Joint Steganography and Encryption Techniques for Security Enhancement Using Deep Learning Models

Yi Hui Chen, Meng Yu Tsai, Shih Hsin Chen*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In today's rapidly expanding digital landscape, safeguarding sensitive data and privacy has become imperative. Traditional security measures and authentication technologies are facing increasing challenges, particularly steganography. Steganography involves concealing messages within various forms of media, such as images, audio, or video, to avoid detection by third parties. Unfortunately, conventional steganography techniques are vulnerable to advanced decryption methods, emphasizing the urgent need for more robust strategies. The proposed scheme introduces an innovative approach to conceal secrets through adversarial reinforcement and diffusion models. In this model, the secret image transforms noises, and an inverse model is designed to revert the noise to the original secret image. Experimental results demonstrate the feasibility and effectiveness of the proposed scheme.

Original languageEnglish
Title of host publicationIVSP 2024 - 2024 6th International Conference on Image, Video and Signal Processing
PublisherAssociation for Computing Machinery
Pages171-174
Number of pages4
ISBN (Electronic)9798400716829
DOIs
StatePublished - 14 03 2024
Event6th International Conference on Image, Video and Signal Processing, IVSP 2024 - Hybrid, Kawasaki, Japan
Duration: 14 03 202416 03 2024

Publication series

NameACM International Conference Proceeding Series

Conference

Conference6th International Conference on Image, Video and Signal Processing, IVSP 2024
Country/TerritoryJapan
CityHybrid, Kawasaki
Period14/03/2416/03/24

Bibliographical note

Publisher Copyright:
© 2024 ACM.

Keywords

  • adversarial reinforcement model
  • diffusion model
  • secret communication
  • steganography

Fingerprint

Dive into the research topics of 'Joint Steganography and Encryption Techniques for Security Enhancement Using Deep Learning Models'. Together they form a unique fingerprint.

Cite this