A Coverless Audio Steganography Based on Generative Adversarial Networks

被引:9
作者
Li, Jing [1 ]
Wang, Kaixi [1 ]
Jia, Xiaozhu [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
关键词
audio steganography; coverless steganography; GAN; covert communication; information hiding;
D O I
10.3390/electronics12051253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional audio steganography by cover modification causes changes to the cover features during the embedding of a secret, which is easy to detect with emerging neural-network steganalysis tools. To address the problem, this paper proposes a coverless audio-steganography model to conceal a secret audio. In this method, the stego-audio is directly synthesized by our model, which is based on the WaveGAN framework. An extractor is meticulously designed to reconstruct the secret audio, and it contains resolution blocks to learn the different resolution features. The method does not perform any modification to an existing or generated cover, and as far as we know, this is the first directly generated stego-audio. The experimental results also show that it is difficult for the current steganalysis methods to detect the existence of a secret in the stego-audio generated by our method because there is no cover audio. The MOS metric indicates that the generated stego-audio has high audio quality. The steganography capacity can be measured from two perspectives, one is that it can reach 50% of the stego-audio from the simple size perspective, the other is that 22-37 bits can be hidden in a two-second stego-audio from the semantic. In addition, we prove using spectrum diagrams in different forms that the extractor can reconstruct the secret audio successfully on hearing, which guarantees complete semantic transmission. Finally, the experiment of noise impacts on the stego-audio transmission shows that the extractor can still completely reconstruct the semantics of the secret audios, which indicates that the proposed method has good robustness.
引用
收藏
页数:22
相关论文
共 53 条
[51]  
[岳峰 Yue Feng], 2022, [计算机学报, Chinese Journal of Computers], V45, P427
[52]  
Yujie Wang, 2010, Proceedings 2010 Second International Conference on Multimedia Information Networking and Security (MINES 2010), P841, DOI 10.1109/MINES.2010.178
[53]  
Zhu JZ, 2010, 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, P1