SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application

Abstract Massive data is transferred in the Internet of Thing (IoT) every single second. Protecting the security of these data is a crucial task. Steganography is a collection of techniques for concealing the existence of information by embedding it within irrelevant carriers, which could protect security and privacy of the data. Distinct from the cryptography, steganography put emphasis on hiding the existence of the secret. However, the majority of research mainly work on complex algorithm. In this paper, we proposed an audio steganography algorithm which automatically generated from adversarial training. The embedding model is light-weight which could use as machine learning tools in smart device. Besides, the existing audio steganography methods mainly depend on human handcraft, while the proposed method could obtain from meachine learning. The embedding model consists of three neural networks: encoder which embeds the secret message in the carrier, decoder which extracts the message, and discriminator which determines the carriers containing secret messages. The system is trained with different training settings on two datasets. Competed the majority of audio steganographic schemes, the proposed scheme could produce high fidelity steganographic audio. Besides, the extensive experiments demonstrate the robustness and security of our algorithm.

[1]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[2]  Li Fei-Fei,et al.  HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.

[3]  Antonio Bonafonte,et al.  SEGAN: Speech Enhancement Generative Adversarial Network , 2017, INTERSPEECH.

[4]  Yi-Hsuan Yang,et al.  MidiNet: A Convolutional Generative Adversarial Network for Symbolic-Domain Music Generation , 2017, ISMIR.

[5]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[6]  Ye Dengpan,et al.  Faster and transferable deep learning steganalysis on GPU , 2019 .

[7]  Kun Yang,et al.  Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution , 2017, International Workshop on Digital Watermarking.

[8]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[9]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[10]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[11]  Fadi Al-Turjman,et al.  Secure data transmission framework for confidentiality in IoTs , 2019, Ad Hoc Networks.

[12]  Sonal K. Jagtap,et al.  Audio Steganography Used for Secure Data Transmission , 2013 .

[13]  Jian Sun,et al.  Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition , 2015, IEEE Trans. Pattern Anal. Mach. Intell..

[14]  Ying Zou,et al.  Research on image steganography analysis based on deep learning , 2019, J. Vis. Commun. Image Represent..

[15]  Yu Tsao,et al.  Voice Conversion from Unaligned Corpora Using Variational Autoencoding Wasserstein Generative Adversarial Networks , 2017, INTERSPEECH.

[16]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[17]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[18]  Alexei A. Efros,et al.  Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[19]  Sanjeev Khudanpur,et al.  Librispeech: An ASR corpus based on public domain audio books , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[20]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[21]  Peter James Vial,et al.  High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform , 2020, Cognitive Systems Research.

[22]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[23]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Soumith Chintala,et al.  Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.

[25]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.