Deep Image Steganography Using Transformer and Recursive Permutation

Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted...

Full description

Bibliographic Details
Main Authors: Zhiyi Wang, Mingcheng Zhou, Boji Liu, Taiyong Li
Format: Article
Language:English
Published: MDPI AG 2022-06-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/24/7/878
_version_ 1797406582450946048
author Zhiyi Wang
Mingcheng Zhou
Boji Liu
Taiyong Li
author_facet Zhiyi Wang
Mingcheng Zhou
Boji Liu
Taiyong Li
author_sort Zhiyi Wang
collection DOAJ
description Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography.
first_indexed 2024-03-09T03:27:28Z
format Article
id doaj.art-81b00d02901c427da58ad6753777ce50
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-03-09T03:27:28Z
publishDate 2022-06-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-81b00d02901c427da58ad6753777ce502023-12-03T15:00:04ZengMDPI AGEntropy1099-43002022-06-0124787810.3390/e24070878Deep Image Steganography Using Transformer and Recursive PermutationZhiyi Wang0Mingcheng Zhou1Boji Liu2Taiyong Li3School of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, ChinaSchool of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, ChinaSchool of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, ChinaSchool of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, ChinaImage steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography.https://www.mdpi.com/1099-4300/24/7/878image steganographydata hidingdeep learningtransformerimage encryption
spellingShingle Zhiyi Wang
Mingcheng Zhou
Boji Liu
Taiyong Li
Deep Image Steganography Using Transformer and Recursive Permutation
Entropy
image steganography
data hiding
deep learning
transformer
image encryption
title Deep Image Steganography Using Transformer and Recursive Permutation
title_full Deep Image Steganography Using Transformer and Recursive Permutation
title_fullStr Deep Image Steganography Using Transformer and Recursive Permutation
title_full_unstemmed Deep Image Steganography Using Transformer and Recursive Permutation
title_short Deep Image Steganography Using Transformer and Recursive Permutation
title_sort deep image steganography using transformer and recursive permutation
topic image steganography
data hiding
deep learning
transformer
image encryption
url https://www.mdpi.com/1099-4300/24/7/878
work_keys_str_mv AT zhiyiwang deepimagesteganographyusingtransformerandrecursivepermutation
AT mingchengzhou deepimagesteganographyusingtransformerandrecursivepermutation
AT bojiliu deepimagesteganographyusingtransformerandrecursivepermutation
AT taiyongli deepimagesteganographyusingtransformerandrecursivepermutation