Meteor: Cryptographically Secure Steganography for Realistic Distributions

被引:10
|
作者
Kaptchuk, Gabriel [1 ]
Jois, Tushar M. [2 ]
Green, Matthew [2 ]
Rubin, Aviel D. [2 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
[2] Johns Hopkins Univ, Baltimore, MD USA
基金
美国国家科学基金会;
关键词
Steganography; Applied Cryptography; Generative Models; Censorship Resistance; DIVERGENCE;
D O I
10.1145/3460120.3484550
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite a long history of research and wide-spread applications to censorship resistant systems, practical steganographic systems capable of embedding messages into realistic communication distributions, like text, do not exist. We identify two primary impediments to deploying universal steganography: (1) prior work leaves the difficult problem of finding samplers for non-trivial distributions unaddressed, and (2) prior constructions have impractical minimum entropy requirements. We investigate using generative models as steganographic samplers, as they represent the best known technique for approximating human communication. Additionally, we study methods to overcome the entropy requirement, including evaluating existing techniques and designing a new steganographic protocol, called Meteor. The resulting protocols are provably indistinguishable from honest model output and represent an important step towards practical steganographic communication for mundane communication channels. We implement Meteor and evaluate it on multiple computation environments with multiple generative models.
引用
收藏
页码:1529 / 1548
页数:20
相关论文
共 50 条
  • [31] Secure Steganography Scheme Based on Steganography Generative Adversarial Network
    Pan, Guangxu
    Yang, Zhongpeng
    Ma, Yong
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 487 - 502
  • [32] A novel framework for the construction of cryptographically secure S-boxes
    Arshad, Razi
    Jalil, Mudassir
    Hussain, Muzamal
    Tounsi, Abdelouahed
    [J]. COMPUTERS AND CONCRETE, 2024, 34 (01): : 833 - 845
  • [33] A Cryptographically Secure Scheme for Preserving Privacy in Association Rule Mining
    Mohsin, Hufsa
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 43 - 53
  • [34] A chaos-based approach to the design of cryptographically secure substitutions
    Amigó, JM
    Szczepanski, J
    Kocarev, L
    [J]. PHYSICS LETTERS A, 2005, 343 (1-3) : 55 - 60
  • [35] Cryptographically secure random number generator with chaotic additional input
    Ozkaynak, Fatih
    [J]. NONLINEAR DYNAMICS, 2014, 78 (03) : 2015 - 2020
  • [36] Cryptographically secure random number generator with chaotic additional input
    Fatih Özkaynak
    [J]. Nonlinear Dynamics, 2014, 78 : 2015 - 2020
  • [37] Design and implementation of a novel cryptographically secure pseudorandom number generator
    Juan Di Mauro
    Eduardo Salazar
    Hugo D. Scolnik
    [J]. Journal of Cryptographic Engineering, 2022, 12 : 255 - 265
  • [38] Hybrid Cryptographically Secure Pseudo-Random Bit Generator
    Kumar, Mahesh K. M.
    Sunitha, N. R.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 296 - 301
  • [39] Embedding Cryptographically Secure Matrix Transformation in Structured Compressive Sensing
    Djeujo, Romeo Ayemele
    Ruland, Christoph
    [J]. 2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [40] Design and implementation of a novel cryptographically secure pseudorandom number generator
    Di Mauro, Juan
    Salazar, Eduardo
    Scolnik, Hugo D.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (03) : 255 - 265