{"id":"https://openalex.org/W2541271439","doi":"https://doi.org/10.1109/csc.2011.6138530","title":"Thwarting audio steganography attacks in cloud storage systems","display_name":"Thwarting audio steganography attacks in cloud storage systems","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2541271439","doi":"https://doi.org/10.1109/csc.2011.6138530","mag":"2541271439"},"language":"en","primary_location":{"id":"doi:10.1109/csc.2011.6138530","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csc.2011.6138530","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Cloud and Service Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078234650","display_name":"Bo Liu","orcid":"https://orcid.org/0000-0002-3164-6299"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Liu","raw_affiliation_strings":["Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063665735","display_name":"Erci Xu","orcid":"https://orcid.org/0000-0002-6654-4364"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Erci Xu","raw_affiliation_strings":["Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346208","display_name":"Jin Wang","orcid":"https://orcid.org/0000-0003-2259-2644"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Wang","raw_affiliation_strings":["Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072186998","display_name":"Ziling Wei","orcid":"https://orcid.org/0000-0002-7858-1445"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziling Wei","raw_affiliation_strings":["Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101897932","display_name":"Liyang Xu","orcid":"https://orcid.org/0000-0003-0932-643X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liyang Xu","raw_affiliation_strings":["Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055202882","display_name":"Baokang Zhao","orcid":"https://orcid.org/0000-0001-9200-9018"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baokang Zhao","raw_affiliation_strings":["Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055375948","display_name":"Jinshu Su","orcid":"https://orcid.org/0000-0001-9273-616X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshu Su","raw_affiliation_strings":["Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5078234650"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.7727,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.77914007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"259","last_page":"265"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8114926815032959},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.7895097732543945},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7382548451423645},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6761192679405212},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6315882802009583},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5719524621963501},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5599499940872192},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.41808566451072693},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15049630403518677},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.10949850082397461},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06422790884971619}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8114926815032959},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.7895097732543945},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7382548451423645},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6761192679405212},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6315882802009583},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5719524621963501},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5599499940872192},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.41808566451072693},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15049630403518677},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.10949850082397461},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06422790884971619}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csc.2011.6138530","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csc.2011.6138530","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Cloud and Service Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W104982676","https://openalex.org/W2008049606","https://openalex.org/W2067945227","https://openalex.org/W2075652908","https://openalex.org/W2093394708","https://openalex.org/W2097551791"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2186632617","https://openalex.org/W2548321233","https://openalex.org/W2188948172","https://openalex.org/W2154118756"],"abstract_inverted_index":{"Nowadays,":[0],"enterprises":[1],"and":[2,33,39,98,102,120,135,143,169],"individuals":[3],"are":[4],"increasing":[5],"tending":[6],"to":[7,35,47,65,129,141],"store":[8],"their":[9],"data":[10,19,49],"in":[11,51,82,94,163,183,189],"the":[12,78,91,117,121,131,145,151,185],"cloud":[13,26,52,67],"storage":[14,27,53,68],"systems,":[15],"yet,":[16],"these":[17],"sensitive":[18,37],"will":[20],"face":[21],"serious":[22,62],"security":[23,50],"threats.":[24],"Currently,":[25],"service":[28],"providers":[29],"mainly":[30],"adopt":[31],"encryption":[32],"authentication":[34],"protect":[36],"data,":[38],"a":[40,105,160],"lot":[41],"of":[42,153,165],"approaches":[43],"have":[44],"been":[45,59,74],"proposed":[46,177],"ensure":[48],"systems.":[54,69],"Recently,":[55],"audio":[56,132,167],"steganography":[57,80,187],"has":[58,73],"regarded":[60],"as":[61],"attacking":[63],"measures":[64],"threaten":[66],"Nevertheless,":[70],"little":[71],"research":[72],"focused":[75],"on":[76,159],"thwarting":[77,184],"Audio":[79,186],"Attacks":[81,93,188],"Cloud":[83,95,190],"Storage":[84,96,191],"Systems.":[85,192],"In":[86],"this":[87],"paper,":[88],"we":[89,100,155],"analyze":[90],"Audiosteganography":[92,110],"Systems,":[97],"then,":[99],"propose":[101],"develop":[103],"StegAD,":[104,154],"novel":[106],"scheme":[107,179],"for":[108],"defending":[109],"Attacks.":[111],"StegAD":[112,178],"includes":[113],"two":[114],"algorithms,":[115],"i.e.,":[116],"enhanced-RS":[118,125],"algorithm":[119,126],"SADI":[122,138],"algorithm.":[123],"The":[124],"is":[127,139,180],"adopted":[128],"detect":[130],"steganographied":[133],"files,":[134],"after":[136],"that,":[137,175],"applied":[140],"infer":[142],"compensate":[144],"possible":[146],"hiding":[147],"positions.":[148],"To":[149],"evaluate":[150],"performance":[152],"perform":[156],"extensive":[157],"evaluations":[158],"real":[161],"platform":[162],"terms":[164],"detecting,":[166],"quality":[168],"interfering":[170],"intensity.":[171],"Experimental":[172],"results":[173],"show":[174],"our":[176],"very":[181],"efficient":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
