64 results on '"Mengyu Qiao"'
Search Results
2. Exposing Inpainting Forgery in JPEG Images under Recompression Attacks.
- Author
-
Qingzhong Liu, Andrew H. Sung, Bing Zhou 0002, and Mengyu Qiao
- Published
- 2016
- Full Text
- View/download PDF
3. A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics.
- Author
-
Mengyu Qiao, Suiyuan Zhang, Andrew H. Sung, and Qingzhong Liu
- Published
- 2015
- Full Text
- View/download PDF
4. Identification of Smartphone-Image Source and Manipulation.
- Author
-
Qingzhong Liu, Xiaodong Li, Lei Chen 0029, Hyuk Cho, Peter A. Cooper, Zhongxue Chen, Mengyu Qiao, and Andrew H. Sung
- Published
- 2012
- Full Text
- View/download PDF
5. A Method to Detect JPEG-Based Double Compression.
- Author
-
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao
- Published
- 2011
- Full Text
- View/download PDF
6. Locating Information-hiding in MP3 Audio.
- Author
-
Mengyu Qiao, Andrew H. Sung, Qingzhong Liu, and Bernardete Ribeiro
- Published
- 2011
7. Revealing real quality of double compressed MP3 audio.
- Author
-
Mengyu Qiao, Andrew H. Sung, and Qingzhong Liu
- Published
- 2010
- Full Text
- View/download PDF
8. Predicting embedding strength in audio steganography.
- Author
-
Mengyu Qiao, Andrew H. Sung, and Qingzhong Liu
- Published
- 2010
- Full Text
- View/download PDF
9. Classification of Mass Spectrometry Data - Using Manifold and Supervised Distance Metric Learning.
- Author
-
Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, and Mengyu Qiao
- Published
- 2009
10. Novel stream mining for audio steganalysis.
- Author
-
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao
- Published
- 2009
- Full Text
- View/download PDF
11. Improved detection and evaluation for JPEG steganalysis.
- Author
-
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao
- Published
- 2009
- Full Text
- View/download PDF
12. Spectrum Steganalysis of WAV Audio Streams.
- Author
-
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao
- Published
- 2009
- Full Text
- View/download PDF
13. Feature Mining and Intelligent Computing for MP3 Steganalysis.
- Author
-
Mengyu Qiao, Andrew H. Sung, and Qingzhong Liu
- Published
- 2009
- Full Text
- View/download PDF
14. Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis.
- Author
-
Qingzhong Liu, Andrew H. Sung, Mengyu Qiao, and Bernardete Ribeiro
- Published
- 2009
15. Steganalysis of MP3Stego.
- Author
-
Mengyu Qiao, Andrew H. Sung, and Qingzhong Liu
- Published
- 2009
- Full Text
- View/download PDF
16. Multi-slot Channel Allocation for Priority Packet Transmission in the GPRS Network.
- Author
-
Jun Zheng 0003, Mengyu Qiao, and Emma E. Regentova
- Published
- 2009
- Full Text
- View/download PDF
17. Detecting information-hiding in WAV audios.
- Author
-
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao
- Published
- 2008
- Full Text
- View/download PDF
18. Distance Metric Learning and Support Vector Machines for Classification of Mass Spectrometry Proteomics Data.
- Author
-
Qingzhong Liu, Mengyu Qiao, and Andrew H. Sung
- Published
- 2008
- Full Text
- View/download PDF
19. Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU StegoVideo.
- Author
-
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao
- Published
- 2008
- Full Text
- View/download PDF
20. Fuzzy target detection algorithm based on improved SSD and transfer learning
- Author
-
Fu Huitong, Peng Wang, Jiao Wu, Mengyao Cai, Mengyu Qiao, and Li Xiaoyan
- Subjects
Statistics and Probability ,Artificial Intelligence ,Computer science ,business.industry ,General Engineering ,Artificial intelligence ,Transfer of learning ,business ,Fuzzy logic - Abstract
Fuzzy target detection as an important task to reflect the detection ability of underwater robot, the artificial target recognition based on the image taken by underwater robot has been widely concerned. However, there is no open standard fuzzy underwater image data set, and in the harsh deep-water fuzzy environment, it is difficult to collect large-scale marked underwater fuzzy optical images. At the same time, it is also hoped that the detection model has the ability to learn quickly from small samples in the case of as few samples as possible. Therefore, combining depth learning and transfer learning, a new method based on improved SSD and transfer learning is proposed. Firstly, we design a more accurate SSD network (underwater SSD) which is suitable for fuzzy underwater target detection. The features extracted from the detection network are highly representative. Secondly, we use the Transfer learning method to train the underwater SSD network, which can only use the tags in the air to identify fuzzy underwater objects, and have strong robustness in both the air and fuzzy underwater imaging modes. Finally, soft NMS is used to detect the target. The experimental results of the simulation data show that the algorithm not only overcomes the difficulties of the known data set of underwater target, but also effectively improves the accuracy of underwater target detection compared with the traditional deep learning method, reaching 82.31%, showing better detection performance.
- Published
- 2021
21. Virtual machine auto-configuration for web application.
- Author
-
Yang Wang and Mengyu Qiao
- Published
- 2010
- Full Text
- View/download PDF
22. Smartphone Sensor-Based Activity Recognition by Using Machine Learning and Deep Learning Algorithms
- Author
-
Qingzhong Liu, Prathyusha Uduthalapally, Sarbagya Ratna Shakya, Mengyu Qiao, Zhaoxian Zhou, and Andrew H. Sung
- Subjects
Information Systems and Management ,Computer science ,business.industry ,Deep learning ,010401 analytical chemistry ,Feature extraction ,020207 software engineering ,02 engineering and technology ,Machine learning ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,Computer Science Applications ,Support vector machine ,Activity recognition ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,business ,computer - Published
- 2018
23. Combination weighted clustering algorithms in cognitive radio networks
- Author
-
Mengyu Sun, Xiaoyan Li, Peng Wang, Zhigang Lv, and Mengyu Qiao
- Subjects
Cognitive radio ,Computational Theory and Mathematics ,Computer Networks and Communications ,Computer science ,business.industry ,Artificial intelligence ,business ,Cluster analysis ,Software ,Computer Science Applications ,Theoretical Computer Science - Published
- 2019
24. Facial Expression Recognition Algorithm Using Shallow Residual Network for Individual Soldier System
- Author
-
Haiyan Wang, Kai Li, Peng Wang, Xiaoyan Li, and Mengyu Qiao
- Subjects
Facial expression recognition ,business.industry ,Computer science ,Deep learning ,Artificial intelligence ,Layer (object-oriented design) ,business ,Residual ,Algorithm - Abstract
Facial expression recognition plays an increasingly important role in monitoring the mental state of individual soldiers. Aiming at the problem of low accuracy rate by traditional facial expression recognition method, this paper proposes an improved shallow residual network facial expression recognition algorithm. Based on ResNet which is the main target detection framework of existing deep learning, a Res-HyperNet structure is proposed to learn more shallow features. First, the shallow features are aggregated and compressed into one space. To improve the recognition effect, this paper sent the high-level features which have more useful semantic information to a deeper convolution layer through a shortcut to perform fusion calculation. Three public datasets (CK+, JAFFE, Oulu-CASIA) and self-made datasets are used for accuracy rate experiments. Compared with the existing mainstream facial expression recognition method, the improved shallow residual network algorithm can raise the accuracy rate up to 3%.
- Published
- 2018
25. Exposing Inpainting Forgery in JPEG Images under Recompression Attacks
- Author
-
Bing Zhou, Andrew H. Sung, Mengyu Qiao, and Qingzhong Liu
- Subjects
021110 strategic, defence & security studies ,business.industry ,Computer science ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Inpainting ,02 engineering and technology ,computer.file_format ,JPEG ,Ensemble learning ,Seam carving ,Feature (computer vision) ,0202 electrical engineering, electronic engineering, information engineering ,Discrete cosine transform ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,computer ,Transform coding - Abstract
Inpainting, originally designed in computer vision to reconstruct lost or deteriorated parts of images and videos, has been used for image tampering, including region filling and object removal to alter the truth. While several types of tampering including copy-move and seam carving forgery can now be successfully exposed in image forensics, there has been very little study to tackle inpainting forgery in JPEG images, the detection of which is extremely challenging due to the post-recompression attacks performed to cover or compromise original inpainting traces. To date, there is no effective way to detect inpainting image forgery under combined recompression attacks. To fill such a gap in image forensics and reveal inpainting forgery from the post-recompression attacks in JPEG images, we propose in this paper an approach that begins with large feature mining in discrete transform domain, ensemble learning is then applied to deal with the high feature dimensionality and to prevent the overfitting that generally happens to some regular classifiers under high feature dimensions. Our study shows the proposed approach effectively exposes inpainting forgery under post recompression attacks, especially, it noticeably improves the detection accuracy while the recompression quality is lower than the original JPEG image quality, and thus bridges a gap in image forgery detection.
- Published
- 2016
26. Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation
- Author
-
Hyuk Cho, Yuting Su, Qingzhong Liu, Zhongxue Chen, Mengyu Qiao, Mingzhen Wei, Andrew H. Sung, Lei Chen, and Peter A. Cooper
- Subjects
Steganalysis ,Steganography ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Digital imaging ,computer.file_format ,Lossy compression ,JPEG ,Artificial Intelligence ,Discrete cosine transform ,Computer vision ,Artificial intelligence ,business ,computer ,Image compression - Abstract
Digital multimedia forensics is an emerging field that has important applications in law enforcement and protection of public safety and national security. In digital imaging, JPEG is the most popular lossy compression standard and JPEG images are ubiquitous. Today's digital techniques make it easy to tamper JPEG images without leaving any visible clues. Furthermore, most image tampering involves JPEG double compression, it heightens the need for accurate analysis of JPEG double compression in image forensics. In this paper, to improve the detection of JPEG double compression, we transplant the neighboring joint density features, which were designed for JPEG steganalysis, and merge the joint density features with marginal density features in DCT domain as the detector for learning classifiers. Experimental results indicate that the proposed method improves the detection performance. We also study the relationship among compression factor, image complexity, and detection accuracy, which has not been comprehensively analyzed before. The results show that a complete evaluation of the detection performance of different algorithms should necessarily include image complexity as well as the double compression quality factor. In addition to JPEG double compression, the identification of image capture source is an interesting topic in image forensics. Mobile handsets are widely used for spontaneous photo capture because they are typically carried by their users at all times. In the imaging device market, smartphone adoption is currently exploding and megapixel smartphones pose a threat to the traditional digital cameras. While smartphone images are widely disseminated, the manipulation of images is also easily performed with various photo editing tools. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. Following the success of our previous work in JPEG double compression detection, we conducted a study to identify smartphone source and post-capture manipulation by utilizing marginal density and neighboring joint density features together. Experimental results show that our method is highly promising for identifying both smartphone source and manipulations. Finally, our study also indicates that applying unsupervised clustering and supervised classification together leads to improvement in identifying smartphone sources and manipulations and thus provides a means to address the complexity issue of the intentional post-capture manipulation on smartphone images.
- Published
- 2013
27. Merging Permission and API Features for Android Malware Detection
- Author
-
Andrew H. Sung, Mengyu Qiao, and Qingzhong Liu
- Subjects
021110 strategic, defence & security studies ,Source code ,Computer science ,media_common.quotation_subject ,0211 other engineering and technologies ,Feature selection ,0102 computer and information sciences ,02 engineering and technology ,Permission ,Computer security ,computer.software_genre ,01 natural sciences ,Support vector machine ,Cryptovirology ,010201 computation theory & mathematics ,Malware ,Android (operating system) ,computer ,Mobile device ,media_common - Abstract
The prosperity of mobile devices have been rapidly and drastically reforming the use pattern and of user habits with computing devices. Android, the most popular mobile operating system, has a privilege-separated security system through a sophisticated permission control mechanism. Android Apps need to request permissions to access sensitive personal data and system resources, but empirical studies have found that various types of malicious software could obtain permissions and attack systems and applications by deceiving users and the security mechanism. In this paper, we propose a novel machine learning approach to detect malware by mining the patterns of Permissions and API Function Calls acquired and used by Android Apps. Based on static analysis of source code and resource files of Android Apps, binary and numerical features are extracted for qualitative and quantitative evaluation. Feature selection methods are applied to reduce the feature dimension and enhance the efficiency. Different machine learning methods, including Support Vector Machines, Random Forest and Neural Networks, are applied and compared in classification. The experimental results show that the proposed approach delivers accurate detection of Android malware. We deem that the proposed approach could help raise users' awareness of potential risks and mitigate malware threats for Android devices.
- Published
- 2016
28. Derivative-based audio steganalysis
- Author
-
Mengyu Qiao, Andrew H. Sung, and Qingzhong Liu
- Subjects
Steganalysis ,Audio signal ,Steganography ,Markov chain ,Computer Networks and Communications ,business.industry ,Computer science ,Speech recognition ,Speech coding ,Pattern recognition ,Signal ,Support vector machine ,ComputingMethodologies_PATTERNRECOGNITION ,Hardware and Architecture ,Artificial intelligence ,business ,Digital audio - Abstract
This article presents a second-order derivative-based audio steganalysis. First, Mel-cepstrum coefficients and Markov transition features from the second-order derivative of the audio signal are extracted; a support vector machine is then applied to the features for discovering the existence of hidden data in digital audio streams. Also, the relation between audio signal complexity and steganography detection accuracy, which is an issue relevant to audio steganalysis performance evaluation but so far has not been explored, is analyzed experimentally. Results demonstrate that, in comparison with a recently proposed signal stream-based Mel-cepstrum method, the second-order derivative-based audio steganalysis method gains a considerable advantage under all categories of signal complexity--especially for audio streams with high signal complexity, which are generally the most challenging for steganalysis-and thereby significantly improves the state of the art in audio steganalysis.
- Published
- 2011
29. Neighboring joint density-based JPEG steganalysis
- Author
-
Andrew H. Sung, Qingzhong Liu, and Mengyu Qiao
- Subjects
Steganalysis ,Steganography ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Feature selection ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,computer.software_genre ,JPEG ,Theoretical Computer Science ,Support vector machine ,Artificial Intelligence ,Discrete cosine transform ,Data mining ,Artificial intelligence ,Quantization (image processing) ,business ,computer ,Lossless JPEG - Abstract
The threat posed by hackers, spies, terrorists, and criminals, etc. using steganography for stealthy communications and other illegal purposes is a serious concern of cyber security. Several steganographic systems that have been developed and made readily available utilize JPEG images as carriers. Due to the popularity of JPEG images on the Internet, effective steganalysis techniques are called for to counter the threat of JPEG steganography. In this article, we propose a new approach based on feature mining on the discrete cosine transform (DCT) domain and machine learning for steganalysis of JPEG images. First, neighboring joint density features on both intra-block and inter-block are extracted from the DCT coefficient array and the absolute array, respectively; then a support vector machine (SVM) is applied to the features for detection. An evolving neural-fuzzy inference system is employed to predict the hiding amount in JPEG steganograms. We also adopt a feature selection method of support vector machine recursive feature elimination to reduce the number of features. Experimental results show that, in detecting several JPEG-based steganographic systems, our method prominently outperforms the well-known Markov-process based approach.
- Published
- 2011
30. Detection of Double MP3 Compression
- Author
-
Mengyu Qiao, Andrew H. Sung, and Qingzhong Liu
- Subjects
Lossless compression ,Modified discrete cosine transform ,Computer science ,Cognitive Neuroscience ,Speech recognition ,Speech coding ,Data_CODINGANDINFORMATIONTHEORY ,Audio forensics ,Computer Science Applications ,Raw audio format ,Encoding (memory) ,Computer Vision and Pattern Recognition ,Digital audio ,Data compression - Abstract
MPEG-1 Audio Layer 3, more commonly referred to as MP3, is a popular audio format for consumer audio storage and a de facto standard of digital audio compression for the transfer and playback of music on digital audio players. MP3 audio forgery manipulations generally uncompress a MP3 file, tamper with the file in the temporal domain, and then compress the doctored audio file back into MP3 format. If the compression quality of doctored MP3 file is different from the quality of original MP3 file, the doctored MP3 file is said to have undergone double MP3 compression. Although double MP3 compression does not prove a malicious tampering, it is evidence of manipulation and thus may warrant further forensic analysis since, e.g., faked MP3 files can be generated by using double MP3 compression at a higher bit-rate for the second compression to claim a higher quality of the audio files. To detect double MP3 compression, in this paper, we extract the statistical features on the modified discrete cosine transform and apply a support vector machine to the extracted features for classification. Experimental results show that our designed method is highly effective for detecting faked MP3 files. Our study also indicates that the detection performance is closely related to the bit-rate of the first-time MP3 encoding and the bit-rate of the second-time MP3 encoding.
- Published
- 2010
31. An improved approach to steganalysis of JPEG images
- Author
-
Andrew H. Sung, Qingzhong Liu, Bernardete Ribeiro, Zhongxue Chen, and Mengyu Qiao
- Subjects
Steganalysis ,Steganography tools ,Discrete wavelet transform ,Information Systems and Management ,Steganography ,business.industry ,Feature vector ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,computer.file_format ,JPEG ,Computer Science Applications ,Theoretical Computer Science ,Artificial Intelligence ,Control and Systems Engineering ,Feature (computer vision) ,Discrete cosine transform ,Artificial intelligence ,business ,computer ,Software ,Mathematics - Abstract
Steganography secretly embeds additional information in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great. To combat the threat posed by steganography, steganalysis aims at the exposure of the stealthy communication. In this paper, a new scheme is proposed for steganalysis of JPEG images, which, being the most common image format, is believed to be widely used for steganography purposes as there are many free or commercial tools for producing steganography using JPEG covers. First, a recently proposed Markov approach [27] is expanded to the inter-block of the discrete cosine transform (DCT) and to the discrete wavelet transform (DWT). The features on the joint distributions of the transform coefficients and the features on the polynomial fitting errors of the histogram of the DCT coefficients are also extracted. All features are called original ExPanded Features (EPF). Next, the EPF features are extracted from the calibrated version; these are called reference EPF features. The difference between the original and the reference EPF features is calculated, and then the original EPF features and the difference are merged to form the feature vector for classification. To handle the large number of developed features, the feature selection method of support vector machine recursive feature elimination (SVM-RFE) and a method of multi-class support vector machine recursive feature elimination (MSVM-RFE) are used to select features for binary classification and multi-class classification, respectively. Finally, support vector machines are applied to the selected features for detecting stego-images. Experimental results show that, in comparison to the Markov approach [27], this new scheme remarkably improves the detection performance on several JPEG-based steganographic systems, including JPHS, CryptoBola, F5, Steghide, and Model based steganography.
- Published
- 2010
32. Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis
- Author
-
Andrew H. Sung, Qingzhong Liu, and Mengyu Qiao
- Subjects
Steganalysis ,Audio signal ,Steganography ,Computer Networks and Communications ,Computer science ,business.industry ,Speech recognition ,Wavelet transform ,Pattern recognition ,computer.software_genre ,symbols.namesake ,ComputingMethodologies_PATTERNRECOGNITION ,Wavelet ,Fourier transform ,Histogram ,Cepstrum ,symbols ,Discrete cosine transform ,Artificial intelligence ,Safety, Risk, Reliability and Quality ,Audio signal processing ,business ,computer ,Second derivative - Abstract
To improve a recently developed mel-cepstrum audio steganalysis method, we present in this paper a method based on Fourier spectrum statistics and mel-cepstrum coefficients, derived from the second-order derivative of the audio signal. Specifically, the statistics of the high-frequency spectrum and the mel-cepstrum coefficients of the second-order derivative are extracted for use in detecting audio steganography. We also design a wavelet-based spectrum and mel-cepstrum audio steganalysis. By applying support vector machines to these features, unadulterated carrier signals (without hidden data) and the steganograms (carrying covert data) are successfully discriminated. Experimental results show that proposed derivative-based and wavelet-based approaches remarkably improve the detection accuracy. Between the two new methods, the derivative-based approach generally delivers a better performance.
- Published
- 2009
33. A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics
- Author
-
Suiyuan Zhang, Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao
- Subjects
Password ,Authentication ,Biometrics ,Wireless network ,Computer science ,Mobile computing ,Computer security ,computer.software_genre ,law.invention ,Touchscreen ,Human–computer interaction ,law ,Mobile device ,computer ,Gesture - Abstract
With the booming of smart phone and high-speed wireless networks in recent years, applications and data have been shifting from desktop to mobile devices at a vigorous pace. Although mobile computing provides great convenience in daily life, it becomes vulnerable to various types of emerging attacks. User authentication plays an indispensable role in protecting computer systems and applications, but the development of touch screen hardware and user habit change post requirements for new authentication methods for mobile and tablets devices. In this paper, we present a robust user authentication scheme using both static and dynamic features of touch gestures. We take advantage of the pressure sensitivity of multi-touch screens to obtain irreproducible biometric patterns. Discriminative features such as distance, angle, and pressure are extracted from the touch-point data, and used in statistical analysis for verification. We tested our scheme in a variety of experiments that involved multiple volunteers to perform various gestures. The analysis of experimental results and user feedback indicate the proposed scheme delivers comprehensive measurements and accurate pattern classification for touch gestures. Based on these results, we conclude that the proposed scheme overcomes the limitations of the existing user authentication methods, and shows great potential to provide robust protection against unauthorized access.
- Published
- 2015
34. Analysis of Maxproximity and RCA with International Trade Data--Take China as an Example
- Author
-
Mengyu Qiao and Tieju Ma
- Subjects
Structure (mathematical logic) ,Engineering ,Operations research ,High complexity ,Process (engineering) ,business.industry ,Product topology ,Revealed comparative advantage ,Construct (python library) ,Product (category theory) ,China ,business ,Industrial organization - Abstract
Keywords: RCA (revealed comparative advantage), maxproximity, product space Abstract. This paper emphasize "maxproximity" to define the maximum proximity between a product with RCA 1, then calculate the relationship between them. We take China as an example to verify the feasibility on maxproximity, simulate the product structure evolution with the rules we summarize, and construct a product space network to demonstrate the process. We draw a conclusion that country specialize the products with high complexity can produce other kinds of goods easily, because the country has the product knowledge more diversified.
- Published
- 2015
35. Improved detection of MP3 double compression using content-independent features
- Author
-
Qingzhong Liu, Mengyu Qiao, and Andrew H. Sung
- Subjects
Audio mining ,Audio signal ,Computer science ,business.industry ,Speech coding ,Audio signal flow ,Transcoding ,computer.software_genre ,Discrete cosine transform ,Computer vision ,Artificial intelligence ,Sound quality ,Audio signal processing ,business ,computer ,Digital audio ,Data compression - Abstract
With the booming of smartphone and high-speed wireless networks in recent years, audio streaming and sharing become convenient and inexpensive, so that digital media is gradually replacing physical media. This trend has also led to more attacks to digital audio and its application. MP3 double compression, achieved by decompressing and recompressing audio to a different compression ratio, is a typical manipulation of audio for malicious purposes. In this paper, we propose an approach for detecting both up-transcoded and down-transcoded MP3 audio files and revealing the real compression quality based on statistical patterns extracted from quantized MDCT coefficients and their derivatives. To minimize the false prediction caused by individual characteristics of diversified audio clips, we generated reference audio signals by recompressing and calibrating the audio, and measured the differences between signal-based and reference-based features. Support vector machines and dynamic evolving neural-fuzzy inference systems were applied for binary and multi-class classifications. The experimental results show that our approach effectively detects MP3 double compression and exposes the audio processing history for digital forensics.
- Published
- 2013
36. Identification of Smartphone-Image Source and Manipulation
- Author
-
Hyuk Cho, Lei Chen, Peter A. Cooper, Zhongxue Chen, Mengyu Qiao, Qingzhong Liu, Xiaodong Li, and Andrew H. Sung
- Subjects
Authentication ,Computer science ,business.industry ,Digital forensics ,computer.file_format ,JPEG ,Hierarchical clustering ,Support vector machine ,Identification (information) ,Computer vision ,Artificial intelligence ,Cluster analysis ,Joint (audio engineering) ,business ,computer - Abstract
As smartphones are being widely used in daily lives, the images captured by smartphones become ubiquitous and may be used for legal purposes. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. In this paper, we propose a method to determine the smartphone camera source of a particular image and operations that may have been performed on that image. We first take images using different smartphones and purposely manipulate the images, including different combinations of double JPEG compression, cropping, and rescaling. Then, we extract the marginal density in low frequency coordinates and neighboring joint density features on intra-block and inter-block as features. Finally, we employ a support vector machine to identify the smartphone source as well as to reveal the operations. Experimental results show that our method is very promising for identifying both smartphone source and manipulations. Our study also indicates that applying unsupervised clustering and supervised classification together (clustering first, followed by classification) leads to improvement in identifying smartphone sources and manipulations and thus provides a means to address the complexity issue of intentional manipulation.
- Published
- 2012
37. Feature Mining and Pattern Recognition in Multimedia Forensics—Detection of JPEG Image Based Steganography, Double-Compression, Interpolation and WAV Audio Based Steganography
- Author
-
Andrew H. Sung, Zhongxue Chen, Qingzhong Liu, Mengyu Qiao, and Bernardete Ribeiro
- Subjects
Steganalysis ,Steganography tools ,Steganography ,Computer science ,business.industry ,Digital forensics ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Covert channel ,Pattern recognition ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,JPEG ,Digital image ,Discrete cosine transform ,Computer vision ,Artificial intelligence ,business ,computer - Abstract
Steganography, the ancient art for secretive communications, has revived on the Internet by way of hiding secret data, in completely imperceptible manners, into a digital file. Thus, the steganography has created a serious threat to cyber security due to the covert channel it provides that can be readily exploited for various illegal purposes. Likewise, image tampering or forgery, which has been greatly facilitated and proliferated by photo processing tools, is increasingly causing problems concerning the authenticity of digital images. JPEG images constitute one of the most popular media on the Internet; yet they can be easily used for the steganography as well as easily tampered by, e.g., removing, adding, or splicing objects without leaving any clues. Therefore, there is a critical need to develop reliable methods for steganalysis (analysis of multimedia for the steganography) and for forgery detection in JPEG images to serve applications in national security, law enforcement, cybercrime fighting, digital forensics, and network security, etc. This article presents some recent results on detecting JPEG steganograms, doubly compressed JPEG images, and resized JPEG images based on a unified framework of feature mining and pattern recognition approaches. At first, the neighboring joint density features and marginal density features of the DCT coefficients of the JPEG image are extracted; then learning classifiers are applied to the features for the detection. Experimental results indicate that the method prominently improves the detection performances in JPEG images when compared to a previously well-studied method. Also, it is demonstrated that detection performance deteriorates with increasing image complexity; hence, a complete evaluation of the detection performance of different algorithms should include image complexity—in addition to other relevant factors such as hiding ratio or compression ratio—as a significant and independent parameter.
- Published
- 2011
38. Revealing real quality of double compressed MP3 audio
- Author
-
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao
- Subjects
Lossless compression ,Steganography ,Modified discrete cosine transform ,Computer science ,business.industry ,Speech coding ,Data_CODINGANDINFORMATIONTHEORY ,Transcoding ,computer.software_genre ,Audio forensics ,Computer vision ,Artificial intelligence ,Sound quality ,Audio signal processing ,business ,computer ,Transform coding ,Digital audio ,Data compression - Abstract
MP3 is the most popular format for audio storage and a de facto standard of digital audio compression for the transfer and playback. The flexibility of compression ratio of MP3 coding enables users to choose their customized configuration in the trade-off between file size and quality. Double MP3 compression often occurs in audio forgery, steganography and quality faking by transcoding an MP3 audio to a different compression ratio. To detect double MP3 compression, in this paper, we extract the statistical features on the modified discrete cosine transform, and apply support vector machines and a dynamic evolving neuron-fuzzy inference system to the extracted features for classification. Experimental results show that our method effectively and accurately detects double MP3 compression for both up-transcoded and down-transcoded MP3 files. Our study also indicates the potential for mining the audio processing history for forensic purposes.
- Published
- 2010
39. Predicting embedding strength in audio steganography
- Author
-
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao
- Subjects
Steganalysis ,Steganography tools ,Steganography ,business.industry ,Computer science ,Speech recognition ,Feature extraction ,Pattern recognition ,Discrete cosine transform ,Embedding ,Artificial intelligence ,Quantization (image processing) ,business ,Data compression - Abstract
As a serious concern of information security, steganography provides a covert communication channel for cyber-terrorism and cyber-crime. The widespread use enables MP3 compressed audio to become an excellent carrier for audio steganography on the Internet. Since embedding capacity is an important measure to evaluate the performance of steganographic systems, and embedding ratio is commonly used when comparing the accuracy of different steganalysis algorithms. In this paper, we present a scheme to predict embedding strength based on feature mining in MDCT transform domain. We generate reference signals by reversing and repeating quantification process, and derive the reference based accumulative features from the difference between source signal and reference signal. Finally, a dynamic evolving neuron-fuzzy inference system is applied to predict embedding strength of MP3 compressed audio. Experimental results show that our approach obtains good prediction of the embedding strength in the steganograms.
- Published
- 2010
40. Novel stream mining for audio steganalysis
- Author
-
Andrew H. Sung, Qingzhong Liu, and Mengyu Qiao
- Subjects
Steganalysis ,Relation (database) ,Markov chain ,Steganography ,business.industry ,Computer science ,Speech recognition ,Pattern recognition ,Signal ,Support vector machine ,ComputingMethodologies_PATTERNRECOGNITION ,Artificial intelligence ,State (computer science) ,business ,Second derivative - Abstract
In this paper, we present a novel stream data mining for audio steganalysis, based on second order derivative of audio streams. We extract Mel-cepstrum coefficients and Markov transition features on the second order derivative, a support vector machine is applied to the features for discovery of the existence of covert message in digital audios. We also explore the relation between signal complexity and detection performance on digital audios, which has not been studied previously. Our study shows that, in comparison with a recently proposed signal stream based Mel-cepstrum steganalysis, our method prominently improves the detection performance, which is not only related to information-hiding ratio but also signal complexity. Generally speaking, signal stream based Mel-cepstrum audio steganalysis performs well in steganalysis of audios with low signal complexity; it does not work so well on audios with high signal complexity. Our stream mining approach for audio steganalysis gains significant advantage in each category of signal complexity - especially in audios with high signal complexity, and thus improves the state of the art in audio steganalysis.
- Published
- 2009
41. Improved detection and evaluation for JPEG steganalysis
- Author
-
Mengyu Qiao, Qingzhong Liu, and Andrew H. Sung
- Subjects
Steganalysis ,Steganography ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,JPEG ,Information hiding ,JPEG 2000 ,Discrete cosine transform ,Computer vision ,Artificial intelligence ,business ,Quantization (image processing) ,computer ,Lossless JPEG - Abstract
Detection of information-hiding in JPEG images is actively delivered in steganalysis community due to the fact that JPEG is a widely used compression standard and several steganographic systems have been designed for covert communication in JPEG images. In this paper, we propose a novel method of JPEG steganalysis. Based on an observation of bi-variate generalized Gaussian distribution in Discrete Cosine Transform (DCT) domain, neighboring joint density features on both intra-block and inter-block are extracted. Support Vector Machines (SVMs) are applied for detection. Experimental results indicate that this new method prominently improves a current art of steganalysis in detecting several steganographic systems in JPEG images. Our study also shows that it is more accurate to evaluate the detection performance in terms of both image complexity and information hiding ratio.
- Published
- 2009
42. Comparison of feature selection and classification for MALDI-MS data
- Author
-
Zhongxue Chen, Qingzhong Liu, Xudong Huang, Mary Qu Yang, Mengyu Qiao, Andrew H. Sung, Youping Deng, and Jack Y. Yang
- Subjects
Proteomics ,Maldi ms ,lcsh:QH426-470 ,Computer science ,lcsh:Biotechnology ,Feature selection ,02 engineering and technology ,Mass spectrometry ,Pattern Recognition, Automated ,03 medical and health sciences ,Artificial Intelligence ,lcsh:TP248.13-248.65 ,0202 electrical engineering, electronic engineering, information engineering ,Genetics ,Oligonucleotide Array Sequence Analysis ,030304 developmental biology ,0303 health sciences ,Biological data ,Models, Statistical ,Intelligent computing ,business.industry ,Research ,Computational Biology ,Pattern recognition ,Peak detection ,lcsh:Genetics ,ComputingMethodologies_PATTERNRECOGNITION ,Spectrometry, Mass, Matrix-Assisted Laser Desorption-Ionization ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Algorithms ,Biotechnology - Abstract
Introduction In the classification of Mass Spectrometry (MS) proteomics data, peak detection, feature selection, and learning classifiers are critical to classification accuracy. To better understand which methods are more accurate when classifying data, some publicly available peak detection algorithms for Matrix assisted Laser Desorption Ionization Mass Spectrometry (MALDI-MS) data were recently compared; however, the issue of different feature selection methods and different classification models as they relate to classification performance has not been addressed. With the application of intelligent computing, much progress has been made in the development of feature selection methods and learning classifiers for the analysis of high-throughput biological data. The main objective of this paper is to compare the methods of feature selection and different learning classifiers when applied to MALDI-MS data and to provide a subsequent reference for the analysis of MS proteomics data. Results We compared a well-known method of feature selection, Support Vector Machine Recursive Feature Elimination (SVMRFE), and a recently developed method, Gradient based Leave-one-out Gene Selection (GLGS) that effectively performs microarray data analysis. We also compared several learning classifiers including K-Nearest Neighbor Classifier (KNNC), Naïve Bayes Classifier (NBC), Nearest Mean Scaled Classifier (NMSC), uncorrelated normal based quadratic Bayes Classifier recorded as UDC, Support Vector Machines, and a distance metric learning for Large Margin Nearest Neighbor classifier (LMNN) based on Mahanalobis distance. To compare, we conducted a comprehensive experimental study using three types of MALDI-MS data. Conclusion Regarding feature selection, SVMRFE outperformed GLGS in classification. As for the learning classifiers, when classification models derived from the best training were compared, SVMs performed the best with respect to the expected testing accuracy. However, the distance metric learning LMNN outperformed SVMs and other classifiers on evaluating the best testing. In such cases, the optimum classification model based on LMNN is worth investigating for future study.
- Published
- 2009
43. Steganalysis of MP3Stego
- Author
-
Qingzhong Liu, Mengyu Qiao, and Andrew H. Sung
- Subjects
Steganalysis ,Steganography ,Computer science ,business.industry ,Feature extraction ,Pattern recognition ,Support vector machine ,Feature (machine learning) ,Discrete cosine transform ,Artificial intelligence ,business ,Joint (audio engineering) ,Transform coding ,Data compression - Abstract
In this article, we propose a scheme for detecting hidden messages in compressed audio files produced by MP3Stego, as our literature search has found no previous work on successful steganalysis of MP3Stego. We extract moment statistical features on the second derivatives, as well as Markov transition features and neighboring joint density of the MDCT coefficients based on each specific frequency band on MPEG-1 Audio Layer 3. A support vector machine is applied to different feature sets for classification. Experimental results show that our approach is successful to discriminate MP3 covers and the steganograms generated by using MP3Stego.
- Published
- 2009
44. Feature Mining and Intelligent Computing for MP3 Steganalysis
- Author
-
Andrew H. Sung, Mengyu Qiao, and Qingzhong Liu
- Subjects
Steganalysis ,Modified discrete cosine transform ,Steganography ,business.industry ,Pattern recognition (psychology) ,Feature extraction ,Pattern recognition ,Artificial intelligence ,Joint (audio engineering) ,business ,Transform coding ,Digital audio ,Mathematics - Abstract
MP3 allows a high compression ratio while providing high fidelity. As it has become one of the most popular digital audio formats, MP3 is also conceivably a most utilized carrier for audio steganography, therefore, MP3 steganalysis is a topic deserving attention. In this paper, we propose a scheme for steganalysis of MP3Stego based on feature mining and pattern recognition techniques. We first extract the moment statistical features of GGD shape parameters of the MDCT sub-band coefficients, as well as the moment statistical features, neighboring joint densities, and Markov transition features of the second order derivatives of the MDCT coefficients on MPEG-1 Audio Layer 3. Support Vector Machines (SVM) are applied to these features for detection. Experimental results show that our method can successfully discriminate the steganograms created by using MP3stego from their MP3 covers, even with fairly low embedding ratio.
- Published
- 2009
45. Multi-slot Channel Allocation for Priority Packet Transmission in the GPRS Network
- Author
-
Mengyu Qiao, Jun Zheng, and Emma E. Regentova
- Subjects
Transmission delay ,Network packet ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,End-to-end delay ,Packet generator ,Data_CODINGANDINFORMATIONTHEORY ,GPRS core network ,General Packet Radio Service ,business ,Priority queue ,Processing delay ,Computer network - Abstract
In the General Packet Radio Service (GPRS) network, data packets from services like mobility management and “push-to-talk” (PTT) are sensitive to delay. During the channel allocation process, the delay-sensitive packets should have higher priority than other packets. Previously priority queue and Uplink State Flag Channel Allocation (USFCA) have been used to reduce the transmission delay of priority packets. In this paper, we study the performance of channel allocation for priority packet in the GPRS network with multi-slot capability. The results show that the transmission delay of priority packet can be further reduced by assigning multiple channels to priority packet in addition to the use of priority queue and USFCA.
- Published
- 2009
46. Spectrum Steganalysis of WAV Audio Streams
- Author
-
Mengyu Qiao, Qingzhong Liu, and Andrew H. Sung
- Subjects
Steganalysis ,Steganography ,business.industry ,Speech recognition ,Spectrum (functional analysis) ,Pattern recognition ,Fourier spectrum ,Standard deviation ,Frequency spectrum ,Support vector machine ,Artificial intelligence ,High order ,business ,Mathematics - Abstract
In this paper, we propose an audio steganalysis method called reference based Fourier Spectrum Steganalysis. The mean values and the standard deviations of the high frequency spectrum of the second and high order derivatives are extracted from the testing signals and the reference versions. A Support Vector Machine (SVM) is employed to discriminate the unadulterated carrier signals and the steganograms wherein covert messages were embedded. Experimental results show that our method delivers very good performance and holds great promise for effective detection of steganograms produced by Hide4PGP, Invisible Secrets, S-tools4 and Steghide.
- Published
- 2009
47. Detecting information-hiding in WAV audios
- Author
-
Andrew H. Sung, Qingzhong Liu, and Mengyu Qiao
- Subjects
Steganalysis ,Least significant bit ,Steganography ,Computer science ,business.industry ,Information hiding ,Speech recognition ,Feature extraction ,Pattern recognition ,Artificial intelligence ,business ,Transform coding - Abstract
In this article, we propose a steganalysis method for detecting the presence of information-hiding behavior in wav audios. We extract the neighboring joint distribution features and the Markov features of the second order derivative, and combine these features with the error response by randomly modifying the least significant bit, then apply learning machines to the features for distinguishing the stegoaudios from cover videos. Experimental results show that our method performs well in steganalysis of the audio stegograms that are produced by using Hide4PGP, Invisible Secrets and S-tools4.
- Published
- 2008
48. Gene selection and classification for cancer microarray data based on machine learning and similarity measures
- Author
-
Jianzhong Liu, Mengyu Qiao, Andrew H. Sung, Xudong Huang, Youping Deng, Zhaohui Wang, Qingzhong Liu, Lei Chen, and Zhongxue Chen
- Subjects
Support Vector Machine ,lcsh:QH426-470 ,lcsh:Biotechnology ,Biology ,supervised-learning ,Machine learning ,computer.software_genre ,Naive Bayes classifier ,Artificial Intelligence ,lcsh:TP248.13-248.65 ,Neoplasms ,Genetics ,Humans ,Lagging ,similarity ,Oligonucleotide Array Sequence Analysis ,business.industry ,Supervised learning ,Random forest ,Support vector machine ,lcsh:Genetics ,ComputingMethodologies_PATTERNRECOGNITION ,classification ,Gene chip analysis ,Artificial intelligence ,business ,computer ,Classifier (UML) ,microarray ,Peephole optimization ,Biotechnology ,Research Article ,gene selection - Abstract
Background Microarray data have a high dimension of variables and a small sample size. In microarray data analyses, two important issues are how to choose genes, which provide reliable and good prediction for disease status, and how to determine the final gene set that is best for classification. Associations among genetic markers mean one can exploit information redundancy to potentially reduce classification cost in terms of time and money. Results To deal with redundant information and improve classification, we propose a gene selection method, Recursive Feature Addition, which combines supervised learning and statistical similarity measures. To determine the final optimal gene set for prediction and classification, we propose an algorithm, Lagging Prediction Peephole Optimization. By using six benchmark microarray gene expression data sets, we compared Recursive Feature Addition with recently developed gene selection methods: Support Vector Machine Recursive Feature Elimination, Leave-One-Out Calculation Sequential Forward Selection and several others. Conclusions On average, with the use of popular learning machines including Nearest Mean Scaled Classifier, Support Vector Machine, Naive Bayes Classifier and Random Forest, Recursive Feature Addition outperformed other methods. Our studies also showed that Lagging Prediction Peephole Optimization is superior to random strategy; Recursive Feature Addition with Lagging Prediction Peephole Optimization obtained better testing accuracies than the gene selection method varSelRF.
- Published
- 2011
49. Distance metric learning and support vector machines for classification of mass spectrometry proteomics data
- Author
-
Qingzhong Liu, Mengyu Qiao, and Andrew H. Sung
- Subjects
Computer science ,business.industry ,Feature vector ,Dimensionality reduction ,Feature extraction ,Nonlinear dimensionality reduction ,Feature selection ,Pattern recognition ,Linear classifier ,Semi-supervised learning ,computer.software_genre ,k-nearest neighbors algorithm ,Support vector machine ,ComputingMethodologies_PATTERNRECOGNITION ,Feature (computer vision) ,Metric (mathematics) ,Data mining ,Artificial intelligence ,business ,Feature learning ,computer ,Mathematics - Abstract
Mass spectrometry has become a widely used measurement in proteomics research. High dimensionality of features and small dataset are two major limitations hindering the accuracy of classification in mass spectrum data analysis; consequently, to obtain good results, the issues of feature extraction and feature selection are especially important. The quality of the feature set determines the reliability of the prediction of disease status. A well-known approach is to detect peak values and then apply support vector machine recursive feature elimination (SVMRFE) to choose feature sets for classification. In this paper, we apply a distance metric learning to classify proteomics mass spectrometry data. Experimental results show that distance metric learning can successfully be applied to the classification of proteomics data and the results are comparable to or better than, the best results by applying SVM to the feature sets chosen with the use of SVMRFE. We also perform feature reduction using manifold learning and experimental results indicate its promising potential in this application.
- Published
- 2009
50. Multi-slot Channel Allocation for Priority Packet Transmission in the GPRS Network.
- Author
-
Jun Zheng, Mengyu Qiao, and Regentova, E.
- Published
- 2009
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.