Skip to main content
Log in

An end-to-end generative network for environmental sound-based covert communication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Environmental sounds, everyday audio events that do not consist of music or speech data and are often more diverse and chaotic in their structure, have proven to be a promising type of carrier signals to carry out covert communication as they occur frequently in the natural environment, e.g., marine communication by mimicking dolphin or sea lion whistles. However, a mass collection of the carrier signals still remains a challenging task. Recently proposed generator models represented by Generator Adversarial Nets (GAN) have provided an effective way to synthesize environmental sounds. In this study, an end-to-end convolutional neural network (CNN) is proposed to directly transform the randomly sampled Gaussian noise into environmental sound that contains the secret message. The proposed network structure is composed of upsampling groups and orthogonal quantization layer, which can simultaneously realize factor analysis and information embedding. The design of the orthogonal quantization layer to complete the message embedding task is inspired by spread spectrum, model-based modulation, and compensative quantization. The underlying idea in this study is to treat the secret message as the constraint information in the generative model with the aim of maximizing the complete data model. The alternating back-propagation algorithm is used to train the overall network. Experimental results show that the proposed scheme can generate realistic environmental sounds that convey secret messages, while guaranteeing a high degree of communication reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bloch MR (2016) Covert communication over noisy channels: a resolvability perspective. IEEE Trans Inf Theory 62(5):2334–2354

    Article  MathSciNet  Google Scholar 

  2. Dol HS, Quesson J, Benders FPA (2008) Covert underwater communication with marine mammal sounds. Undersea Defence Technology-UDT Europe 2008

  3. El-Atawy A, Duan Q, Al-Shaer ES (2017) A novel class of robust covert channels using out-of-order packets. IEEE Transactions on Dependable & Secure Computing 14(2):116–129

    Article  Google Scholar 

  4. Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. Electronic Imaging 2007:650502–650502-650515

  5. Goeckel D, Bash B, Guha S, Towsley D (2016) Covert communications when the warden does not know the background noise power. IEEE Commun Lett 20(2):236–239

    Article  Google Scholar 

  6. Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2012) Generative adversarial nets. International Conference on Neural Information Processing Systems, NIPS 2014:2672–2680

    Google Scholar 

  7. Han T, Lu Y, Zhu SC, Wu YN (2017) Alternating back-propagation for generator networks. The 31st AAAI conference on artificial intelligence. AAAI 2017:1–9

    Google Scholar 

  8. He B, Yan S, Zhou X, Lau VKN (2016) On covert communication with noise uncertainty. IEEE Commun Lett 21(4):941–944

    Article  Google Scholar 

  9. Hu J, Yan S, Zhou X, Shu F, Wang J (2017) Covert communication in wireless relay networks. arXiv:1704.04946

  10. Jia Y, Liu G, Zhang L (2015) Bionic camouflage underwater acoustic communication based on sea lion sounds. International Conference on Control, Automation and Information Sciences, ICCAIS 2015:332–336

    Google Scholar 

  11. Kingma DP, Welling M (2013) Auto-encoding variational Bayes. arXiv:1312.6114

  12. Lecun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324

    Article  Google Scholar 

  13. Liu S, Qiao G, Yang Y, Zhang L, Chen T (2013) Biologically inspired covert underwater acoustic communication using high frequency dolphin clicks. Oceans 2013:1–5

    Google Scholar 

  14. Liu S, Qiao G, Ismail A (2013) Covert underwater acoustic communication using dolphin sounds. The Journal of the Acoustical Society of America 133(4):EL300–EL306

    Article  Google Scholar 

  15. Liu S, Qiao G, Ismail A, Liu B, Zhang L (2013) Covert underwater acoustic communication using whale noise masking on DSSS signal. Oceans:1–5

  16. Ma Y, Luo X, Li X, Bao Z, Zhang Y (2018) Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Transactions on Circuits and Systems for Video Technology. https://doi.org/10.1109/TCSVT.2018.2799243

  17. Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 57(3):86–95

    Article  Google Scholar 

  18. McDermott Josh H, Simoncelli Eero P (2011) Sound texture perception via statistics of the auditory periphery: evidence from sound synthesis. Neuron 71(5):926–940

    Article  Google Scholar 

  19. Mcdermott JH, Oxenham AJ, Simoncelli EP (2009) Sound texture synthesis via filter statistics. IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, WASPAA 2009:297–300

    Google Scholar 

  20. Neal RM (2012) MCMC using Hamiltonian dynamics. Handbook of Markov Chain Monte Carlo, 2011, 2(11)

  21. Normanhaignere S, Kanwisher NG, Mcdermott JH (2015) Distinct cortical pathways for music and speech revealed by hypothesis-free voxel decomposition. Neuron 88(6):1281–1296

    Article  Google Scholar 

  22. Piczak KJ (2015) ESC: dataset for environmental sound classification. Proceedings of the 23rd ACM international conference on Multimedia, MM '15:1015–1018

  23. Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434

  24. Rubin DB, Thayer DT (1982) EM algorithms for ML factor analysis. Psychometrika 47(1):69–76

    Article  MathSciNet  Google Scholar 

  25. Sahidullah M, Saha G (2012) Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition. Speech Comm 54(4):543–565

    Article  Google Scholar 

  26. Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo SS, Mehmood I (2017) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimedia Tools & Applications 76(3):3519–3536

    Article  Google Scholar 

  27. Shi H, Dong J, Wang W, Qian Y, Zhang X (2017) SSGAN: secure steganography based on generative adversarial networks. arXiv:1707.01613

  28. Sobers TV, Bash BA, Guha S, Towsley D, Goeckel D (2016) Covert communication in the presence of an uninformed jammer. IEEE Trans Wirel Commun 16(9):6193–6206

    Article  Google Scholar 

  29. Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters 24(10):1547–1551

    Article  Google Scholar 

  30. Tang W, Li B, Tan S, Barni M, Huang J (2018) CNN based adversarial embedding with minimum alteration for image steganography. arXiv:1803.09043

  31. Vedaldi A, Lenc K (2015) MatConvNet: convolutional neural networks for MATLAB. Proceedings of the 23rd ACM international conference on Multimedia. MM '15: 689–692

  32. Wendzel S, Zander S, Fechner B, Herdin C (2015) Pattern-based survey and categorization of network covert channel techniques. ACM Comput Surv 47(3):1–26

    Article  Google Scholar 

  33. Xu G (2017) Deep convolutional neural network to detect J-UNIWARD. The 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '17:67–73

  34. Yang C, Luo X, Lu J, Liu F (2018) Extracting hidden messages of MLSB steganography based on optimal stego subset. SCIENCE CHINA Inf Sci. https://doi.org/10.1007/s11432-017-9328-2

  35. Yang J, Liu K, Kang X, Wong EK, Shi YQ (2018) Spatial image steganography based on generative adversarial network. arXiv:1804.07939

  36. Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by The National Natural Science Foundation of China (Grant No. 61602247, 61702235, U1636117, 61472188), Natural Science Foundation of Jiangsu Province (Grant No. BK20150472, BK20160840), CCF-VENUSTECH Foundation (Grant No. 2016011), Fundamental Research Funds for the Central Universities (30920140121006, 30915012208).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiwei Liu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dai, Y., Liu, W., Liu, G. et al. An end-to-end generative network for environmental sound-based covert communication. Multimed Tools Appl 78, 8635–8653 (2019). https://doi.org/10.1007/s11042-018-6592-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6592-2

Keywords

Navigation