Designing A Novel Covert Communication Medium for Secure Information Exchange
Keywords:
Covert communication, Secure information exchange, Encryption, Generative Adversarial Networks, Artificial intelligence, adversarial cryptographyAbstract
With the escalating concerns surrounding information security in today’s digital landscape, the demand for covert communication channels that facilitate secure information exchange has witnessed an exponential surge. This research endeavors to design and implement a novel covert communication medium to address the challenges inherent in clandestine information transfer. The proposed medium harnesses a new age intelligent encryption technique to ensure not only the confidentiality but also the stealthiness of communication. The study commences with a comprehensive analysis and development of a concept that seamlessly integrates state-of-the-art encryption algorithms along with ways to make the communication covert. The primary objective is to strike a delicate balance between data security and the covert nature of communication, enabling information to be exchanged undetected within various digital environments. The proposed system explores the potential of leveraging neural networks and deep learning principles to encrypt data traversing insecure communication mediums. The research findings contribute significantly to the advancement of covert communication technologies, offering a robust solution for secure information exchange in environments where traditional encryption methods may prove insufficient or where a more covert approach to encryption is necessitated. The research finding also does benchmarking tests to show the amount of efforts required to break into an intelligent cryptographic algorithm to obtain the keys in totality. The implementation is evaluated on the basis of the accuracy with with the same plaintext is generated and also its ability to withstand various attacks.
Downloads
References
National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES),” FIPS PUB 197, 2001. [Online]. Available: https://nvlpubs.nist. gov/nistpubs/FIPS/NIST. FIPS.197.pdf.
P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” in Advances in Cryptology – CRYPTO ’99, Lecture Notes in Computer Science, vol. 1666, pp. 388-397, 1999. [Online]. Available: https://link.springer.com/chapter/10.1007/ 3-540-48405-1 25.
P. W. Shor, “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484-1509, 1999. [Online]. Available: https://epubs.siam. org/doi/10.1137/ S0097539795293172.
N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998. [Online]. Available: https:// ieeexplore.ieee.org/document/4655281.
F. Kandah and S. A. Al-Khateeb, “An Adaptive Neural Network-Based Cryptographic Technique Using Chaotic Systems,” Computers & Security, vol. 99, p. 101955, 2020. [Online]. Available: https://www.sciencedirect.com/science/ article/pii/S0888327020307846.
SuperData Science, “Convolutional Neural Networks (CNN) - Step3: Flattening,” [Online]. Available: https://www.superdata science.com/blogs/ convolutional-neural-networks-cnn-step-3-flattening.
J. Brown, “Rectified Linear Activation Function for Deep Learning Neural Networks,” [Online]. Available: https://machinelearningmastery.com/ rectified-linear-activation-function-for-deep-learning-neural-networks/.
Learn OpenCV, “Understanding Convolutional Neural Networks (CNN),” [Online]. Available: https://learnopencv.com/ understanding-convolutional-neural-networks-cnn/.
MachineLearningMastery,“Adam Optimization Algorithm forDeep Learning,”[Online]. Available: https://machinelearningmastery.com/ adam-optimization-algorithm-for-deep-learning/.
J. Li, “Stanford Dogs Dataset,” Kaggle Dataset, [Online]. Available: https:// www.kaggle.com/datasets/jessicali9530/stanford-dogs-dataset.
C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, “Rethinking the Inception Architecture for Computer Vision,” [Online]. Available: https://arxiv. org/pdf/1703.08383.pdf.
Towards AI, “An Introduction to Data Augmentation for Images Using TensorFlow’s ImageDataGenerator,” [Online]. Available: https://pub.towardsai.net/ an-introduction-to-data-augmentation-for-images-using-tensorflows-imagedatagenerator-45235dd0553b.
S. Wang and Z. Hou, “Image encryption algorithm based on convolutional neural network,” Optics Communications, vol. 482, 2021. [Online]. Available: https:// www.sciencedirect.com/ science/article/abs/pii/S0030401821002687.
F. Chollet, “Xception: Deep Learning with Depthwise Separable Convolutions,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1251-1258, 2017.
S. C. Iyer and N. Shekokar, “Identifying the Optimal Deep Learning Based Image Recognition Technique for Dog Breed Detection,” in 14th International Conference on Computing Communication and Networking Technologies (ICCCNT),2023.
C. Szegedy et al., “Going deeper with convolutions,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015.
I. Goodfellow et al., Deep Learning, MIT Press, 2016.
Y. Kim et al., “Remote Timing Attacks: Exploiting the Timing Side Channel on the Web,” Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010. [Online]. Available: https://dl.acm.org/doi/10.1 145/ 1815961.1815966.
D. J. Bernstein, “Cache-timing attacks on AES,” [Online]. Available: http://cr. yp.to/antiforgery/ cachetiming-20050414.pdf.
P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” [Online]. Available: https://link.springer.com/chapter/10.1007/3-540-48658-5 1, 1999.
S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer, 2007.
F. Tram`er and D. Boneh, “Model Extraction and Zero-Knowledge Verification of Neural Networks,” in Proceedings of the 27th USENIX Security Symposium, 2018. [Online]. Available: https://www.usenix.org/conference/usenixsecurity18/ presentation/tramer.
F. Tram`er et al., “Stealing Machine Learning Models via Prediction APIs,” in Proceedings of the 25th USENIX Security Symposium, 2018. [Online]. Available: https://dl.acm.org/doi/10.11 45/3243734.3243792.
T. Gu et al., “BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019. [Online]. Available: https://openaccess.thecvf. com/content CVPR 2019/papers/Gu BadNets Identifying Vulnerabilities in the Machine Learning Model Supply Chain CVPR 2019 paper.pdf.
T. Dong and T. Huang, “Neural Cryptography Based on Complex-Valued Neural Network,” IEEE Transactions on Neural Networks and Learning Systems, vol. 31, no. 11, pp. 4999-5004, Nov. 2020. DOI: 10.1109/TNNLS.2019.2955165.
X. Li and P. Wang, “SEDL: A Symmetric Encryption Method Based on Deep Learning,” in Proceedings of the 12th Asia-Pacific Symposium on Internetware, ACM, pp. 175-184, 2020. DOI: 10.1145/3457913.3457921.
X. Wang and Y. Su, “An Audio Encryption Algorithm Based on DNA Coding and Chaotic System,” IEEE Access, vol. 8, pp. 9260-9270, 2020. DOI: 10.1109/ACCESS.2019.2963329.
M. Abadi and D. G. Andersen, “Learning to Protect Communications with Adversarial Neural Cryptography,” arXiv preprint arXiv:1610.06918, 2016.
R. Meng, Q. Cui, Z. Zhou, Z. Fu, and X. Sun, “A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things,” IEEE Access, vol. 7, pp. 90574-90584, 2019. DOI: 10.1109/ACCESS.2019.2920956.
V. Sharma, M. Shukla, S. Srivastava, and R. Mandal, “Generative Network Based Image Encryption,” in Proceedings of the 4th International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, pp. 1-5, 2020. DOI: 10.1109/ICICCS482 65.2020.9121060.
Zhang, W., Wang, X., & Wang, Y. Secure and efficient image encryption based on deep learning and chaos. Multimedia Tools and Applications, 80, 16593–16617, 2021. https://doi.org/10.1007 /s11042-020-09885-8
Boukela, L., & Akleylek, S. Neural network-based cryptographic algorithms: A comprehensive survey. Journal of Information Security and Applications, 55, 102649, 2020. https://doi.org/10.1016/ j.jisa.2020.102649
Bhowmik, T., Hazra, R., & Roy, D. Symmetric Key Cryptography Using Deep Learning Techniques. In Proceedings of the 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1-6, 2020. DOI: 10.1109/ICCCNT49239.2020. 9225280
Gupta, S., & Mehta, M. A Review on Symmetric Key Cryptography Algorithms. In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), pp. 1-5, 2020. DOI: 10.1109/ICCSEA49143.2020. 9132930
He, K., Zhang, X., Ren, S., & Sun, J. Deep Residual Learning for Image Recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770-778, 2016. DOI: 10.1109/CVPR.2016.90
Simonyan, K., & Zisserman, A. Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations (ICLR), 2015. https://arxiv.org/abs/1409.1556
El-Rabaie, S., Hadhoud, M. M., Abdel-Kader, R. F., & Zahran, O. Secure Image Encryption Using Convolutional Neural Networks. IEEE Access, 8, 108871108884, 2020. DOI: 10.1109/ACCESS. 2020.3001506
Wei, L., Zhao, Y., & Liu, H. Image Encryption Algorithm Based on MD5 and Neural Network. Journal of Visual Communication and Image Representation, 65, 102693, 2020. https://doi.org/10.1016/j.jvcir.2019.102693
Papernot, N., McDaniel, P., Wu, X., Jha, S., & Swami, A. Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks. In 2016 IEEE Symposium on Security and Privacy (SP), pp. 582-597, 2016. DOI:10.1109/SP.2016.41
Carlini, N., & Wagner, D. Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy (SP), pp. 39-57, 2017. DOI:10.1109/SP.2017.49
Kurakin, A., Goodfellow, I., & Bengio, S. Adversarial Machine Learning at Scale. In 5th International Conference on Learning Representations (ICLR), 2016. https://arxiv.org/ab s/1611.01236
Tram`er, F., Kurakin, A., Papernot, N., Boneh, D., & McDaniel, P. Ensemble Adversarial Training: Attacks and Defenses. In 6th International Conference on Learning Representations (ICLR), 2017. https://arxiv.org/abs/1705.07204
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.