IDEAS home Printed from https://ideas.repec.org/h/spr/sprchp/978-3-031-83157-7_18.html
   My bibliography  Save this book chapter

Steganographic Capacity of Transformer Models

In: Machine Learning, Deep Learning and AI for Cybersecurity

Author

Listed:
  • Lei Zhang

    (San Jose State University)

  • Dong Li

    (Shanghai AI Laboratory)

  • Olha Jurečková

    (Czech Technical University in Prague)

  • Mark Stamp

    (San Jose State University)

Abstract

As machine learning and deep learning models become ubiquitous, it is inevitable that there will be attempts to exploit such models in various attack scenarios. For example, in a steganographic-based attack, information could be hidden in a learning model, which might then be used to distribute malware, or for other malicious purposes. In this research, our focus is on the steganographic capacity a Transformer model, but for comparison we also consider a Multilayer Perceptron (MLP) and Convolutional Neural Network (CNN). All three models are trained on a challenging malware classification problem, and for each models, we determine the number of low-order bits of the trained parameters that can be altered without significantly affecting the classification accuracy. We find that the steganographic capacity of the learning models tested is surprisingly high, and that in each case, there is a clear threshold after which model performance rapidly degrades. Due to its large number of weights, we find that the Transformer model has a steganographic capacity that is orders of magnitude larger than that of either the MLP or CNN models.

Suggested Citation

  • Lei Zhang & Dong Li & Olha Jurečková & Mark Stamp, 2025. "Steganographic Capacity of Transformer Models," Springer Books, in: Mark Stamp & Martin Jureček (ed.), Machine Learning, Deep Learning and AI for Cybersecurity, pages 507-526, Springer.
  • Handle: RePEc:spr:sprchp:978-3-031-83157-7_18
    DOI: 10.1007/978-3-031-83157-7_18
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a
    for a similarly titled item that would be available.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:sprchp:978-3-031-83157-7_18. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.