Meteor: Cryptographically Secure Steganography for Realistic Distributions

被引:10
|
作者
Kaptchuk, Gabriel [1 ]
Jois, Tushar M. [2 ]
Green, Matthew [2 ]
Rubin, Aviel D. [2 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
[2] Johns Hopkins Univ, Baltimore, MD USA
基金
美国国家科学基金会;
关键词
Steganography; Applied Cryptography; Generative Models; Censorship Resistance; DIVERGENCE;
D O I
10.1145/3460120.3484550
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite a long history of research and wide-spread applications to censorship resistant systems, practical steganographic systems capable of embedding messages into realistic communication distributions, like text, do not exist. We identify two primary impediments to deploying universal steganography: (1) prior work leaves the difficult problem of finding samplers for non-trivial distributions unaddressed, and (2) prior constructions have impractical minimum entropy requirements. We investigate using generative models as steganographic samplers, as they represent the best known technique for approximating human communication. Additionally, we study methods to overcome the entropy requirement, including evaluating existing techniques and designing a new steganographic protocol, called Meteor. The resulting protocols are provably indistinguishable from honest model output and represent an important step towards practical steganographic communication for mundane communication channels. We implement Meteor and evaluate it on multiple computation environments with multiple generative models.
引用
收藏
页码:1529 / 1548
页数:20
相关论文
共 50 条
  • [41] Hybrid Cryptographically Secure Pseudo-Random Bit Generator
    Kumar, Mahesh K. M.
    Sunitha, N. R.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 296 - 301
  • [42] Edge-Steganography for secure communication
    ShantalaSuresh
    Vishvanath
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 508 - +
  • [43] New results on robustness of secure steganography
    Hogan, MT
    Balado, F
    Hurley, NJ
    Silvestre, GCM
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [44] Design and implementation of a novel cryptographically secure pseudorandom number generator
    Di Mauro, Juan
    Salazar, Eduardo
    Scolnik, Hugo D.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (03) : 255 - 265
  • [45] Embedding Cryptographically Secure Matrix Transformation in Structured Compressive Sensing
    Djeujo, Romeo Ayemele
    Ruland, Christoph
    [J]. 2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [46] Provably secure steganography - (Extended abstract)
    Hopper, NJ
    Langford, J
    von Ahn, L
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 77 - 92
  • [47] Provably secure steganography and the complexity of sampling
    Hundt, Christian
    Liskiewicz, Maciej
    Woelfel, Ulrich
    [J]. ALGORITHMS AND COMPUTATION, PROCEEDINGS, 2006, 4288 : 754 - +
  • [48] Statistical restoration for robust and secure steganography
    Solanki, K
    Sullivan, K
    Madhow, U
    Manjunath, BS
    Chandrasekaran, S
    [J]. 2005 International Conference on Image Processing (ICIP), Vols 1-5, 2005, : 2237 - 2240
  • [49] Provably secure steganography with imperfect sampling
    Lysyanskaya, Anna
    Meyerovich, Mira
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 123 - 139
  • [50] Provably Secure Generative Linguistic Steganography
    Zhang, Siyu
    Yang, Zhongliang
    Yang, Jinshuai
    Huang, Yongfeng
    [J]. FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL-IJCNLP 2021, 2021, : 3046 - 3055