A Coverless Audio Steganography Based on Generative Adversarial Networks

被引:5
|
作者
Li, Jing [1 ]
Wang, Kaixi [1 ]
Jia, Xiaozhu [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
关键词
audio steganography; coverless steganography; GAN; covert communication; information hiding;
D O I
10.3390/electronics12051253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional audio steganography by cover modification causes changes to the cover features during the embedding of a secret, which is easy to detect with emerging neural-network steganalysis tools. To address the problem, this paper proposes a coverless audio-steganography model to conceal a secret audio. In this method, the stego-audio is directly synthesized by our model, which is based on the WaveGAN framework. An extractor is meticulously designed to reconstruct the secret audio, and it contains resolution blocks to learn the different resolution features. The method does not perform any modification to an existing or generated cover, and as far as we know, this is the first directly generated stego-audio. The experimental results also show that it is difficult for the current steganalysis methods to detect the existence of a secret in the stego-audio generated by our method because there is no cover audio. The MOS metric indicates that the generated stego-audio has high audio quality. The steganography capacity can be measured from two perspectives, one is that it can reach 50% of the stego-audio from the simple size perspective, the other is that 22-37 bits can be hidden in a two-second stego-audio from the semantic. In addition, we prove using spectrum diagrams in different forms that the extractor can reconstruct the secret audio successfully on hearing, which guarantees complete semantic transmission. Finally, the experiment of noise impacts on the stego-audio transmission shows that the extractor can still completely reconstruct the semantics of the secret audios, which indicates that the proposed method has good robustness.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Binary steganography based on generative adversarial nets
    Yucheng Guan
    Shunquan Tan
    Qifen Li
    Multimedia Tools and Applications, 2023, 82 : 6687 - 6706
  • [22] Binary steganography based on generative adversarial nets
    Guan, Yucheng
    Tan, Shunquan
    Li, Qifen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (05) : 6687 - 6706
  • [23] A novel approach based on modified cycle generative adversarial networks for image steganography
    Kuppusamy, P.G.
    Ramya, K.C.
    Sheeba Rani, S.
    Sivaram, M.
    Dhasarathan, Vigneswaran
    Scalable Computing, 2020, 21 (01): : 63 - 72
  • [24] Generative adversarial networks-based image steganography with multiscale features integration
    Song, Yalin
    Zhong, Yuhao
    Gan, Zhihua
    Yang, Yang
    Yu, Junyang
    He, Xin
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (05)
  • [25] A NOVEL APPROACH BASED ON MODIFIED CYCLE GENERATIVE ADVERSARIAL NETWORKS FOR IMAGE STEGANOGRAPHY
    Kuppusamy, P. G.
    Ramya, K. C.
    Rani, S. Sheeba
    Sivaram, M.
    Dhasarathan, Vigneswaran
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2020, 21 (01): : 63 - 72
  • [26] Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks
    Wu, Junqi
    Chen, Bolin
    Luo, Weiqi
    Fang, Yanmei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2282 - 2294
  • [27] A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
    Seddik, Al-Hussien
    Salah, Mohammed
    Behery, Gamal
    El-harby, Ahmed
    Ebada, Ahmed Ismail
    Teng, Sokea
    Nam, Yunyoung
    Abouhawwash, Mohamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 5087 - 5103
  • [28] NEURAL AUDIO DECORRELATION USING GENERATIVE ADVERSARIAL NETWORKS
    Anemuller, Carlotta
    Thiergart, Oliver
    Habets, Emanuel A. P.
    2023 IEEE WORKSHOP ON APPLICATIONS OF SIGNAL PROCESSING TO AUDIO AND ACOUSTICS, WASPAA, 2023,
  • [29] Steganography-based facial re-enactment using generative adversarial networks
    Vijay Kumar
    Sahil Sharma
    Multimedia Tools and Applications, 2024, 83 : 7609 - 7630
  • [30] Steganography-based facial re-enactment using generative adversarial networks
    Kumar, Vijay
    Sharma, Sahil
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (03) : 7609 - 7630