Cargando…
Deep Image Steganography Using Transformer and Recursive Permutation
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9319918/ https://www.ncbi.nlm.nih.gov/pubmed/35885101 http://dx.doi.org/10.3390/e24070878 |
_version_ | 1784755667099189248 |
---|---|
author | Wang, Zhiyi Zhou, Mingcheng Liu, Boji Li, Taiyong |
author_facet | Wang, Zhiyi Zhou, Mingcheng Liu, Boji Li, Taiyong |
author_sort | Wang, Zhiyi |
collection | PubMed |
description | Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography. |
format | Online Article Text |
id | pubmed-9319918 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-93199182022-07-27 Deep Image Steganography Using Transformer and Recursive Permutation Wang, Zhiyi Zhou, Mingcheng Liu, Boji Li, Taiyong Entropy (Basel) Article Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography. MDPI 2022-06-26 /pmc/articles/PMC9319918/ /pubmed/35885101 http://dx.doi.org/10.3390/e24070878 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Wang, Zhiyi Zhou, Mingcheng Liu, Boji Li, Taiyong Deep Image Steganography Using Transformer and Recursive Permutation |
title | Deep Image Steganography Using Transformer and Recursive Permutation |
title_full | Deep Image Steganography Using Transformer and Recursive Permutation |
title_fullStr | Deep Image Steganography Using Transformer and Recursive Permutation |
title_full_unstemmed | Deep Image Steganography Using Transformer and Recursive Permutation |
title_short | Deep Image Steganography Using Transformer and Recursive Permutation |
title_sort | deep image steganography using transformer and recursive permutation |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9319918/ https://www.ncbi.nlm.nih.gov/pubmed/35885101 http://dx.doi.org/10.3390/e24070878 |
work_keys_str_mv | AT wangzhiyi deepimagesteganographyusingtransformerandrecursivepermutation AT zhoumingcheng deepimagesteganographyusingtransformerandrecursivepermutation AT liuboji deepimagesteganographyusingtransformerandrecursivepermutation AT litaiyong deepimagesteganographyusingtransformerandrecursivepermutation |