Multichannel Steganography: A Provably Secure Hybrid Steganographic   Model for Secure Communication
        - URL: http://arxiv.org/abs/2501.04511v2
 - Date: Fri, 04 Jul 2025 21:18:16 GMT
 - Title: Multichannel Steganography: A Provably Secure Hybrid Steganographic   Model for Secure Communication
 - Authors: Obinna Omego, Michal Bosy, 
 - Abstract summary: Secret-seeded PRNG drives a lightweight Markov-chain generator to produce contextually plausible cover parameters.<n>Masked bit-vector is imperceptibly embedded into conventional media via a variance-aware least-significant-bit algorithm.<n>We formalize a multichannel adversary model (MC-ATTACK) and prove that, under standard security assumptions, the adversary's distinguishing advantage is negligible.
 - Score: 0.0
 - License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
 - Abstract:   Secure covert communication in hostile environments requires simultaneously achieving invisibility, provable security guarantees, and robustness against informed adversaries. This paper presents a novel hybrid steganographic framework that unites cover synthesis and cover modification within a unified multichannel protocol. A secret-seeded PRNG drives a lightweight Markov-chain generator to produce contextually plausible cover parameters, which are then masked with the payload and dispersed across independent channels. The masked bit-vector is imperceptibly embedded into conventional media via a variance-aware least-significant-bit algorithm, ensuring that statistical properties remain within natural bounds. We formalize a multichannel adversary model (MC-ATTACK) and prove that, under standard security assumptions, the adversary's distinguishing advantage is negligible, thereby guaranteeing both confidentiality and integrity. Empirical results corroborate these claims: local-variance-guided embedding yields near-lossless extraction (mean BER $<5\times10^{-3}$, correlation $>0.99$) with minimal perceptual distortion (PSNR $\approx100$,dB, SSIM $>0.99$), while key-based masking drives extraction success to zero (BER $\approx0.5$) for a fully informed adversary. Comparative analysis demonstrates that purely distortion-free or invertible schemes fail under the same threat model, underscoring the necessity of hybrid designs. The proposed approach advances high-assurance steganography by delivering an efficient, provably secure covert channel suitable for deployment in high-surveillance networks. 
 
       
      
        Related papers
        - CovertAuth: Joint Covert Communication and Authentication in MmWave   Systems [23.84881074442097]
Beam alignment (BA) is a crucial process in millimeter-wave (mmWave) communications.<n>BA is particularly vulnerable to eavesdropping and identity impersonation attacks.<n>This paper proposes a novel secure framework named CovertAuth to enhance the security of the BA phase against such attacks.
arXiv  Detail & Related papers  (2025-07-11T09:19:25Z) - Safe Low Bandwidth SPV: A Formal Treatment of Simplified Payment   Verification Protocols and Security Bounds [0.0]
We show that SPV is not only secure under bounded adversarial assumptions but strictly optimal for digital cash systems requiring scalable and verifiable transaction inclusion.<n>This document serves both as a blueprint for secure SPV implementation and a rebuttal of common misconceptions surrounding non-validating clients.
arXiv  Detail & Related papers  (2025-07-01T13:44:48Z) - Fully passive quantum random number generation with untrusted light [1.088173988655269]
Quantum random number generators (QRNGs) harness the inherent unpredictability of quantum mechanics to produce true randomness.<n>In many optical implementations, the light source remains a potential vulnerability - susceptible to adversarial attacks and even eavesdropping.<n>We enhance an existing SDI-QRNG protocol by eliminating the need for a perfectly balanced beam splitter within the trusted measurement device.<n>Using only off-the-shelf components, our implementation achieves real-time randomness generation rates of 0.347 Gbps.
arXiv  Detail & Related papers  (2025-05-01T16:21:50Z) - Enhancing Privacy in Semantic Communication over Wiretap Channels   leveraging Differential Privacy [51.028047763426265]
Semantic communication (SemCom) improves transmission efficiency by focusing on task-relevant information.
 transmitting semantic-rich data over insecure channels introduces privacy risks.
This paper proposes a novel SemCom framework that integrates differential privacy mechanisms to protect sensitive semantic features.
arXiv  Detail & Related papers  (2025-04-23T08:42:44Z) - TrustLoRA: Low-Rank Adaptation for Failure Detection under   Out-of-distribution Data [62.22804234013273]
We propose a simple failure detection framework to unify and facilitate classification with rejection under both covariate and semantic shifts.<n>Our key insight is that by separating and consolidating failure-specific reliability knowledge with low-rank adapters, we can enhance the failure detection ability effectively and flexibly.
arXiv  Detail & Related papers  (2025-04-20T09:20:55Z) - Provable Secure Steganography Based on Adaptive Dynamic Sampling [0.0]
Provably Secure Steganography is state of the art for making stego carriers indistinguishable from normal ones.
Current PSS methods often require explicit access to the distribution of generative model for both sender and receiver.
We propose a provably secure steganography scheme that does not require access to explicit model distributions for both sender and receiver.
arXiv  Detail & Related papers  (2025-04-17T01:52:09Z) - Formally Discovering and Reproducing Network Protocols Vulnerabilities [1.7965226171103972]
This paper introduces Network Attack-centric Compositional Testing (NACT), a novel methodology to discover new vulnerabilities in network protocols.
NACT integrates composable attacker specifications, formal specification mutations, and randomized constraint-solving techniques to generate sophisticated attack scenarios and test cases.
By supporting cross-protocol testing within a black-box testing framework, NACT provides a versatile approach to improve the security of network protocols.
arXiv  Detail & Related papers  (2025-03-03T13:50:20Z) - Securing Legacy Communication Networks via Authenticated Cyclic   Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv  Detail & Related papers  (2024-11-21T18:26:05Z) - CryptoFormalEval: Integrating LLMs and Formal Verification for Automated   Cryptographic Protocol Vulnerability Detection [41.94295877935867]
We introduce a benchmark to assess the ability of Large Language Models to autonomously identify vulnerabilities in new cryptographic protocols.
We created a dataset of novel, flawed, communication protocols and designed a method to automatically verify the vulnerabilities found by the AI agents.
arXiv  Detail & Related papers  (2024-11-20T14:16:55Z) - SoK: Unifying Cybersecurity and Cybersafety of Multimodal Foundation   Models with an Information Theory Approach [58.93030774141753]
Multimodal foundation models (MFMs) represent a significant advancement in artificial intelligence.
This paper conceptualizes cybersafety and cybersecurity in the context of multimodal learning.
We present a comprehensive Systematization of Knowledge (SoK) to unify these concepts in MFMs, identifying key threats.
arXiv  Detail & Related papers  (2024-11-17T23:06:20Z) - Balancing Security and Accuracy: A Novel Federated Learning Approach for   Cyberattack Detection in Blockchain Networks [10.25938198121523]
This paper presents a novel Collaborative Cyberattack Detection (CCD) system aimed at enhancing the security of blockchain-based data-sharing networks.
We explore the effects of various noise types on key performance metrics, including attack detection accuracy, deep learning model convergence time, and the overall runtime of global model generation.
Our findings reveal the intricate trade-offs between ensuring data privacy and maintaining system performance, offering valuable insights into optimizing these parameters for diverse CCD environments.
arXiv  Detail & Related papers  (2024-09-08T04:38:07Z) - VALID: a Validated Algorithm for Learning in Decentralized Networks with   Possible Adversarial Presence [13.612214163974459]
We introduce the paradigm of validated decentralized learning for undirected networks with heterogeneous data.
VALID protocol is the first to achieve a validated learning guarantee.
Remarkably, VALID retains optimal performance metrics in adversary-free environments.
arXiv  Detail & Related papers  (2024-05-12T15:55:43Z) - TernaryVote: Differentially Private, Communication Efficient, and
  Byzantine Resilient Distributed Optimization on Heterogeneous Data [50.797729676285876]
We propose TernaryVote, which combines a ternary compressor and the majority vote mechanism to realize differential privacy, gradient compression, and Byzantine resilience simultaneously.
We theoretically quantify the privacy guarantee through the lens of the emerging f-differential privacy (DP) and the Byzantine resilience of the proposed algorithm.
arXiv  Detail & Related papers  (2024-02-16T16:41:14Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform   Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv  Detail & Related papers  (2024-02-13T12:12:39Z) - Secret Collusion among Generative AI Agents: Multi-Agent Deception via   Steganography [43.468790060808914]
Recent capability increases in large language models (LLMs) open up applications in which groups of communicating generative AI agents solve joint tasks.
This poses privacy and security challenges concerning the unauthorised sharing of information.
Modern steganographic techniques could render such dynamics hard to detect.
arXiv  Detail & Related papers  (2024-02-12T09:31:21Z) - A Survey and Comparative Analysis of Security Properties of CAN   Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv  Detail & Related papers  (2024-01-19T14:52:04Z) - Source-Replacement Model for Phase-Matching Quantum Key Distribution [0.40964539027092917]
We study the security of the phase-matching protocol using an intuitive source-replacement model.
As an application of this approach, we introduce a beam-splitting attack scheme.
arXiv  Detail & Related papers  (2023-09-29T15:00:10Z) - Towards General Visual-Linguistic Face Forgery Detection [95.73987327101143]
Deepfakes are realistic face manipulations that can pose serious threats to security, privacy, and trust.
Existing methods mostly treat this task as binary classification, which uses digital labels or mask signals to train the detection model.
We propose a novel paradigm named Visual-Linguistic Face Forgery Detection(VLFFD), which uses fine-grained sentence-level prompts as the annotation.
arXiv  Detail & Related papers  (2023-07-31T10:22:33Z) - Provably Secure Commitment-based Protocols over Unauthenticated Channels [0.0]
We build a theoretic security framework to cover protocols whose characteristics may not always concur with existing models for authenticated exchanges.
We propose a number of Commitment-based protocols to establish a shared secret between two parties, and study their resistance over unauthenticated channels.
This means analyzing the security robustness of the protocol itself, and its robustness against Man-in-the-Middle attacks.
arXiv  Detail & Related papers  (2023-07-28T10:35:35Z) - Perfectly Secure Steganography Using Minimum Entropy Coupling [60.154855689780796]
We show that a steganography procedure is perfectly secure under Cachin 1998's information-theoretic model of steganography.
We also show that, among perfectly secure procedures, a procedure maximizes information throughput if and only if it is induced by a minimum entropy coupling.
arXiv  Detail & Related papers  (2022-10-24T17:40:07Z) - Robustness Certificates for Implicit Neural Networks: A Mixed Monotone
  Contractive Approach [60.67748036747221]
Implicit neural networks offer competitive performance and reduced memory consumption.
They can remain brittle with respect to input adversarial perturbations.
This paper proposes a theoretical and computational framework for robustness verification of implicit neural networks.
arXiv  Detail & Related papers  (2021-12-10T03:08:55Z) - CC-Cert: A Probabilistic Approach to Certify General Robustness of
  Neural Networks [58.29502185344086]
In safety-critical machine learning applications, it is crucial to defend models against adversarial attacks.
It is important to provide provable guarantees for deep learning models against semantically meaningful input transformations.
We propose a new universal probabilistic certification approach based on Chernoff-Cramer bounds.
arXiv  Detail & Related papers  (2021-09-22T12:46:04Z) 
        This list is automatically generated from the titles and abstracts of the papers in this site.
       
     
           This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.