinate mapping, thus synchronizing the watermark efficiently with only one FFT and one IFFT. Both the theoretical analysis and experimental results show that the proposed audio watermarking scheme is not only resilient against common signal processing operations, including low-pass filtering, MP3 recompression, echo addition, volume change, normalization, test functions in the Stirmark benchmark, and DA/AD conversion, but also has conquered the challenging audio geometric distortion and achieves the best robustness against simultaneous geometric distortions, such as pitch invariant time-scale modification (TSM) by ±20%, tempo invariant pitch shifting by 20%, resample TSM with scaling factors between 75% and 140%, and random cropping by 95%. This is mainly contributed by the proposed geometric invariant LCM feature. To our best knowledge, audio watermarking based on LCM has not been reported before.
- Published
- 2011
- Full Text
- View/download PDF
15. Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping
- Author
-
Wenjun Zeng, Jiwu Huang, and Xiangui Kang
- Subjects
Signal processing ,Computer Networks and Communications ,Computer science ,business.industry ,Watermark ,Inverse problem ,Discrete Fourier transform ,Distortion ,Information hiding ,Computer Science::Multimedia ,Embedding ,Computer vision ,Artificial intelligence ,Safety, Risk, Reliability and Quality ,business ,Digital watermarking ,Algorithm ,Interpolation - Abstract
This paper proposes an efficient, blind, and robust data hiding scheme which is resilient to both geometric distortion and the general print-scan process, based on a near uniform log-polar mapping (ULPM). In contrast to performing inverse log-polar mapping (a mapping from the log-polar system to the Cartesian system) to the watermark signal or its index as done in the prior works, we apply ULPM to the frequency index (u, v) in the Cartesian system to obtain the discrete log-polar coordinate (l 1, l 2), then embed one watermark bit w(l 1 ,l 2 ) in the corresponding discrete Fourier transform coefficient c(u,v). This mapping of index from the Cartesian system to the log-polar system but embedding the corresponding watermark directly in the Cartesian domain not only completely removes the interpolation distortion and the interference distortion introduced to the watermark signal as observed in some prior works, but also largely expands the cardinality of watermark in the log-polar mapping domain. Both theoretical analysis and experimental results show that the proposed watermarking scheme achieves excellent robustness to geometric distortion, normal signal processing, and the general print-scan process. Compared to existing watermarking schemes, our algorithm offers significant improvement in terms of robustness against general print-scan, receiver operating characteristic (ROC) performance, and efficiency of blind resynchronization.
- Published
- 2010
- Full Text
- View/download PDF
16. Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver
- Author
-
Wenjun Zeng, Jiwu Huang, and Xiangui Kang
- Subjects
Steganography ,Color image ,Computer science ,business.industry ,Quantization (signal processing) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Watermark ,Filter (signal processing) ,Computer Science Applications ,Gamma correction ,Histogram ,Computer Science::Multimedia ,Signal Processing ,Media Technology ,Median filter ,Computer vision ,Fading ,Artificial intelligence ,Electrical and Electronic Engineering ,Quantization (image processing) ,business ,Digital watermarking ,Algorithm ,Histogram equalization - Abstract
In this paper, the watermarking channel is modeled as a generalized channel with fading and nonzero mean additive noise. In order to improve the watermark robustness against the generalized channel, we present an optimized watermark extraction scheme by using an adaptive receiver for quantization-based watermarking. In the proposed extraction scheme, we adaptively estimate the decision zone of the binary data bits and the quantization step size. A training sequence is embedded into the original image together with the informative watermark. The estimation of the decision zone takes advantage of the response function of the training sequence. Compared to those watermarking schemes without receiver adaptation, the main improvement is the enhanced robustness against median filtering, image intensity Direct Current (DC) change, histogram equalization, color reduction, image intensity linear scaling, image intensity nonlinear scaling such as Gamma correction etc.
- Published
- 2008
- Full Text
- View/download PDF
17. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
- Author
-
Yun Q. Shi, Xiangui Kang, Yan Lin, and Jiwu Huang
- Subjects
business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Watermark ,Data_CODINGANDINFORMATIONTHEORY ,Wavelet ,Robustness (computer science) ,Media Technology ,Computer vision ,Affine transformation ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Digital watermarking ,Transform coding ,Mathematics ,Data compression ,Image compression - Abstract
Robustness is a crucially important issue in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. A blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed. The algorithm improves robustness by using a new embedding strategy, watermark structure, 2D interleaving, and synchronization technique. A spread-spectrum-based informative watermark with a training sequence is embedded in the coefficients of the LL subband in the DWT domain while a template is embedded in the middle frequency components in the DFT domain. In watermark extraction, we first detect the template in a possibly corrupted watermarked image to obtain the parameters of an affine transform and convert the image back to its original shape. Then, we perform translation registration using the training sequence embedded in the DWT domain, and, finally, extract the informative watermark. Experimental work demonstrates that the proposed algorithm generates a more robust watermark than other reported watermarking algorithms. Specifically it is robust simultaneously against almost all affine transform related testing functions in StirMark 3.1 and JPEG compression with quality factor as low as 10. While the approach is presented for gray-level images, it can also be applied to color images and video sequences.
- Published
- 2003
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.