AAG-Stega: Automatic Audio Generation-based Steganography

Steganography, as one of the three basic information security systems, has long played an important role in safeguarding the privacy and confidentiality of data in cyberspace. Audio is one of the most common means of information transmission in our daily life. Thus it's of great practical significance to using audio as a carrier of information hiding. At present, almost all audio-based information hiding methods are based on carrier modification mode. However, this mode is equivalent to adding noise to the original signal, resulting in a difference in the statistical feature distribution of the carrier before and after steganography, which impairs the concealment of the entire system. In this paper, we propose an automatic audio generation-based steganography(AAG-Stega), which can automatically generate high-quality audio covers on the basis of the secret bits stream that needs to be embedded. In the automatic audio generation process, we reasonably encode the conditional probability distribution space of each sampling point and select the corresponding signal output according to the bitstream to realize the secret information embedding. We designed several experiments to test the proposed model from the perspectives of information imperceptibility and information hidden capacity. The experimental results show that the proposed model can guarantee high hidden capacity and concealment at the same time.

[1]  Bob L. Sturm,et al.  Music transcription modelling and composition using deep learning , 2016, ArXiv.

[2]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[3]  George Danezis,et al.  Generating steganographic images via adversarial training , 2017, NIPS.

[4]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[5]  Yoshua Bengio,et al.  Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.

[6]  Hamzeh Ghasemzadeh,et al.  Toward a robust and secure echo steganography method based on parameters hopping , 2015, 2015 Signal Processing and Intelligent Systems Conference (SPIS).

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  Yongfeng Huang,et al.  A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding , 2017, SecureComm.

[9]  Rajesh Kumar,et al.  Enhanced Steganographic Method Preserving Base Quality of Information Using LSB, Parity and Spread Spectrum Technique , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.

[10]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[11]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[12]  R. Sridevi,et al.  Journal of Theoretical and Applied Information Technology Efficient Method of Audio Steganography by Modified Lsb Algorithm and Strong Encryption Key with Enhanced Security , 2022 .

[13]  Renata Teixeira,et al.  Early Recognition of Encrypted Applications , 2007, PAM.

[14]  Mikhail J. Atallah,et al.  The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions , 2006, MM&Sec '06.

[15]  Sepp Hochreiter,et al.  The Vanishing Gradient Problem During Learning Recurrent Neural Nets and Problem Solutions , 1998, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[16]  Hosei Matsuoka Spread Spectrum Audio Steganography Using Sub-band Phase Shifting , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[17]  Lukás Burget,et al.  Recurrent neural network based language model , 2010, INTERSPEECH.

[18]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[19]  W. Bender,et al.  Techniques for datahiding , 1996 .

[20]  Colin Raffel,et al.  Learning-Based Methods for Comparing Sequences, with Applications to Audio-to-MIDI Alignment and Matching , 2016 .

[21]  Katerina J. Argyraki,et al.  Generating Steganographic Text with LSTMs , 2017, ACL.

[22]  Yongfeng Huang,et al.  Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.

[23]  Yongfeng Huang,et al.  Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry , 2017, IH&MMSec.

[24]  Thierry Bertin-Mahieux,et al.  The Million Song Dataset , 2011, ISMIR.

[25]  Tai-hoon Kim,et al.  A View on LSB Based Audio Steganography , 2016 .

[26]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[27]  Neil F. Johnson,et al.  Detection of Hidden Information, Covert Channels and Information Flows , 2009 .

[28]  Geoffrey E. Hinton,et al.  Learning representations by back-propagating errors , 1986, Nature.

[29]  Kaliappan Gopalan Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[30]  Anupama,et al.  INFORMATION HIDING USING AUDIO STEGANOGRAPHY - A SURVEY , 2011 .

[32]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[33]  Dong-Yan Huang,et al.  Robust and Inaudible Multi-echo Audio Watermarking , 2002, IEEE Pacific Rim Conference on Multimedia.

[34]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[35]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[36]  Neha Gupta,et al.  Dwt and Lsb based Audio Steganography , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).