Open Access iconOpen Access

ARTICLE

crossmark

A Steganography Model Data Protection Method Based on Scrambling Encryption

Xintao Duan1,*, Zhiqiang Shao1, Wenxin Wang1, En Zhang1, Dongli Yue1, Chuan Qin2, Haewoon Nam3

1 Henan Normal University, Xinxiang, 453007, China
2 University of Shanghai for Science and Technology, Shanghai, 200093, China
3 Hanyang University, Ansan, 15588, Korea

* Corresponding Author: Xintao Duan. Email: email

Computers, Materials & Continua 2022, 72(3), 5363-5375. https://doi.org/10.32604/cmc.2022.027807

Abstract

At present, the image steganography method based on CNN has achieved good results. The trained model and its parameters are of great value. Once leaked, the secret image will be exposed. To protect the security of steganographic network model parameters in the transmission process, an idea based on network model parameter scrambling is proposed in this paper. Firstly, the sender trains the steganography network and extraction network, encrypts the extraction network parameters with the key shared by the sender and the receiver, then sends the extraction network and parameters to the receiver through the public channel, and the receiver recovers them with the key after receiving, to achieve more secure secret communication. In this way, even if the network parameters are intercepted by a third party in the transmission process, the interceptor cannot extract the real secret information. In this paper, the classical Joseph algorithm is used as the scrambling algorithm to scramble the extracted network model parameters of the StegoPNet steganography network. The experimental results show that when the scrambled parameters are used for secret image extraction, a meaningless image independent of the secret image is extracted, it shows that this method can well protect the security of steganography network model. At the same time, this method also has good scalability, and can use a variety of different scrambling algorithms to scramble the parameters.

Keywords


Cite This Article

APA Style
Duan, X., Shao, Z., Wang, W., Zhang, E., Yue, D. et al. (2022). A steganography model data protection method based on scrambling encryption. Computers, Materials & Continua, 72(3), 5363-5375. https://doi.org/10.32604/cmc.2022.027807
Vancouver Style
Duan X, Shao Z, Wang W, Zhang E, Yue D, Qin C, et al. A steganography model data protection method based on scrambling encryption. Comput Mater Contin. 2022;72(3):5363-5375 https://doi.org/10.32604/cmc.2022.027807
IEEE Style
X. Duan et al., “A Steganography Model Data Protection Method Based on Scrambling Encryption,” Comput. Mater. Contin., vol. 72, no. 3, pp. 5363-5375, 2022. https://doi.org/10.32604/cmc.2022.027807



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1447

    View

  • 1129

    Download

  • 0

    Like

Share Link