Meteor: Cryptographically Secure Steganography for Realistic Distributions

被引:10
|
作者
Kaptchuk, Gabriel [1 ]
Jois, Tushar M. [2 ]
Green, Matthew [2 ]
Rubin, Aviel D. [2 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
[2] Johns Hopkins Univ, Baltimore, MD USA
基金
美国国家科学基金会;
关键词
Steganography; Applied Cryptography; Generative Models; Censorship Resistance; DIVERGENCE;
D O I
10.1145/3460120.3484550
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite a long history of research and wide-spread applications to censorship resistant systems, practical steganographic systems capable of embedding messages into realistic communication distributions, like text, do not exist. We identify two primary impediments to deploying universal steganography: (1) prior work leaves the difficult problem of finding samplers for non-trivial distributions unaddressed, and (2) prior constructions have impractical minimum entropy requirements. We investigate using generative models as steganographic samplers, as they represent the best known technique for approximating human communication. Additionally, we study methods to overcome the entropy requirement, including evaluating existing techniques and designing a new steganographic protocol, called Meteor. The resulting protocols are provably indistinguishable from honest model output and represent an important step towards practical steganographic communication for mundane communication channels. We implement Meteor and evaluate it on multiple computation environments with multiple generative models.
引用
收藏
页码:1529 / 1548
页数:20
相关论文
共 50 条
  • [1] Cryptographically Secure Computation
    Shen, Emily
    Varia, Mayank
    Cunningham, Robert K.
    Vesey, W. Konrad
    [J]. COMPUTER, 2015, 48 (04) : 78 - 81
  • [2] Cryptographically Secure Biometrics
    Stoianov, A.
    [J]. BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION VII, 2010, 7667
  • [3] Cryptographically Secure Shields
    Cioranesco, Jean-Michel
    Danger, Jean-Luc
    Graba, Tarik
    Guilley, Sylvain
    Mathieu, Yves
    Naccache, David
    Xuan Thuy Ngo
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 25 - 31
  • [4] Cryptographically secure identity certificates
    Kirovski, D
    Jojic, N
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 413 - 416
  • [5] Cryptographically Secure Detection of Injection Attacks
    Lu, Yun
    Mitropoulos, Konstantinos
    Ostrovsky, Rafail
    Weinstock, Avraham
    Zikas, Vassilis
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2240 - 2242
  • [6] Cryptographically Secure Bloom-Filters
    Nojima, Ryo
    Kadobayashi, Youki
    [J]. TRANSACTIONS ON DATA PRIVACY, 2009, 2 (02) : 131 - 139
  • [7] On cryptographically secure vectorial Boolean functions
    Satoh, T
    Iwata, T
    Kurosawa, K
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 20 - 28
  • [8] A cryptographically secure image watermarking scheme
    Ren, Jian
    Li, Tongtong
    [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1013 - 1018
  • [9] QueryShield: Cryptographically Secure Analytics in the Cloud
    Seow, Ethan
    Tong, Yan
    Baum, Eli
    Buxbaum, Sam
    Faisal, Muhammad
    Liagouris, John
    Kalavri, Vasiliki
    Varia, Mayank
    [J]. COMPANION OF THE 2024 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, SIGMOD-COMPANION 2024, 2024, : 436 - 439
  • [10] Rmind: A Tool for Cryptographically Secure Statistical Analysis
    Bogdanov, Dan
    Kamm, Liina
    Laur, Sven
    Sokk, Ville
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 481 - 495