Detection of Information Hiding at Physical Layer in Wireless Communications

This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuri...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2022-03, Vol.19 (2), p.1104-1117
Hauptverfasser: Xie, Ning, Li, ZhuoYuan, Tan, Jie, Liu, Alex X.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1117
container_issue 2
container_start_page 1104
container_title IEEE transactions on dependable and secure computing
container_volume 19
creator Xie, Ning
Li, ZhuoYuan
Tan, Jie
Liu, Alex X.
description This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuristic based or machine learning based. The key limitation of prior heuristics based information hiding detection schemes is that they do not answer the fundamental question of why the information hidden at the physical layer can be detected. The key limitation of prior machine learning based information hiding detection schemes is that they lack robustness because wireless signals at the physical layer are very much environmental dependent, and thus an information hiding detection scheme trained in one environment often does not work well in another environment. Our insight is that embedding information on wireless signals at the physical layer will inevitably have a negative impact on the decodability of the cover signals, such as the increase of the error probability at the receiver (as well as the monitor). Based on the above insight, in our approach, after the monitor demodulates and decodes the cover signals, it will re-encode and re-modulate the cover signals, and then compare the resulting recovered signals with the raw signals that it received from the sender. We further propose a new estimation scheme for calculating receiver noise variance and conducted theoretical analysis. Specifically, we propose two hidden information detection schemes, a noise grouped based detection scheme and a constellation distance based detection scheme, both taking estimation errors into consideration. In particular, our constellation distance based detection scheme is the first scheme that can pinpoint the exact location on the received signals that are embedded with hidden information. We implemented our schemes and conducted extensive performance comparison between our schemes and prior schemes. Our experimental results show that when the received SNR is more than 20 dB, our approach with the new estimation scheme has the probability of detection more than 0.95, and our constellation distance based detection scheme can correctly pinpoint all embedded locations.
doi_str_mv 10.1109/TDSC.2020.3012461
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2638122612</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9151255</ieee_id><sourcerecordid>2638122612</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-685f60f561678319e72893be5808976b82c4ba6cf58294be3c245c5bd75d02bc3</originalsourceid><addsrcrecordid>eNo9kE1LAzEQhoMoWKs_QLwEPG_N5GuTo2zVFhYUrHgMu2lWU7qbmmwP_ffu2uJpZpjnnYEHoVsgMwCiH1bz92JGCSUzRoByCWdoAppDRgio86EXXGRC53CJrlLaEEK50nyCyrnrne196HBo8LJrQmyrv3Hh1777wlWP374Pydtqi8vq4CL2Hf700W1dSrgIbbvvhuUYSdfooqm2yd2c6hR9PD-tikVWvr4si8cys1SzPpNKNJI0QoLMFQPtcqo0q51QROlc1opaXlfSNkJRzWvHLOXCinqdizWhtWVTdH-8u4vhZ-9SbzZhH7vhpaGSKaBUAh0oOFI2hpSia8wu-raKBwPEjNLMKM2M0sxJ2pC5O2a8c-6f1yCACsF-AZWsZyc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2638122612</pqid></control><display><type>article</type><title>Detection of Information Hiding at Physical Layer in Wireless Communications</title><source>IEEE Electronic Library (IEL)</source><creator>Xie, Ning ; Li, ZhuoYuan ; Tan, Jie ; Liu, Alex X.</creator><creatorcontrib>Xie, Ning ; Li, ZhuoYuan ; Tan, Jie ; Liu, Alex X.</creatorcontrib><description>This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuristic based or machine learning based. The key limitation of prior heuristics based information hiding detection schemes is that they do not answer the fundamental question of why the information hidden at the physical layer can be detected. The key limitation of prior machine learning based information hiding detection schemes is that they lack robustness because wireless signals at the physical layer are very much environmental dependent, and thus an information hiding detection scheme trained in one environment often does not work well in another environment. Our insight is that embedding information on wireless signals at the physical layer will inevitably have a negative impact on the decodability of the cover signals, such as the increase of the error probability at the receiver (as well as the monitor). Based on the above insight, in our approach, after the monitor demodulates and decodes the cover signals, it will re-encode and re-modulate the cover signals, and then compare the resulting recovered signals with the raw signals that it received from the sender. We further propose a new estimation scheme for calculating receiver noise variance and conducted theoretical analysis. Specifically, we propose two hidden information detection schemes, a noise grouped based detection scheme and a constellation distance based detection scheme, both taking estimation errors into consideration. In particular, our constellation distance based detection scheme is the first scheme that can pinpoint the exact location on the received signals that are embedded with hidden information. We implemented our schemes and conducted extensive performance comparison between our schemes and prior schemes. Our experimental results show that when the received SNR is more than 20 dB, our approach with the new estimation scheme has the probability of detection more than 0.95, and our constellation distance based detection scheme can correctly pinpoint all embedded locations.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2020.3012461</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Communication system security ; detection ; embedded locations ; Embedding ; Estimation ; Information hiding ; Machine learning ; Monitoring ; noise estimation ; Physical layer ; Receivers ; Variance analysis ; Wireless communication ; Wireless communications</subject><ispartof>IEEE transactions on dependable and secure computing, 2022-03, Vol.19 (2), p.1104-1117</ispartof><rights>Copyright IEEE Computer Society 2022</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-685f60f561678319e72893be5808976b82c4ba6cf58294be3c245c5bd75d02bc3</citedby><cites>FETCH-LOGICAL-c293t-685f60f561678319e72893be5808976b82c4ba6cf58294be3c245c5bd75d02bc3</cites><orcidid>0000-0002-6443-8111 ; 0000-0002-6916-1326</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9151255$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9151255$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xie, Ning</creatorcontrib><creatorcontrib>Li, ZhuoYuan</creatorcontrib><creatorcontrib>Tan, Jie</creatorcontrib><creatorcontrib>Liu, Alex X.</creatorcontrib><title>Detection of Information Hiding at Physical Layer in Wireless Communications</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuristic based or machine learning based. The key limitation of prior heuristics based information hiding detection schemes is that they do not answer the fundamental question of why the information hidden at the physical layer can be detected. The key limitation of prior machine learning based information hiding detection schemes is that they lack robustness because wireless signals at the physical layer are very much environmental dependent, and thus an information hiding detection scheme trained in one environment often does not work well in another environment. Our insight is that embedding information on wireless signals at the physical layer will inevitably have a negative impact on the decodability of the cover signals, such as the increase of the error probability at the receiver (as well as the monitor). Based on the above insight, in our approach, after the monitor demodulates and decodes the cover signals, it will re-encode and re-modulate the cover signals, and then compare the resulting recovered signals with the raw signals that it received from the sender. We further propose a new estimation scheme for calculating receiver noise variance and conducted theoretical analysis. Specifically, we propose two hidden information detection schemes, a noise grouped based detection scheme and a constellation distance based detection scheme, both taking estimation errors into consideration. In particular, our constellation distance based detection scheme is the first scheme that can pinpoint the exact location on the received signals that are embedded with hidden information. We implemented our schemes and conducted extensive performance comparison between our schemes and prior schemes. Our experimental results show that when the received SNR is more than 20 dB, our approach with the new estimation scheme has the probability of detection more than 0.95, and our constellation distance based detection scheme can correctly pinpoint all embedded locations.</description><subject>Communication system security</subject><subject>detection</subject><subject>embedded locations</subject><subject>Embedding</subject><subject>Estimation</subject><subject>Information hiding</subject><subject>Machine learning</subject><subject>Monitoring</subject><subject>noise estimation</subject><subject>Physical layer</subject><subject>Receivers</subject><subject>Variance analysis</subject><subject>Wireless communication</subject><subject>Wireless communications</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1LAzEQhoMoWKs_QLwEPG_N5GuTo2zVFhYUrHgMu2lWU7qbmmwP_ffu2uJpZpjnnYEHoVsgMwCiH1bz92JGCSUzRoByCWdoAppDRgio86EXXGRC53CJrlLaEEK50nyCyrnrne196HBo8LJrQmyrv3Hh1777wlWP374Pydtqi8vq4CL2Hf700W1dSrgIbbvvhuUYSdfooqm2yd2c6hR9PD-tikVWvr4si8cys1SzPpNKNJI0QoLMFQPtcqo0q51QROlc1opaXlfSNkJRzWvHLOXCinqdizWhtWVTdH-8u4vhZ-9SbzZhH7vhpaGSKaBUAh0oOFI2hpSia8wu-raKBwPEjNLMKM2M0sxJ2pC5O2a8c-6f1yCACsF-AZWsZyc</recordid><startdate>20220301</startdate><enddate>20220301</enddate><creator>Xie, Ning</creator><creator>Li, ZhuoYuan</creator><creator>Tan, Jie</creator><creator>Liu, Alex X.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><orcidid>https://orcid.org/0000-0002-6443-8111</orcidid><orcidid>https://orcid.org/0000-0002-6916-1326</orcidid></search><sort><creationdate>20220301</creationdate><title>Detection of Information Hiding at Physical Layer in Wireless Communications</title><author>Xie, Ning ; Li, ZhuoYuan ; Tan, Jie ; Liu, Alex X.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-685f60f561678319e72893be5808976b82c4ba6cf58294be3c245c5bd75d02bc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Communication system security</topic><topic>detection</topic><topic>embedded locations</topic><topic>Embedding</topic><topic>Estimation</topic><topic>Information hiding</topic><topic>Machine learning</topic><topic>Monitoring</topic><topic>noise estimation</topic><topic>Physical layer</topic><topic>Receivers</topic><topic>Variance analysis</topic><topic>Wireless communication</topic><topic>Wireless communications</topic><toplevel>online_resources</toplevel><creatorcontrib>Xie, Ning</creatorcontrib><creatorcontrib>Li, ZhuoYuan</creatorcontrib><creatorcontrib>Tan, Jie</creatorcontrib><creatorcontrib>Liu, Alex X.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xie, Ning</au><au>Li, ZhuoYuan</au><au>Tan, Jie</au><au>Liu, Alex X.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection of Information Hiding at Physical Layer in Wireless Communications</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2022-03-01</date><risdate>2022</risdate><volume>19</volume><issue>2</issue><spage>1104</spage><epage>1117</epage><pages>1104-1117</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuristic based or machine learning based. The key limitation of prior heuristics based information hiding detection schemes is that they do not answer the fundamental question of why the information hidden at the physical layer can be detected. The key limitation of prior machine learning based information hiding detection schemes is that they lack robustness because wireless signals at the physical layer are very much environmental dependent, and thus an information hiding detection scheme trained in one environment often does not work well in another environment. Our insight is that embedding information on wireless signals at the physical layer will inevitably have a negative impact on the decodability of the cover signals, such as the increase of the error probability at the receiver (as well as the monitor). Based on the above insight, in our approach, after the monitor demodulates and decodes the cover signals, it will re-encode and re-modulate the cover signals, and then compare the resulting recovered signals with the raw signals that it received from the sender. We further propose a new estimation scheme for calculating receiver noise variance and conducted theoretical analysis. Specifically, we propose two hidden information detection schemes, a noise grouped based detection scheme and a constellation distance based detection scheme, both taking estimation errors into consideration. In particular, our constellation distance based detection scheme is the first scheme that can pinpoint the exact location on the received signals that are embedded with hidden information. We implemented our schemes and conducted extensive performance comparison between our schemes and prior schemes. Our experimental results show that when the received SNR is more than 20 dB, our approach with the new estimation scheme has the probability of detection more than 0.95, and our constellation distance based detection scheme can correctly pinpoint all embedded locations.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2020.3012461</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-6443-8111</orcidid><orcidid>https://orcid.org/0000-0002-6916-1326</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2022-03, Vol.19 (2), p.1104-1117
issn 1545-5971
1941-0018
language eng
recordid cdi_proquest_journals_2638122612
source IEEE Electronic Library (IEL)
subjects Communication system security
detection
embedded locations
Embedding
Estimation
Information hiding
Machine learning
Monitoring
noise estimation
Physical layer
Receivers
Variance analysis
Wireless communication
Wireless communications
title Detection of Information Hiding at Physical Layer in Wireless Communications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T11%3A42%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20of%20Information%20Hiding%20at%20Physical%20Layer%20in%20Wireless%20Communications&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Xie,%20Ning&rft.date=2022-03-01&rft.volume=19&rft.issue=2&rft.spage=1104&rft.epage=1117&rft.pages=1104-1117&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2020.3012461&rft_dat=%3Cproquest_RIE%3E2638122612%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2638122612&rft_id=info:pmid/&rft_ieee_id=9151255&rfr_iscdi=true