Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

New Steganography Breakthrough Enables “Perfectly Secure” Digital Communications
SciTechDaily ^ | 7 March 2023 | University of Oxford

Posted on 03/07/2023 11:58:07 AM PST by ShadowAce

A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden.

The team, led by the University of Oxford in close collaboration with Carnegie Mellon University, envisages that this method may soon be used widely in digital human communications, including social media and private messaging. In particular, the ability to send perfectly secure information may empower vulnerable groups, such as dissidents, investigative journalists, and humanitarian aid workers.

The algorithm applies to a setting called steganography: the practice of hiding sensitive information inside of innocuous content. Steganography differs from cryptography because the sensitive information is concealed in such a way that this obscures the fact that something has been hidden. An example could be hiding a Shakespeare poem inside an AI-generated image of a cat.

Despite having been studied for more than 25 years, existing steganography approaches generally have imperfect security, meaning that individuals who use these methods risk being detected. This is because previous steganography algorithms would subtly change the distribution of the innocuous content.

To overcome this, the research team used recent breakthroughs in information theory, specifically minimum entropy coupling, which allows one to join two distributions of data together such that their mutual information is maximized, but the individual distributions are preserved.

As a result, with the new algorithm, there is no statistical difference between the distribution of the innocuous content and the distribution of content that encodes sensitive information.

The algorithm was tested using several types of models that produce auto-generated content, such as GPT-2, an open-source language model, and WAVE-RNN, a text-to-speech converter. Besides being perfectly secure, the new algorithm showed up to 40% higher encoding efficiency than previous steganography methods across a variety of applications, enabling more information to be concealed within a given amount of data. This may make steganography an attractive method even if perfect security is not required, due to the benefits for data compression and storage.

The research team has filed a patent for the algorithm, but intend to issue it under a free license to third parties for non-commercial responsible use. This includes academic and humanitarian use, and trusted third-party security audits. The researchers have published this work as a preprint paper on arXiv, as well as open-sourced an inefficient implementation of their method on Github. They will also present the new algorithm at the premier AI conference, the 2023 International Conference on Learning Representations in May.

AI-generated content is increasingly used in ordinary human communications, fueled by products such as ChatGPT, Snapchat AI-stickers, and TikTok video filters. As a result, steganography may become more widespread as the mere presence of AI-generated content will cease to arouse suspicion.

Co-lead author Dr. Christian Schroeder de Witt (Department of Engineering Science, University of Oxford) said: “Our method can be applied to any software that automatically generates content, for instance probabilistic video filters, or meme generators. This could be very valuable, for instance, for journalists and aid workers in countries where the act of encryption is illegal. However, users still need to exercise precaution as any encryption technique may be vulnerable to side-channel attacks such as detecting a steganography app on the user’s phone.”

Co-lead author Samuel Sokota (Machine Learning Department, Carnegie Mellon University) said: “The main contribution of the work is showing a deep connection between a problem called minimum entropy coupling and perfectly secure steganography. By leveraging this connection, we introduce a new family of steganography algorithms that have perfect security guarantees.”

Contributing author Professor Jakob Foerster (Department of Engineering Science, University of Oxford) said: “This paper is a great example of research into the foundations of machine learning that leads to breakthrough discoveries for crucial application areas. It’s wonderful to see that Oxford, and our young lab in particular, is at the forefront of it all.”

Reference: “Perfectly Secure Steganography Using Minimum Entropy Coupling” by Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster and Martin Strohmeier, 6 March 2023, arXiv.
DOI: 10.48550/arXiv.2210.14889

Besides Dr. Christian Schroeder de Witt, Samuel Sokota, and Professor Jakob Foerster, the study involved Prof. Zico Kolter at Carnegie Mellon University, USA, and Dr. Martin Strohmeier from armasuisse Science+Technology, Switzerland. The work was partially funded by a EPSRC IAA Doctoral Impact fund hosted by Professor Philip Torr, Torr Vision Group, at the University of Oxford.


TOPICS: Computers/Internet
KEYWORDS: steganography
Navigation: use the links below to view more comments.
first 1-2021-24 next last

1 posted on 03/07/2023 11:58:07 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; AFreeBird; ...

2 posted on 03/07/2023 11:58:19 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Until someone figures out how to crack it real soon now.


3 posted on 03/07/2023 12:34:19 PM PST by Salman (It's not a slippery slope if it was part of the program all along. )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salman

It isn’t a new difficult-to-crack algorithm but a way of hiding information.


4 posted on 03/07/2023 12:38:40 PM PST by steve86 (Numquam accusatus, numquam ad curiam ibit, numquam ad carcerem™)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce
“the chair is against the wall, the chair is against the wall…john has a long mustache, john has a long mustache”

Can you find it?


5 posted on 03/07/2023 12:41:22 PM PST by ProtectOurFreedom (There is lots of money and power in Green Communism and we all know where Communism ends.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salman

Too late...


6 posted on 03/07/2023 12:43:20 PM PST by gr8eman (Abortion! It's just a murderous ghoul thing!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce

OK, so they can hide hidden data or compressed images inside an existing image. HOW CONVENIENT! Post an image on a conservative website, and everyone who visits the site has that image in their web cache. THEN, you raid the side, get a list of the visitors, and raid all of them for having “bad pictures of kids” on their computer. DESPITE THE FACT THAT THEY DIDN’T KNOWINGLY DOWNLOAD IT.

Might seem a bit far-fetched, but I wouldn’t put it past them to try it.


7 posted on 03/07/2023 12:47:57 PM PST by FrankRizzo890
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

“In particular, the ability to send perfectly secure information may empower vulnerable groups, such as dissidents, investigative journalists, and humanitarian aid workers.”

And fans of child pornography.


8 posted on 03/07/2023 12:49:25 PM PST by Boogieman
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
"X- Steganography!"


9 posted on 03/07/2023 12:52:37 PM PST by Sirius Lee (They intend to murder us. Prep if you want to live and live like you are prepping for eternal life)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

A long time ago I heard it posited that one possible answer to Fermi’s paradox (”If aliens are out there, why haven’t we heard from them?”) is that they have perfected the ability to conceal their communications, so we can’t detect them. If we could find the signals containing their communications, we couldn’t get anything from the signal.


10 posted on 03/07/2023 12:55:32 PM PST by motor_racer ("We're gonna punish our enemies, and we're gonna reward our friends" - Barak Obama)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ProtectOurFreedom

Nice 3-D but I cant figure out what it is supposed to be.

.


11 posted on 03/07/2023 12:55:34 PM PST by TLI (ITINERIS IMPENDEO VALHALLA)
[ Post Reply | Private Reply | To 5 | View Replies]

To: TLI

What? You don’t see Brandon falling on the AF1 stairs?


12 posted on 03/07/2023 1:01:04 PM PST by ProtectOurFreedom (There is lots of money and power in Green Communism and we all know where Communism ends.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Sirius Lee

I sure do like your tagline...


13 posted on 03/07/2023 1:09:14 PM PST by Bobalu (Unrepentant communists, NAZI’s and totalitarians of all stripe are bowing toward Davos)
[ Post Reply | Private Reply | To 9 | View Replies]

To: TLI

Looks to be an Elephant man sitting on a chair, 1 leg crossed, and hands holding something.


14 posted on 03/07/2023 1:10:03 PM PST by Mr. Mohasky (Common sense in a world lacking any, will be perceived & construed as an extreme point of view.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: ShadowAce
conceals sensitive information so effectively that it is impossible to detect that anything has been hidden


15 posted on 03/07/2023 1:10:58 PM PST by pepsi_junkie ("We want no Gestapo or Secret Police. F. B. I. is tending in that direction." - Harry S Truman)
[ Post Reply | Private Reply | To 1 | View Replies]

To: FrankRizzo890
Might seem a bit far-fetched, but I wouldn’t put it past them to try it.

Steganography isn't new and Al Queda guys were using these techniques to coordinate amongst themselves using messages hidden in pictures on message boards back in the 2000s. I was playing around with it in the '90s and it's older than that.

If someone wanted to use it to entrap us all they would make it uncrackable. Hypothesis: if you turn someone in for encrypted kiddie porn but you are the only person in the world with the key to break the encryption you might just become a suspect.

16 posted on 03/07/2023 1:15:13 PM PST by pepsi_junkie ("We want no Gestapo or Secret Police. F. B. I. is tending in that direction." - Harry S Truman)
[ Post Reply | Private Reply | To 7 | View Replies]

To: FrankRizzo890
"If someone wanted to use it to entrap us all they would make it uncrackable."

If someone wanted to use it to entrap us all they would NOT make it uncrackable.

17 posted on 03/07/2023 1:16:36 PM PST by pepsi_junkie ("We want no Gestapo or Secret Police. F. B. I. is tending in that direction." - Harry S Truman)
[ Post Reply | Private Reply | To 16 | View Replies]

To: motor_racer

My posit on why we don’t hear from aliens is that any technology that can communicate across the vast distances of space is not going to be radio.

Whatever technology the aliens have it is to radio what radio was to semaphore flags.


18 posted on 03/07/2023 1:21:43 PM PST by MeganC (There is nothing feminine about feminism. )
[ Post Reply | Private Reply | To 10 | View Replies]

To: ShadowAce

Bookmark


19 posted on 03/07/2023 1:26:04 PM PST by Pajamajan ( PRAY FOR OUR NATION. Never be a peazceful slaveo in a\ new Socialist America)
[ Post Reply | Private Reply | To 1 | View Replies]

To: gr8eman

12 year old nerd will crack the code


20 posted on 03/07/2023 1:29:11 PM PST by ptsal (Vote R.E.D. >>>Remove Every Democrat ***)
[ Post Reply | Private Reply | To 6 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson