Deniable Steganography
- URL: http://arxiv.org/abs/2205.12587v1
- Date: Wed, 25 May 2022 09:00:30 GMT
- Title: Deniable Steganography
- Authors: Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, and Jian Weng
- Abstract summary: Steganography conceals the secret message into the cover media, generating a stego media which can be transmitted on public channels without drawing suspicion.
As its countermeasure, steganalysis mainly aims to detect whether the secret message is hidden in a given media.
We propose a receiver-deniable steganographic scheme to deal with the receiver-side coercive attack using deep neural networks (DNN)
- Score: 30.729865153060985
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Steganography conceals the secret message into the cover media, generating a
stego media which can be transmitted on public channels without drawing
suspicion. As its countermeasure, steganalysis mainly aims to detect whether
the secret message is hidden in a given media. Although the steganography
techniques are improving constantly, the sophisticated steganalysis can always
break a known steganographic method to some extent. With a stego media
discovered, the adversary could find out the sender or receiver and coerce them
to disclose the secret message, which we name as coercive attack in this paper.
Inspired by the idea of deniable encryption, we build up the concepts of
deniable steganography for the first time and discuss the feasible
constructions for it. As an example, we propose a receiver-deniable
steganographic scheme to deal with the receiver-side coercive attack using deep
neural networks (DNN). Specifically, besides the real secret message, a piece
of fake message is also embedded into the cover. On the receiver side, the real
message can be extracted with an extraction module; while once the receiver has
to surrender a piece of secret message under coercive attack, he can extract
the fake message to deceive the adversary with another extraction module.
Experiments demonstrate the scalability and sensitivity of the DNN-based
receiver-deniable steganographic scheme.
Related papers
- Natias: Neuron Attribution based Transferable Image Adversarial Steganography [62.906821876314275]
adversarial steganography has garnered considerable attention due to its ability to effectively deceive deep-learning-based steganalysis.
We propose a novel adversarial steganographic scheme named Natias.
Our proposed method can be seamlessly integrated with existing adversarial steganography frameworks.
arXiv Detail & Related papers (2024-09-08T04:09:51Z) - Hiding Functions within Functions: Steganography by Implicit Neural Representations [9.630341407412729]
We propose StegaINR to implement steganography.
StegaINR embeds a secret function into a stego function, which serves as both the message extractor and the stego media.
To our knowledge, this is the first work to introduce INR into steganography.
arXiv Detail & Related papers (2023-12-07T22:55:48Z) - Steganography for Neural Radiance Fields by Backdooring [6.29495604869364]
We propose a novel model steganography scheme with implicit neural representation.
The NeRF model generates a secret viewpoint image, which serves as a backdoor.
We train a message extractor using overfitting to establish a one-to-one mapping between the secret message and the secret viewpoint image.
arXiv Detail & Related papers (2023-09-19T10:27:38Z) - Vulnerabilities of Deep Learning-Driven Semantic Communications to
Backdoor (Trojan) Attacks [70.51799606279883]
This paper highlights vulnerabilities of deep learning-driven semantic communications to backdoor (Trojan) attacks.
Backdoor attack can effectively change the semantic information transferred for poisoned input samples to a target meaning.
Design guidelines are presented to preserve the meaning of transferred information in the presence of backdoor attacks.
arXiv Detail & Related papers (2022-12-21T17:22:27Z) - Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial
Attacks [70.51799606279883]
We introduce test-time adversarial attacks on deep neural networks (DNNs) for semantic communications.
We show that it is possible to change the semantics of the transferred information even when the reconstruction loss remains low.
arXiv Detail & Related papers (2022-12-20T17:13:22Z) - Hiding Images in Deep Probabilistic Models [58.23127414572098]
We describe a different computational framework to hide images in deep probabilistic models.
Specifically, we use a DNN to model the probability density of cover images, and hide a secret image in one particular location of the learned distribution.
We demonstrate the feasibility of our SinGAN approach in terms of extraction accuracy and model security.
arXiv Detail & Related papers (2022-10-05T13:33:25Z) - A Survey On Semantic Steganography Systems [0.0]
Steganography is the practice of concealing a message within some other carrier or cover message.
In semantic steganography, redundancies in the semantics of a language are used to send a text steganographic message.
We list systems for semantic steganography that have been published in the past and review their properties.
arXiv Detail & Related papers (2022-02-03T15:23:53Z) - Hide and seek with quantum resources: New and modified protocols for
quantum steganography [2.9398911304923447]
Steganography is the science of hiding and communicating a secret message by embedding it in an innocent looking text.
It has been shown that such protocols are vulnerable to a certain steganalysis attack that can detect the presence of the hidden message and suppress the entire communication.
We propose a novel steganography protocol using discrete modulation continuous variable QKD that eliminates the threat of this detection-based attack.
arXiv Detail & Related papers (2021-10-12T11:06:49Z) - News Image Steganography: A Novel Architecture Facilitates the Fake News
Identification [52.83247667841588]
A larger portion of fake news quotes untampered images from other sources with ulterior motives.
This paper proposes an architecture named News Image Steganography to reveal the inconsistency through image steganography based on GAN.
arXiv Detail & Related papers (2021-01-03T11:12:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.