Designing A Novel Covert Communication Medium for Secure Information Exchange

Authors

  • Sridhar Iyer, Narendra Shekokar, Sharvari Patil

Keywords:

Covert communication, Secure information exchange, Encryption, Generative Adversarial Networks, Artificial intelligence, adversarial cryptography

Abstract

With the escalating concerns surrounding information security in today’s digital landscape, the demand for covert communication channels that facilitate secure information exchange has witnessed an exponential surge. This research endeavors to design and implement a novel covert communication medium to address the challenges inherent in clandestine information transfer. The proposed medium harnesses a new age intelligent encryption technique to ensure not only the confidentiality but also the stealthiness of communication. The study commences with a comprehensive analysis and development of a concept that seamlessly integrates state-of-the-art encryption algorithms along with ways to make the communication covert. The primary objective is to strike a delicate balance between data security and the covert nature of communication, enabling information to be exchanged undetected within various digital environments. The proposed system explores the potential of leveraging neural networks and deep learning principles to encrypt data traversing insecure communication mediums. The research findings contribute significantly to the advancement of covert communication technologies, offering a robust solution for secure information exchange in environments where traditional encryption methods may prove insufficient or where a more covert approach to encryption is necessitated. The research finding also does benchmarking tests to show the amount of efforts required to break into an intelligent cryptographic algorithm to obtain the keys in totality. The implementation is evaluated on the basis of the accuracy with with the same plaintext is generated and also its ability to withstand various attacks.

Downloads

Download data is not yet available.

References

National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES),” FIPS PUB 197, 2001. [Online]. Available: https://nvlpubs.nist. gov/nistpubs/FIPS/NIST. FIPS.197.pdf.

P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” in Advances in Cryptology – CRYPTO ’99, Lecture Notes in Computer Science, vol. 1666, pp. 388-397, 1999. [Online]. Available: https://link.springer.com/chapter/10.1007/ 3-540-48405-1 25.

P. W. Shor, “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484-1509, 1999. [Online]. Available: https://epubs.siam. org/doi/10.1137/ S0097539795293172.

N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998. [Online]. Available: https:// ieeexplore.ieee.org/document/4655281.

F. Kandah and S. A. Al-Khateeb, “An Adaptive Neural Network-Based Cryptographic Technique Using Chaotic Systems,” Computers & Security, vol. 99, p. 101955, 2020. [Online]. Available: https://www.sciencedirect.com/science/ article/pii/S0888327020307846.

SuperData Science, “Convolutional Neural Networks (CNN) - Step3: Flattening,” [Online]. Available: https://www.superdata science.com/blogs/ convolutional-neural-networks-cnn-step-3-flattening.

J. Brown, “Rectified Linear Activation Function for Deep Learning Neural Networks,” [Online]. Available: https://machinelearningmastery.com/ rectified-linear-activation-function-for-deep-learning-neural-networks/.

Learn OpenCV, “Understanding Convolutional Neural Networks (CNN),” [Online]. Available: https://learnopencv.com/ understanding-convolutional-neural-networks-cnn/.

MachineLearningMastery,“Adam Optimization Algorithm forDeep Learning,”[Online]. Available: https://machinelearningmastery.com/ adam-optimization-algorithm-for-deep-learning/.

J. Li, “Stanford Dogs Dataset,” Kaggle Dataset, [Online]. Available: https:// www.kaggle.com/datasets/jessicali9530/stanford-dogs-dataset.

C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, “Rethinking the Inception Architecture for Computer Vision,” [Online]. Available: https://arxiv. org/pdf/1703.08383.pdf.

Towards AI, “An Introduction to Data Augmentation for Images Using TensorFlow’s ImageDataGenerator,” [Online]. Available: https://pub.towardsai.net/ an-introduction-to-data-augmentation-for-images-using-tensorflows-imagedatagenerator-45235dd0553b.

S. Wang and Z. Hou, “Image encryption algorithm based on convolutional neural network,” Optics Communications, vol. 482, 2021. [Online]. Available: https:// www.sciencedirect.com/ science/article/abs/pii/S0030401821002687.

F. Chollet, “Xception: Deep Learning with Depthwise Separable Convolutions,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1251-1258, 2017.

S. C. Iyer and N. Shekokar, “Identifying the Optimal Deep Learning Based Image Recognition Technique for Dog Breed Detection,” in 14th International Conference on Computing Communication and Networking Technologies (ICCCNT),2023.

C. Szegedy et al., “Going deeper with convolutions,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015.

I. Goodfellow et al., Deep Learning, MIT Press, 2016.

Y. Kim et al., “Remote Timing Attacks: Exploiting the Timing Side Channel on the Web,” Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010. [Online]. Available: https://dl.acm.org/doi/10.1 145/ 1815961.1815966.

D. J. Bernstein, “Cache-timing attacks on AES,” [Online]. Available: http://cr. yp.to/antiforgery/ cachetiming-20050414.pdf.

P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” [Online]. Available: https://link.springer.com/chapter/10.1007/3-540-48658-5 1, 1999.

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer, 2007.

F. Tram`er and D. Boneh, “Model Extraction and Zero-Knowledge Verification of Neural Networks,” in Proceedings of the 27th USENIX Security Symposium, 2018. [Online]. Available: https://www.usenix.org/conference/usenixsecurity18/ presentation/tramer.

F. Tram`er et al., “Stealing Machine Learning Models via Prediction APIs,” in Proceedings of the 25th USENIX Security Symposium, 2018. [Online]. Available: https://dl.acm.org/doi/10.11 45/3243734.3243792.

T. Gu et al., “BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019. [Online]. Available: https://openaccess.thecvf. com/content CVPR 2019/papers/Gu BadNets Identifying Vulnerabilities in the Machine Learning Model Supply Chain CVPR 2019 paper.pdf.

T. Dong and T. Huang, “Neural Cryptography Based on Complex-Valued Neural Network,” IEEE Transactions on Neural Networks and Learning Systems, vol. 31, no. 11, pp. 4999-5004, Nov. 2020. DOI: 10.1109/TNNLS.2019.2955165.

X. Li and P. Wang, “SEDL: A Symmetric Encryption Method Based on Deep Learning,” in Proceedings of the 12th Asia-Pacific Symposium on Internetware, ACM, pp. 175-184, 2020. DOI: 10.1145/3457913.3457921.

X. Wang and Y. Su, “An Audio Encryption Algorithm Based on DNA Coding and Chaotic System,” IEEE Access, vol. 8, pp. 9260-9270, 2020. DOI: 10.1109/ACCESS.2019.2963329.

M. Abadi and D. G. Andersen, “Learning to Protect Communications with Adversarial Neural Cryptography,” arXiv preprint arXiv:1610.06918, 2016.

R. Meng, Q. Cui, Z. Zhou, Z. Fu, and X. Sun, “A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things,” IEEE Access, vol. 7, pp. 90574-90584, 2019. DOI: 10.1109/ACCESS.2019.2920956.

V. Sharma, M. Shukla, S. Srivastava, and R. Mandal, “Generative Network Based Image Encryption,” in Proceedings of the 4th International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, pp. 1-5, 2020. DOI: 10.1109/ICICCS482 65.2020.9121060.

Zhang, W., Wang, X., & Wang, Y. Secure and efficient image encryption based on deep learning and chaos. Multimedia Tools and Applications, 80, 16593–16617, 2021. https://doi.org/10.1007 /s11042-020-09885-8

Boukela, L., & Akleylek, S. Neural network-based cryptographic algorithms: A comprehensive survey. Journal of Information Security and Applications, 55, 102649, 2020. https://doi.org/10.1016/ j.jisa.2020.102649

Bhowmik, T., Hazra, R., & Roy, D. Symmetric Key Cryptography Using Deep Learning Techniques. In Proceedings of the 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1-6, 2020. DOI: 10.1109/ICCCNT49239.2020. 9225280

Gupta, S., & Mehta, M. A Review on Symmetric Key Cryptography Algorithms. In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), pp. 1-5, 2020. DOI: 10.1109/ICCSEA49143.2020. 9132930

He, K., Zhang, X., Ren, S., & Sun, J. Deep Residual Learning for Image Recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770-778, 2016. DOI: 10.1109/CVPR.2016.90

Simonyan, K., & Zisserman, A. Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations (ICLR), 2015. https://arxiv.org/abs/1409.1556

El-Rabaie, S., Hadhoud, M. M., Abdel-Kader, R. F., & Zahran, O. Secure Image Encryption Using Convolutional Neural Networks. IEEE Access, 8, 108871108884, 2020. DOI: 10.1109/ACCESS. 2020.3001506

Wei, L., Zhao, Y., & Liu, H. Image Encryption Algorithm Based on MD5 and Neural Network. Journal of Visual Communication and Image Representation, 65, 102693, 2020. https://doi.org/10.1016/j.jvcir.2019.102693

Papernot, N., McDaniel, P., Wu, X., Jha, S., & Swami, A. Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks. In 2016 IEEE Symposium on Security and Privacy (SP), pp. 582-597, 2016. DOI:10.1109/SP.2016.41

Carlini, N., & Wagner, D. Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy (SP), pp. 39-57, 2017. DOI:10.1109/SP.2017.49

Kurakin, A., Goodfellow, I., & Bengio, S. Adversarial Machine Learning at Scale. In 5th International Conference on Learning Representations (ICLR), 2016. https://arxiv.org/ab s/1611.01236

Tram`er, F., Kurakin, A., Papernot, N., Boneh, D., & McDaniel, P. Ensemble Adversarial Training: Attacks and Defenses. In 6th International Conference on Learning Representations (ICLR), 2017. https://arxiv.org/abs/1705.07204

Downloads

Published

28.06.2024

How to Cite

Sridhar Iyer. (2024). Designing A Novel Covert Communication Medium for Secure Information Exchange. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 311 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6741

Issue

Section

Research Article