Computationally secure steganography based on speech synthesis

The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the...

Full description

Bibliographic Details
Main Author: Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022025
_version_ 1811292725429927936
author Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
author_facet Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
author_sort Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
collection DOAJ
description The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.
first_indexed 2024-04-13T04:49:41Z
format Article
id doaj.art-5fd96e9281654ac1872e96a6e9e0b45c
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-04-13T04:49:41Z
publishDate 2022-06-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-5fd96e9281654ac1872e96a6e9e0b45c2022-12-22T03:01:42ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-06-018313414110.11959/j.issn.2096-109x.2022025Computationally secure steganography based on speech synthesisMenghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU0School of Cyber Technology and Science, University of Science and Technology of China, Hefei 230001, China ; CAS Key Laboratory of Electro-magnetic Space Information, Hefei 230001, ChinaThe steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022025audio steganographyspeech synthesisgenerative modelpublic key steganography
spellingShingle Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
Computationally secure steganography based on speech synthesis
网络与信息安全学报
audio steganography
speech synthesis
generative model
public key steganography
title Computationally secure steganography based on speech synthesis
title_full Computationally secure steganography based on speech synthesis
title_fullStr Computationally secure steganography based on speech synthesis
title_full_unstemmed Computationally secure steganography based on speech synthesis
title_short Computationally secure steganography based on speech synthesis
title_sort computationally secure steganography based on speech synthesis
topic audio steganography
speech synthesis
generative model
public key steganography
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022025
work_keys_str_mv AT menghanlikejiangchenweimingzhangnenghaiyu computationallysecuresteganographybasedonspeechsynthesis