Abstract
Existing deep learning-based image steganography schemes mostly neglect the latent space of images. These schemes merely adopt simple concatenation of image feature vectors, resulting in a low utilization rate of features, low steganographic image quality, and poor image robustness. This paper introduces the latent diffusion model into an image steganography scheme, namely SteDM. The SteDM firstly uses an encoder to transform the cover image and the secret image into the latent space, then employing a cross-attention mechanism to fuse them during the inverse diffusion process. Then we use a decoder to obtain a steganographic image containing secret image features. During the extraction process, the latent space-based diffusion model is similarly employed. Training loss is defined as a joint optimization of the autoencoder and diffusion model during the training process. Experimental results demonstrate that the SteDM outperforms existing steganography schemes in some aspects such as visual effects, security, and robustness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aghababaiyan, K.: Novel distortion free and histogram based data hiding scheme. IET Image Proc. 14(9), 1716–1725 (2020)
Guo, H., Xue, J.: The analysis of watermarking capacity of packing model and bits replacement model. In: 2016 12th World Congress on Intelligent Control and Automation (WCICA), pp. 2603–2607 (2016)
Baluja, S.: Hiding images in plain sight: deep steganography. In: Proceedings of Advances in Neural Information Processing Systems (NIPS), pp. 2069–2079 (2017)
Sohl-Dickstein, J., Weiss, E.: Deep unsupervised learning using nonequilibrium thermodynamics. In: International Conference on Machine Learning, pp. 2256–2265 (2015)
Rombach, R., Blattmann, A.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 10684–10695 (2022)
Rahim, R., Nadeem, S.: End-to-end trained CNN encoder-decoder networks for image steganography. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 1–6 (2018)
Bui, T., Agarwal, S., Yu, N., Collomosse, J.: RoSteALS: robust steganography using autoencoder latent space. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 933–942 (2023)
Kumar, A.: Encoder-Decoder architecture for image steganography using skip connections. Proc. Comput. Sci. 218(4), 1122–1131 (2023)
Duan, X.: DUIANet: a double layer U-Net image hiding method based on improved inception module and attention mechanism. J. Vis. Comm. Image Repres. 98, 104035 (2023)
Jing, J., Deng, X.: HiNet: deep image hiding by invertible network. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 4733–4742 (2021)
Liu, L.: Lossless Image steganography based on invertible neural networks. Entropy 24(12), 1762 (2022)
Zhang, L.: Joint adjustment image steganography networks. Sig. Proc. Image Comm. 118, 117022 (2023)
Feng, Y., Liu, Y., Wang, H., Dong, J.: Image Hide with invertible network and Swin Transformer. In: International Conference on Data Mining and Big Data, pp. 385–394 (2022)
Esser, P., Rombach, R.: Taming transformers for high-resolution image synthesis. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 12873–12883 (2021)
Ma, K.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inform. Foren. Secur. 8(3), 553–562 (2013)
Liu, D.: A fusion-domain color image watermarking based on HAAR transform and image correction. Exp. Syst. Appl. 170, 114540 (2021)
Acknowledgments
This research was funded by the NSFC under Grant 62462012, and Science and Technology Program of Hebei under Grant 22567606H.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, C., Shi, H., Li, Q., Zhao, D., Wang, F. (2025). SteDM: Efficient Image Steganography with Diffusion Models. In: Zhu, T., Li, J., Castiglione, A. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2024. Lecture Notes in Computer Science, vol 15256. Springer, Singapore. https://doi.org/10.1007/978-981-96-1551-3_1
Download citation
DOI: https://doi.org/10.1007/978-981-96-1551-3_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-1550-6
Online ISBN: 978-981-96-1551-3
eBook Packages: Computer ScienceComputer Science (R0)