Publication | Closed Access
Meteor: Cryptographically Secure Steganography for Realistic Distributions
47
Citations
68
References
2021
Year
Unknown Venue
EngineeringInformation SecurityInformation ForensicsCommunicationHardware SecurityData ScienceData HidingSteganalysisData PrivacySecure SteganographyComputer ScienceCovert ChannelPractical Steganographic SystemsData SecurityCryptographyUniversal SteganographyInformation HidingSteganographySteganographic Samplers
Despite a long history of research and wide-spread applications to censorship resistant systems, practical steganographic systems capable of embedding messages into realistic communication distributions, like text, do not exist. We identify two primary impediments to deploying universal steganography: (1) prior work leaves the difficult problem of finding samplers for non-trivial distributions unaddressed, and (2) prior constructions have impractical minimum entropy requirements. We investigate using generative models as steganographic samplers, as they represent the best known technique for approximating human communication. Additionally, we study methods to overcome the entropy requirement, including evaluating existing techniques and designing a new steganographic protocol, called Meteor. The resulting protocols are provably indistinguishable from honest model output and represent an important step towards practical steganographic communication for mundane communication channels. We implement Meteor and evaluate it on multiple computation environments with multiple generative models.
| Year | Citations | |
|---|---|---|
Page 1
Page 1