Cargando…

Deep Image Steganography Using Transformer and Recursive Permutation

Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Zhiyi, Zhou, Mingcheng, Liu, Boji, Li, Taiyong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9319918/
https://www.ncbi.nlm.nih.gov/pubmed/35885101
http://dx.doi.org/10.3390/e24070878
_version_ 1784755667099189248
author Wang, Zhiyi
Zhou, Mingcheng
Liu, Boji
Li, Taiyong
author_facet Wang, Zhiyi
Zhou, Mingcheng
Liu, Boji
Li, Taiyong
author_sort Wang, Zhiyi
collection PubMed
description Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography.
format Online
Article
Text
id pubmed-9319918
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-93199182022-07-27 Deep Image Steganography Using Transformer and Recursive Permutation Wang, Zhiyi Zhou, Mingcheng Liu, Boji Li, Taiyong Entropy (Basel) Article Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography. MDPI 2022-06-26 /pmc/articles/PMC9319918/ /pubmed/35885101 http://dx.doi.org/10.3390/e24070878 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wang, Zhiyi
Zhou, Mingcheng
Liu, Boji
Li, Taiyong
Deep Image Steganography Using Transformer and Recursive Permutation
title Deep Image Steganography Using Transformer and Recursive Permutation
title_full Deep Image Steganography Using Transformer and Recursive Permutation
title_fullStr Deep Image Steganography Using Transformer and Recursive Permutation
title_full_unstemmed Deep Image Steganography Using Transformer and Recursive Permutation
title_short Deep Image Steganography Using Transformer and Recursive Permutation
title_sort deep image steganography using transformer and recursive permutation
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9319918/
https://www.ncbi.nlm.nih.gov/pubmed/35885101
http://dx.doi.org/10.3390/e24070878
work_keys_str_mv AT wangzhiyi deepimagesteganographyusingtransformerandrecursivepermutation
AT zhoumingcheng deepimagesteganographyusingtransformerandrecursivepermutation
AT liuboji deepimagesteganographyusingtransformerandrecursivepermutation
AT litaiyong deepimagesteganographyusingtransformerandrecursivepermutation