Detection of Information Hiding at Physical Layer in Wireless Communications
This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuri...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on dependable and secure computing 2022-03, Vol.19 (2), p.1104-1117 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1117 |
---|---|
container_issue | 2 |
container_start_page | 1104 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 19 |
creator | Xie, Ning Li, ZhuoYuan Tan, Jie Liu, Alex X. |
description | This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuristic based or machine learning based. The key limitation of prior heuristics based information hiding detection schemes is that they do not answer the fundamental question of why the information hidden at the physical layer can be detected. The key limitation of prior machine learning based information hiding detection schemes is that they lack robustness because wireless signals at the physical layer are very much environmental dependent, and thus an information hiding detection scheme trained in one environment often does not work well in another environment. Our insight is that embedding information on wireless signals at the physical layer will inevitably have a negative impact on the decodability of the cover signals, such as the increase of the error probability at the receiver (as well as the monitor). Based on the above insight, in our approach, after the monitor demodulates and decodes the cover signals, it will re-encode and re-modulate the cover signals, and then compare the resulting recovered signals with the raw signals that it received from the sender. We further propose a new estimation scheme for calculating receiver noise variance and conducted theoretical analysis. Specifically, we propose two hidden information detection schemes, a noise grouped based detection scheme and a constellation distance based detection scheme, both taking estimation errors into consideration. In particular, our constellation distance based detection scheme is the first scheme that can pinpoint the exact location on the received signals that are embedded with hidden information. We implemented our schemes and conducted extensive performance comparison between our schemes and prior schemes. Our experimental results show that when the received SNR is more than 20 dB, our approach with the new estimation scheme has the probability of detection more than 0.95, and our constellation distance based detection scheme can correctly pinpoint all embedded locations. |
doi_str_mv | 10.1109/TDSC.2020.3012461 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2638122612</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9151255</ieee_id><sourcerecordid>2638122612</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-685f60f561678319e72893be5808976b82c4ba6cf58294be3c245c5bd75d02bc3</originalsourceid><addsrcrecordid>eNo9kE1LAzEQhoMoWKs_QLwEPG_N5GuTo2zVFhYUrHgMu2lWU7qbmmwP_ffu2uJpZpjnnYEHoVsgMwCiH1bz92JGCSUzRoByCWdoAppDRgio86EXXGRC53CJrlLaEEK50nyCyrnrne196HBo8LJrQmyrv3Hh1777wlWP374Pydtqi8vq4CL2Hf700W1dSrgIbbvvhuUYSdfooqm2yd2c6hR9PD-tikVWvr4si8cys1SzPpNKNJI0QoLMFQPtcqo0q51QROlc1opaXlfSNkJRzWvHLOXCinqdizWhtWVTdH-8u4vhZ-9SbzZhH7vhpaGSKaBUAh0oOFI2hpSia8wu-raKBwPEjNLMKM2M0sxJ2pC5O2a8c-6f1yCACsF-AZWsZyc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2638122612</pqid></control><display><type>article</type><title>Detection of Information Hiding at Physical Layer in Wireless Communications</title><source>IEEE Electronic Library (IEL)</source><creator>Xie, Ning ; Li, ZhuoYuan ; Tan, Jie ; Liu, Alex X.</creator><creatorcontrib>Xie, Ning ; Li, ZhuoYuan ; Tan, Jie ; Liu, Alex X.</creatorcontrib><description>This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuristic based or machine learning based. The key limitation of prior heuristics based information hiding detection schemes is that they do not answer the fundamental question of why the information hidden at the physical layer can be detected. The key limitation of prior machine learning based information hiding detection schemes is that they lack robustness because wireless signals at the physical layer are very much environmental dependent, and thus an information hiding detection scheme trained in one environment often does not work well in another environment. Our insight is that embedding information on wireless signals at the physical layer will inevitably have a negative impact on the decodability of the cover signals, such as the increase of the error probability at the receiver (as well as the monitor). Based on the above insight, in our approach, after the monitor demodulates and decodes the cover signals, it will re-encode and re-modulate the cover signals, and then compare the resulting recovered signals with the raw signals that it received from the sender. We further propose a new estimation scheme for calculating receiver noise variance and conducted theoretical analysis. Specifically, we propose two hidden information detection schemes, a noise grouped based detection scheme and a constellation distance based detection scheme, both taking estimation errors into consideration. In particular, our constellation distance based detection scheme is the first scheme that can pinpoint the exact location on the received signals that are embedded with hidden information. We implemented our schemes and conducted extensive performance comparison between our schemes and prior schemes. Our experimental results show that when the received SNR is more than 20 dB, our approach with the new estimation scheme has the probability of detection more than 0.95, and our constellation distance based detection scheme can correctly pinpoint all embedded locations.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2020.3012461</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Communication system security ; detection ; embedded locations ; Embedding ; Estimation ; Information hiding ; Machine learning ; Monitoring ; noise estimation ; Physical layer ; Receivers ; Variance analysis ; Wireless communication ; Wireless communications</subject><ispartof>IEEE transactions on dependable and secure computing, 2022-03, Vol.19 (2), p.1104-1117</ispartof><rights>Copyright IEEE Computer Society 2022</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-685f60f561678319e72893be5808976b82c4ba6cf58294be3c245c5bd75d02bc3</citedby><cites>FETCH-LOGICAL-c293t-685f60f561678319e72893be5808976b82c4ba6cf58294be3c245c5bd75d02bc3</cites><orcidid>0000-0002-6443-8111 ; 0000-0002-6916-1326</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9151255$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9151255$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xie, Ning</creatorcontrib><creatorcontrib>Li, ZhuoYuan</creatorcontrib><creatorcontrib>Tan, Jie</creatorcontrib><creatorcontrib>Liu, Alex X.</creatorcontrib><title>Detection of Information Hiding at Physical Layer in Wireless Communications</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuristic based or machine learning based. The key limitation of prior heuristics based information hiding detection schemes is that they do not answer the fundamental question of why the information hidden at the physical layer can be detected. The key limitation of prior machine learning based information hiding detection schemes is that they lack robustness because wireless signals at the physical layer are very much environmental dependent, and thus an information hiding detection scheme trained in one environment often does not work well in another environment. Our insight is that embedding information on wireless signals at the physical layer will inevitably have a negative impact on the decodability of the cover signals, such as the increase of the error probability at the receiver (as well as the monitor). Based on the above insight, in our approach, after the monitor demodulates and decodes the cover signals, it will re-encode and re-modulate the cover signals, and then compare the resulting recovered signals with the raw signals that it received from the sender. We further propose a new estimation scheme for calculating receiver noise variance and conducted theoretical analysis. Specifically, we propose two hidden information detection schemes, a noise grouped based detection scheme and a constellation distance based detection scheme, both taking estimation errors into consideration. In particular, our constellation distance based detection scheme is the first scheme that can pinpoint the exact location on the received signals that are embedded with hidden information. We implemented our schemes and conducted extensive performance comparison between our schemes and prior schemes. Our experimental results show that when the received SNR is more than 20 dB, our approach with the new estimation scheme has the probability of detection more than 0.95, and our constellation distance based detection scheme can correctly pinpoint all embedded locations.</description><subject>Communication system security</subject><subject>detection</subject><subject>embedded locations</subject><subject>Embedding</subject><subject>Estimation</subject><subject>Information hiding</subject><subject>Machine learning</subject><subject>Monitoring</subject><subject>noise estimation</subject><subject>Physical layer</subject><subject>Receivers</subject><subject>Variance analysis</subject><subject>Wireless communication</subject><subject>Wireless communications</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1LAzEQhoMoWKs_QLwEPG_N5GuTo2zVFhYUrHgMu2lWU7qbmmwP_ffu2uJpZpjnnYEHoVsgMwCiH1bz92JGCSUzRoByCWdoAppDRgio86EXXGRC53CJrlLaEEK50nyCyrnrne196HBo8LJrQmyrv3Hh1777wlWP374Pydtqi8vq4CL2Hf700W1dSrgIbbvvhuUYSdfooqm2yd2c6hR9PD-tikVWvr4si8cys1SzPpNKNJI0QoLMFQPtcqo0q51QROlc1opaXlfSNkJRzWvHLOXCinqdizWhtWVTdH-8u4vhZ-9SbzZhH7vhpaGSKaBUAh0oOFI2hpSia8wu-raKBwPEjNLMKM2M0sxJ2pC5O2a8c-6f1yCACsF-AZWsZyc</recordid><startdate>20220301</startdate><enddate>20220301</enddate><creator>Xie, Ning</creator><creator>Li, ZhuoYuan</creator><creator>Tan, Jie</creator><creator>Liu, Alex X.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><orcidid>https://orcid.org/0000-0002-6443-8111</orcidid><orcidid>https://orcid.org/0000-0002-6916-1326</orcidid></search><sort><creationdate>20220301</creationdate><title>Detection of Information Hiding at Physical Layer in Wireless Communications</title><author>Xie, Ning ; Li, ZhuoYuan ; Tan, Jie ; Liu, Alex X.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-685f60f561678319e72893be5808976b82c4ba6cf58294be3c245c5bd75d02bc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Communication system security</topic><topic>detection</topic><topic>embedded locations</topic><topic>Embedding</topic><topic>Estimation</topic><topic>Information hiding</topic><topic>Machine learning</topic><topic>Monitoring</topic><topic>noise estimation</topic><topic>Physical layer</topic><topic>Receivers</topic><topic>Variance analysis</topic><topic>Wireless communication</topic><topic>Wireless communications</topic><toplevel>online_resources</toplevel><creatorcontrib>Xie, Ning</creatorcontrib><creatorcontrib>Li, ZhuoYuan</creatorcontrib><creatorcontrib>Tan, Jie</creatorcontrib><creatorcontrib>Liu, Alex X.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xie, Ning</au><au>Li, ZhuoYuan</au><au>Tan, Jie</au><au>Liu, Alex X.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection of Information Hiding at Physical Layer in Wireless Communications</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2022-03-01</date><risdate>2022</risdate><volume>19</volume><issue>2</issue><spage>1104</spage><epage>1117</epage><pages>1104-1117</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>This article concerns the problem of detecting the use of information hiding at the physical layer in wireless communications because they are harder to be detected than other layer-based information hiding schemes. Prior schemes for detecting physical layer based information hiding are either heuristic based or machine learning based. The key limitation of prior heuristics based information hiding detection schemes is that they do not answer the fundamental question of why the information hidden at the physical layer can be detected. The key limitation of prior machine learning based information hiding detection schemes is that they lack robustness because wireless signals at the physical layer are very much environmental dependent, and thus an information hiding detection scheme trained in one environment often does not work well in another environment. Our insight is that embedding information on wireless signals at the physical layer will inevitably have a negative impact on the decodability of the cover signals, such as the increase of the error probability at the receiver (as well as the monitor). Based on the above insight, in our approach, after the monitor demodulates and decodes the cover signals, it will re-encode and re-modulate the cover signals, and then compare the resulting recovered signals with the raw signals that it received from the sender. We further propose a new estimation scheme for calculating receiver noise variance and conducted theoretical analysis. Specifically, we propose two hidden information detection schemes, a noise grouped based detection scheme and a constellation distance based detection scheme, both taking estimation errors into consideration. In particular, our constellation distance based detection scheme is the first scheme that can pinpoint the exact location on the received signals that are embedded with hidden information. We implemented our schemes and conducted extensive performance comparison between our schemes and prior schemes. Our experimental results show that when the received SNR is more than 20 dB, our approach with the new estimation scheme has the probability of detection more than 0.95, and our constellation distance based detection scheme can correctly pinpoint all embedded locations.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2020.3012461</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-6443-8111</orcidid><orcidid>https://orcid.org/0000-0002-6916-1326</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2022-03, Vol.19 (2), p.1104-1117 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_proquest_journals_2638122612 |
source | IEEE Electronic Library (IEL) |
subjects | Communication system security detection embedded locations Embedding Estimation Information hiding Machine learning Monitoring noise estimation Physical layer Receivers Variance analysis Wireless communication Wireless communications |
title | Detection of Information Hiding at Physical Layer in Wireless Communications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T11%3A42%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20of%20Information%20Hiding%20at%20Physical%20Layer%20in%20Wireless%20Communications&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Xie,%20Ning&rft.date=2022-03-01&rft.volume=19&rft.issue=2&rft.spage=1104&rft.epage=1117&rft.pages=1104-1117&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2020.3012461&rft_dat=%3Cproquest_RIE%3E2638122612%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2638122612&rft_id=info:pmid/&rft_ieee_id=9151255&rfr_iscdi=true |