Thwarting audio steganography attacks in cloud storage systems

  title={Thwarting audio steganography attacks in cloud storage systems},
  author={Bo Liu and Erci Xu and Jin Wang and Ziling Wei and Liyang Xu and Baokang Zhao and Jinshu Su},
  journal={2011 International Conference on Cloud and Service Computing},
  • Bo Liu, Erci Xu, Jinshu Su
  • Published 12 December 2011
  • Computer Science
  • 2011 International Conference on Cloud and Service Computing
Nowadays, enterprises and individuals are increasing tending to store their data in the cloud storage systems, yet, these sensitive data will face serious security threats. Currently, cloud storage service providers mainly adopt encryption and authentication to protect sensitive data, and a lot of approaches have been proposed to ensure data security in cloud storage systems. Recently, audio steganography has been regarded as serious attacking measures to threaten cloud storage systems… 

Figures and Tables from this paper

Security for Digital Data using Combination of Audio Steganography and Cryptography
This work has shown that MATLAB R2013a has been used as an implementation platform using signal processing for steganography, and the interest in using audio data as cover object in Steganography can be spelled out late emergence than image data.
Towards an augmented authenticator in the Cloud
A practical method for applying steganography in an one-time authenticator tool for Cloud-based databases in a healthcare scenario and it is revealed that the use of various text and WAV files did not introduce significant overhead.
Audio Steganography by Direct Sequence Spread Spectrum
This paper discusses the implementation of steganography in audio data using Direct Sequence Spread Spectrum method, and focuses on auditive data as cover media, such as voice calls or compressed and uncompressed digital sound files.
Designing and Evaluation of Performance of a Spread Spectrum Technique for Audio Steganography
Implementation of steganography in audio data using Direct Sequence Spread Spectrum method has been presented in this thesis and modifications give a more secure stegno-graphic system, making guesses about the bit-rate or message length less feasible.
Real Time Audio Steganographic Countermeasure
Steganographic techniques are used to embed data into a cover file using different algorithms. In this paper audio steganography countermeasure is discussed which uses a technique called double
Cloud Security Risks DDOS Attacks and Defense Mechanisms
This paper gives an overview of various security and privacy concerns related to the cloud computing environment and also provides the related solutions for each issue especially for DDOs attacks.
Detection of Steganographic Intrusion in Cloud
A framework for Intrusion Detection (ID) which identifies steganographic intrusion in cloud is proposed which identifies malicious hacker attack or data leakage in cloud.
Optimization in Audio Steganography
An audio file is chosen as cover file due to its practical availability and “Masking Effect” and the requirement of a system that ensures high capacity, robustness and security of embedded data.


Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
This work used cover images with the same size as the secret image by using both Blakley's secret sharing approach and Steganography and achieved reduced storage and transmission bandwidth for shares.
Is Cloud Computing Steganography-proof?
This paper introduces classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver and characterisation of information hiding possibilities in Cloud Computing.
Reliable detection of LSB steganography in color and grayscale images
A new very accurate and reliable method that can detect LSB embedding in randomly scattered pixels in both 24-bit color images and 8-bit grayscale or color images is described.
Quantitative evaluation of pairs and RS steganalysis
Improvements to the Pairs algorithm are discussed, restricting it to spatially close pairs of pixels, which leads to a substantial performance improvement, even to the extent of surpassing the RS statistic which was previously thought superior for grayscale images.
Application of T-Code, Turbo Codes and Pseudo-Random Sequence for Steganography
A new technique is proposed that will address the problem of robustness and data safety in steganography, which makes the processed data stream non-vulnerable to the attack of an active intruder, or due to noise in the transmission link.
Statistics Detection Algorithm Based on Audio LSB Steganography
Based on steganography ideas of bit planes and neighbor pixels correlation in image, with some inherent features of 16 bit coded wav audio and statistical changes by audio LSB, a conclusion of the statistical result in algorithm increasing is made by the neighbor vectors value and odd-even discussion.
RECOMMENDATION ITU-R BS.1387-1 - Method for objective measurements of perceived audio quality
  • Business
  • 2002
The ITU Radiocommunication Assembly, considering a) that conventional objective methods (e.g. for measuring signal-to-noise ratio and distortion) are no longer adequate for measuring the perceived
Steganography Analyzer Real-Time Scanner (StegAlyzerRTS)
  • Internet, Available:, September 2011
  • 2011
OpenPuff Yet not another steganography SW Internet, Available: http://embeddedsw
  • OpenPuff Yet not another steganography SW Internet, Available: http://embeddedsw
  • 2011
Security Best Practices For Developing Windows Azure Applications
  • Security Best Practices For Developing Windows Azure Applications
  • 2010