{"title":"音频隐去后处理的迭代生成对抗摄动","authors":"Kaiyu Ying, Rangding Wang, Diqun Yan","doi":"10.1109/WIFS53200.2021.9648380","DOIUrl":null,"url":null,"abstract":"Recent studies have shown that adversarial examples can easily deceive neural networks. But how to ensure the accuracy of extraction while introducing perturbations to steganography is a major difficulty. In this paper, we propose a method of iterative adversarial stego post-processing model called IA-SPP that can generate enhanced post-stego audio to resist steganalysis networks and the SPL of adversarial perturbations is restricted. The model decomposes the perturbation to the point level and updates point-wise perturbations iteratively by the large-absolute-gradient-first rule. The enhanced post-stego obtained by adding the stego and the adversarial perturbation has a high probability of being judged as a cover by the target network. In particular, We further considered how to simultaneously fight against multiple networks. The extensive experiments on the TIMIT show that the proposed model generalizes well across different steganography methods.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing\",\"authors\":\"Kaiyu Ying, Rangding Wang, Diqun Yan\",\"doi\":\"10.1109/WIFS53200.2021.9648380\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent studies have shown that adversarial examples can easily deceive neural networks. But how to ensure the accuracy of extraction while introducing perturbations to steganography is a major difficulty. In this paper, we propose a method of iterative adversarial stego post-processing model called IA-SPP that can generate enhanced post-stego audio to resist steganalysis networks and the SPL of adversarial perturbations is restricted. The model decomposes the perturbation to the point level and updates point-wise perturbations iteratively by the large-absolute-gradient-first rule. The enhanced post-stego obtained by adding the stego and the adversarial perturbation has a high probability of being judged as a cover by the target network. In particular, We further considered how to simultaneously fight against multiple networks. The extensive experiments on the TIMIT show that the proposed model generalizes well across different steganography methods.\",\"PeriodicalId\":196985,\"journal\":{\"name\":\"2021 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"volume\":\"143 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WIFS53200.2021.9648380\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS53200.2021.9648380","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing
Recent studies have shown that adversarial examples can easily deceive neural networks. But how to ensure the accuracy of extraction while introducing perturbations to steganography is a major difficulty. In this paper, we propose a method of iterative adversarial stego post-processing model called IA-SPP that can generate enhanced post-stego audio to resist steganalysis networks and the SPL of adversarial perturbations is restricted. The model decomposes the perturbation to the point level and updates point-wise perturbations iteratively by the large-absolute-gradient-first rule. The enhanced post-stego obtained by adding the stego and the adversarial perturbation has a high probability of being judged as a cover by the target network. In particular, We further considered how to simultaneously fight against multiple networks. The extensive experiments on the TIMIT show that the proposed model generalizes well across different steganography methods.