Deep Image Steganography Using Transformer and Recursive Permutation
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-06-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/24/7/878 |
_version_ | 1797406582450946048 |
---|---|
author | Zhiyi Wang Mingcheng Zhou Boji Liu Taiyong Li |
author_facet | Zhiyi Wang Mingcheng Zhou Boji Liu Taiyong Li |
author_sort | Zhiyi Wang |
collection | DOAJ |
description | Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography. |
first_indexed | 2024-03-09T03:27:28Z |
format | Article |
id | doaj.art-81b00d02901c427da58ad6753777ce50 |
institution | Directory Open Access Journal |
issn | 1099-4300 |
language | English |
last_indexed | 2024-03-09T03:27:28Z |
publishDate | 2022-06-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj.art-81b00d02901c427da58ad6753777ce502023-12-03T15:00:04ZengMDPI AGEntropy1099-43002022-06-0124787810.3390/e24070878Deep Image Steganography Using Transformer and Recursive PermutationZhiyi Wang0Mingcheng Zhou1Boji Liu2Taiyong Li3School of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, ChinaSchool of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, ChinaSchool of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, ChinaSchool of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, ChinaImage steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography.https://www.mdpi.com/1099-4300/24/7/878image steganographydata hidingdeep learningtransformerimage encryption |
spellingShingle | Zhiyi Wang Mingcheng Zhou Boji Liu Taiyong Li Deep Image Steganography Using Transformer and Recursive Permutation Entropy image steganography data hiding deep learning transformer image encryption |
title | Deep Image Steganography Using Transformer and Recursive Permutation |
title_full | Deep Image Steganography Using Transformer and Recursive Permutation |
title_fullStr | Deep Image Steganography Using Transformer and Recursive Permutation |
title_full_unstemmed | Deep Image Steganography Using Transformer and Recursive Permutation |
title_short | Deep Image Steganography Using Transformer and Recursive Permutation |
title_sort | deep image steganography using transformer and recursive permutation |
topic | image steganography data hiding deep learning transformer image encryption |
url | https://www.mdpi.com/1099-4300/24/7/878 |
work_keys_str_mv | AT zhiyiwang deepimagesteganographyusingtransformerandrecursivepermutation AT mingchengzhou deepimagesteganographyusingtransformerandrecursivepermutation AT bojiliu deepimagesteganographyusingtransformerandrecursivepermutation AT taiyongli deepimagesteganographyusingtransformerandrecursivepermutation |