GAN-TStega: Text Steganography Based on Generative Adversarial Networks

Steganography based on text auto-generation technology is a current topic with great promise and challenges. It has the advantages of large information hiding capacity compared with the modification-based text steganographic methods. The biggest challenge faced by previous methods is that they can hardly generate fluent steganographic texts, and only pay attention to the statistical distribution of individual sentences without considering the overall statistical distribution of all generated texts. This paper proposes a text steganography called GAN-TStega which based on generative adversarial networks (GANs). Firstly, we use strategy update algorithm to solve the problem that traditional GANs are difficult to generate discrete data. Through antagonistic training on different types of text datasets, GAN-TStega can generate high quality texts. Then, by encoding the conditional probability distribution of generator’s output at each iteration, GAN-TStega can achieve secret information hiding. Through this method, we achieve the statistical distribution fitting at the sentence level, thus enhancing the security of steganography system. Experiments show that our method has good performance.

[1]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[2]  Lantao Yu,et al.  SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient , 2016, AAAI.

[3]  Yongfeng Huang,et al.  TS-RNN: Text Steganalysis Based on Recurrent Neural Networks , 2019, IEEE Signal Processing Letters.

[4]  Yongfeng Huang,et al.  A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding , 2017, SecureComm.

[5]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[6]  Bin Deng,et al.  BinText steganography based on Markov state transferring probability , 2009, ICIS.

[7]  Yongfeng Huang,et al.  Image Captioning with Object Detection and Localization , 2017, ICIG.

[8]  Samy Bengio,et al.  Scheduled Sampling for Sequence Prediction with Recurrent Neural Networks , 2015, NIPS.

[9]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[10]  Xingming Sun,et al.  Linguistic steganalysis using the features derived from synonym frequency , 2012, Multimedia Tools and Applications.

[11]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[12]  Yong Yu,et al.  Long Text Generation via Adversarial Training with Leaked Information , 2017, AAAI.

[13]  Yongfeng Huang,et al.  RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model , 2018, ICCCS.

[14]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[15]  Yoshua Bengio,et al.  A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..

[16]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[17]  Bin Deng,et al.  Text Steganography System Using Markov Chain Source Model and DES Algorithm , 2010, J. Softw..

[18]  Yong-Feng Huang,et al.  RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks , 2019, IEEE Transactions on Information Forensics and Security.

[19]  George Danezis,et al.  Generating steganographic images via adversarial training , 2017, NIPS.

[20]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[21]  Renata Teixeira,et al.  Early Recognition of Encrypted Applications , 2007, PAM.

[22]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[23]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.