SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application

被引:29
作者
Jiang, Shunzhi [1 ]
Ye, Dengpan [1 ]
Huang, Jiaqing [1 ]
Shang, Yueyun [2 ]
Zheng, Zhuoyuan [3 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[2] South Cent Univ Nationalities, Sch Math & Stat, Wuhan, Peoples R China
[3] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Audio steganography; Information hiding; Deep learning; Light-weight model; Generative adversarial networks; DEEP; STEGANALYSIS;
D O I
10.1016/j.jnca.2020.102689
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Massive data is transferred in the Internet of Thing (IoT) every single second. Protecting the security of these data is a crucial task. Steganography is a collection of techniques for concealing the existence of information by embedding it within irrelevant carriers, which could protect security and privacy of the data. Distinct from the cryptography, steganography put emphasis on hiding the existence of the secret. However, the majority of research mainly work on complex algorithm. In this paper, we proposed an audio steganography algorithm which automatically generated from adversarial training. The embedding model is light-weight which could use as machine learning tools in smart device. Besides, the existing audio steganography methods mainly depend on human handcraft, while the proposed method could obtain from meachine learning. The embedding model consists of three neural networks: encoder which embeds the secret message in the carrier, decoder which extracts the message, and discriminator which determines the carriers containing secret messages. The system is trained with different training settings on two datasets. Competed the majority of audio steganographic schemes, the proposed scheme could produce high fidelity steganographic audio. Besides, the extensive experiments demonstrate the robustness and security of our algorithm.
引用
收藏
页数:7
相关论文
共 29 条
[1]  
Alwahbani S M H, 2016, P SAI INT SYST C, P431
[2]  
Ashton K., 2009, RFID J., V22, P97
[3]  
Balgurgi P. P., 2013, ADV INTELL SYST, P699
[4]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[5]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[6]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[7]  
Garofolo J.S., 1988, GETTING STARTED DARP, V107, P16
[8]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
[9]  
He KM, 2014, LECT NOTES COMPUT SC, V8691, P346, DOI [arXiv:1406.4729, 10.1007/978-3-319-10578-9_23]
[10]   Universal distortion function for steganography in an arbitrary domain [J].
Holub, Vojtech ;
Fridrich, Jessica ;
Denemark, Tomas .
EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)