SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application

https://doi.org/10.1016/j.jnca.2020.102689Get rights and content

Abstract

Massive data is transferred in the Internet of Thing (IoT) every single second. Protecting the security of these data is a crucial task. Steganography is a collection of techniques for concealing the existence of information by embedding it within irrelevant carriers, which could protect security and privacy of the data. Distinct from the cryptography, steganography put emphasis on hiding the existence of the secret. However, the majority of research mainly work on complex algorithm. In this paper, we proposed an audio steganography algorithm which automatically generated from adversarial training. The embedding model is light-weight which could use as machine learning tools in smart device. Besides, the existing audio steganography methods mainly depend on human handcraft, while the proposed method could obtain from meachine learning. The embedding model consists of three neural networks: encoder which embeds the secret message in the carrier, decoder which extracts the message, and discriminator which determines the carriers containing secret messages. The system is trained with different training settings on two datasets. Competed the majority of audio steganographic schemes, the proposed scheme could produce high fidelity steganographic audio. Besides, the extensive experiments demonstrate the robustness and security of our algorithm.

Introduction

The Internet of Things is a network of connected software, smart device, and many items which facilitate the data exchange (Ashtonet al., 2009). The main purpose of IoT is to provide the security and reliability of data transmission thus control Things. Although IoT provide the convenience of life, the security needs attention. Massive data is transferred in the IoT every single second which vulnerable to attack. Personal information could be hacked from the system without protection and therefore protecting the security of these data in IoT is a crucial task (Zhao and Ge, 2013; Kadhim et al., 2020). The cryptography techniques are wildly used in many identification and authentication applications in IoT to ensure the security. However, massive surveillance operations have shown that the mere existence of meta-data communication could lead to privacy leakages even if the content is unknown. To further protect the data security, we introduce steganography techniques in IoT which focus on hiding the existence of the information in proposed work.

Steganography is the science to conceal secret messages in the irrelevant carriers through slightly modifying the values which hard to detect by human perception. Similar to cryptography, the steganography provides methods for secret communication. Distinct from the cryptography method which focuses on the authenticity and integrity of the messages, steganography aims to hide the existence of the secret. Steganography hides the encrypted data that anyone would suspect the existence of the secret through special algorithms to provide additional security (Hurrah et al., 2019). In this work, we proposed a novel framework that automatically generated light-weight audio steganography algorithms. Audio steganography algorithms embed secrets into audio contents based on the elusion of human auditory system. Audio steganography could be used in the watermark, copyright protection and secret transmission and many other applications. Existing audio steganography methods could be divided into three categories: temporal domain methods which encoder messages in Least Significant Bit (LSB) of individual sound samples with the equivalent secret message binary sequence (Balgurgi and Jagtap, 2013; Bender et al., 1996), transform domain methods which use the masking effect of human auditory system and make the weak frequencies near the strong resonance frequencies inaudible (Alwahbani and Elshoush, 2016), and wavelet domain methods which use discrete wavelet transform and hide the information in discrete wavelet coefficients adaptively (Sheikhan et al., 2010).

Steganography and steganalysis are import topics in information hiding. In the early years, steganography is relatively simple and hence the dimension of feature in steganalysis was low and light computation. With the study of content adaptive steganographic schemes which usually employ distortion functions and syndrome-trellis coding technique to embed secret messages in relatively secure locations of the carrier. Classic methods mainly depend on human handcraft, and most of the techniques take disadvantage of low capacity, lack of security and fixed generalization. With the development of deep learning, many in-depth models have used in steganography and steganalysis (Zou et al., 2019; Zhu et al., 2018; Boroumand et al., 2018). Generative adversarial networks (GANs) have proved to be competitive generative models on synthesis tasks in recent researches (Goodfellow et al., 2014; Isola et al., 2017; Radford et al., 1511). GANs have also applied to speech generation nor enhancement task and generate signal (Yang et al., 1703; Pascual et al., 1703; Hsu et al., 1704). In this work, we introduce the idea of adverasrial training to automatically generated audio steganography algorithm.

Distinct from the most audio synthesis task, the target of audio steganography is embedding with less distortion. We introduce the idea of zero-sum game theory and propose the embedding model which consists of three neural networks: encoder which embeds the secret message in the carrier, decoder which extracts the message, and discriminator which determines the carriers containing secret messages. The embedding model aims to conceal the secret audio within carrier audio. Thus, the task of the training is a binary classification problem. The encoder takes in carrier audio and secret message then produces steganographic audio, while the discriminator tries to learn the weakness of generator, resulting in the ability to determine whether the audio contain secrets. All the networks are simultaneously trained on the datasets until the encoder could produce high fidelity steganographic audio. We show that our scheme could successfully work in practice, the encoder could produce steganographic audio which contains secret audio, the decoder could decode the steganographic audio to a carrier and the less distortion secret audio, which indicate heard more than heard. As far as we are concerned, GAN has not yet been applied to audio information hiding task, so this is the first approach to use the adversarial framework to generate steganographic audio. Distinct from most meachine learning model, the proposed model is less than 5 MB which could used in many smart device in IoT.

The paper is organized as follows. In Section 2, we present a review of steganography and steganalysis. The structure of our model and methodology is described in Section 3, which is followed by the experimental results and analysis in Section 4. Finally, the concluding remarks are drawn in Section 5.

Section snippets

steganography and steganalysis

Steganography is the science of covered or hidden writing. The goal of steganography is covertly communicate secret messages. As shown in Fig. 1, there are three parts in this communicate: sender, receiver and external detector. The carrier in steganography could be any form of multimedia. Audios are wildly used as carriers in many steganography methods. In general, the sender uses a steganographic algorithm to conceals a secret message into carrier audio which sounds unaltered to external

Methodology

GAN have proved to be competitive models on synthesis tasks in recent research. Typically, a GAN contains two parts: generator and discriminator. The generator captures the training data distribution and learns to create fake data different from the training data, while the discriminator learns to determine whether the input data is real or fake. The generator and discriminator are simultaneously trained via an adversarial process until the generator could produce high-quality fake data. The

Experiments and discussions

In this section, extensive experiments are carried out to demonstrate the effectiveness of our method. We implemented our scheme with different training settings under two audio datasets: TIMIT (Garofolo et al., 1988) and LibriSpeech (Panayotov et al., 2015). The code and experimental data are available on our github.

Conclusion

In this paper, we propose a novel generative audio steganography method. With the help of the proposed method, any audio could be transmitted securely over IoT networks within a profound audio. The proposed model is lightweight which could be used in many smart devices in IoT. We demonstrate the effectiveness of our model with several experiments. Adversarial training is a promising way to generating audio steganography algorithm in the aspects of increasing capacity and enhancing security. In

CRediT authorship contribution statement

Shunzhi Jiang: Conceptualization, Methodology, Investigation, Writing - original draft, Writing - review & editing. Dengpan Ye: Validation, Formal analysis, Visualization, Software, Funding acquisition, Project administration, Resources. Jiaqing Huang: Resources, Supervision, Software, Data curation. Yueyun Shang: Validation, Formal analysis, Visualization, Supervision. Zhuoyuan Zheng: Formal analysis, Visualization, Supervision.

Declaration of competing interest

The authors declared that they have no conflicts of interest to this work.

Acknowledgement

This work was partially supported by the National Key Research Development Program of China (2019QY(Y)0206, 2016QY01W0200), the National Natural Science Foundation of China NSFC (U1636101, U1736211, U1636219).

Shunzhi Jiang received the M.S.degree in automatic control from CAUC, Tianjin, China, in 2014. Currently, he is pursuing the Ph.D degree with the School of Cyber Science and Engineering, Wuhan University. His research interest focuses on steganography, steganalysis and machine learning.

References (29)

  • N.N. Hurrah et al.

    Secure data transmission framework for confidentiality in iots

    Ad Hoc Netw.

    (2019)
  • Y. Zou et al.

    Research on image steganography analysis based on deep learning

    J. Vis. Commun. Image Represent.

    (2019)
  • S.M. Alwahbani et al.

    Hybrid audio steganography and cryptography method based on high least significant bit (lsb) layers and one-time pada novel approach

  • K. Ashton

    That internet of things thing

    RFID J.

    (2009)
  • P.P. Balgurgi et al.

    Audio steganography used for secure data transmission

  • W. Bender et al.

    Techniques for data hiding

    IBM Syst. J.

    (1996)
  • M. Boroumand et al.

    Deep residual network for steganalysis of digital images

    IEEE Trans. Inf. Forensics Secur.

    (2018)
  • Y. Dengpan et al.

    Faster and transferable deep learning steganalysis on gpu

    J. Real-Time Image Process.

    (2019)
  • J. Fridrich et al.

    Rich models for steganalysis of digital images

    IEEE Trans. Inf. Forensics Secur.

    (2012)
  • J.S. Garofolo et al.
    (1988)
  • I. Goodfellow et al.

    Generative adversarial nets

  • K. He et al.

    Spatial pyramid pooling in deep convolutional networks for visual recognition

    IEEE Trans. Pattern Anal. Mach. Intell.

    (2015)
  • V. Holub et al.

    Designing steganographic distortion using directional filters

  • V. Holub et al.

    Universal distortion function for steganography in an arbitrary domain

    EURASIP J. Inf. Secur.

    (2014)
  • Cited by (39)

    • The Threat of Offensive AI to Organizations

      2023, Computers and Security
      Citation Excerpt :

      To minimize throughput, audio and video media can be summarized to textual descriptions onsite with ML before exfiltration. Finally, if the network is air-gapped (isolated from the Internet) (Guri and Elovici, 2018) then DL techniques can be used to hide data within side channels such as noise in audio (Jiang et al., 2020). For stealthy lateral movement, an adversary can configure their Petri nets or attack graphs (see Section 3.1.3) to avoid assets and subnets with certain IDSs and favor networks with more noise to hide in.

    • Secure data transmission in IoTs based on CLoG edge detection

      2021, Future Generation Computer Systems
      Citation Excerpt :

      Taking more LSB’s of the cover image pixels for embedding data can result in a noticeable change in cover and as such cannot be used for security of data in IoT driven critical applications [46]. A large number of steganographic methods have been used to provide security in the IoT network, [47–49]. Like, Li et al. [50], has presented a secret image sharing the steganographic technique for the IoT system.

    • Using DNA to develop a lightweight symmetric encryption method to encrypt the data of IoT devices

      2024, International Journal of Electronic Security and Digital Forensics
    • High-capacity steganography through audio fusion and fission

      2024, Indonesian Journal of Electrical Engineering and Computer Science
    View all citing articles on Scopus

    Shunzhi Jiang received the M.S.degree in automatic control from CAUC, Tianjin, China, in 2014. Currently, he is pursuing the Ph.D degree with the School of Cyber Science and Engineering, Wuhan University. His research interest focuses on steganography, steganalysis and machine learning.

    Dengpan Ye received the B.S.degree in automatic control from SCUT in 1996 and the Ph.D. degree from NJUST in 2005. He was a Post-Doctoral Fellow in information system with the School of Singapore Management University. Since 2012, he has been a Professor with the School of Cyber Science and Engineering, Wuhan University. His research interests include machine learning and multimedia security. He has authored or coauthored over 30 refereed journal and conference papers.

    Jiaqing Huang received the B.S.degree in Mechanic Engineering from WHUT, Wuhan, China, in 2014. Currently, he is pursuing the M.S degree with the School of Cyber Science and Engineering, Wuhan University. His research interest focuses on content security and machine learning security.

    Yueyun Shang Received Master's degree of Applied Mathematics in Huazhong University of Science and Technology, Wuhan, Hubei Province, P. R. China, 2002–2005. Received B.A. degree of Applied Mathematics in Central China Normal University, Wuhan, Hubei Province, P. R. China, 1998–2002. She Joined School of Mathematics and Statistics of South-Central University as a Lecturer in June 2005. Her research interests include machine learning and data hiding.

    Zhuoyuan Zheng is pursuing the B.S degrees in school of computer, Wuhan university. Her research interests include machine learning, deep learning and data hiding.

    View full text