TBU Publications
Repository of TBU Publications

Optimization of Artificial Neural Network Structure in the Case of Steganalysis

DSpace Repository

Show simple item record


dc.title Optimization of Artificial Neural Network Structure in the Case of Steganalysis en
dc.contributor.author Komínková Oplatková, Zuzana
dc.contributor.author Hološka, Jiří
dc.contributor.author Procházka, Michal
dc.contributor.author Šenkeřík, Roman
dc.contributor.author Jašek, Roman
dc.relation.ispartof Intelligent Systems Reference Library
dc.identifier.issn 1868-4394 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 9783642305030
dc.date.issued 2013
utb.relation.volume 38
dc.citation.spage 821
dc.citation.epage 843
dc.type article
dc.language.iso en
dc.publisher Springer Science+Business Media en
dc.identifier.doi 10.1007/978-3-642-30504-7_32
dc.relation.uri https://link.springer.com/chapter/10.1007/978-3-642-30504-7_32
dc.description.abstract This research introduces a method of steganalysis by means of neural networks and its structure optimization. The main aim is to explain the approach of revealing a hidden content in jpeg files by feed forward neural network with Levenberg-Marquardt training algorithm. This work is also concerned to description of data mining techniques for structure optimization of used neural network. The results showed almost 100% success of detection. © Springer-Verlag Berlin Heidelberg 2013. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1003510
utb.identifier.obdid 43870005
utb.identifier.scopus 2-s2.0-84885457085
utb.source j-scopus
dc.date.accessioned 2013-11-11T08:24:18Z
dc.date.available 2013-11-11T08:24:18Z
utb.contributor.internalauthor Komínková Oplatková, Zuzana
utb.contributor.internalauthor Hološka, Jiří
utb.contributor.internalauthor Procházka, Michal
utb.contributor.internalauthor Šenkeřík, Roman
utb.contributor.internalauthor Jašek, Roman
utb.fulltext.affiliation Zuzana Oplatkova, Jiri Holoska, Michal Prochazka, Roman Senkerik, and Roman Jasek Zuzana Oplatkova · Jiri Holoska · Michal Prochazka · Roman Senkerik · Roman Jasek Tomas Bata University in Zlín, Faculty of Applied Informatics, Nam. T.G. Masaryka 5555, 760 01 Zlín, Czech Republic e-mail: {oplatkova,holoska,mprochazka,senkerik,jasek}@fai.utb.cz
utb.fulltext.dates -
utb.fulltext.references [1] Cole, E., Krutz, D.R.: Hiding Sight, 321 p. Wiley Publishing, Inc., United States of America (2003) ISBN 0-471-44449-9 [2] Goldwasser, S., Bellare, M.: Lecture Notes on Cryptography, 283 p. MIT, Cambridge (2001), http://cseweb.ucsd.edu/~mihir/papers/gb.pdf [3] Hertz, J., Kogh, A., Palmer, R.G.: Introduction to the Theory of Neural Computation. Addison–Wesley (1991) [4] http://steghide.sourceforge.net/ [5] http://linux01.gwdg.de/~alatham/stego.html [6] http://www.outguess.org/detection.php [7] http://www.outguess.org/ [8] Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. CITI Technical Report 01-11 (2001) [9] Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy 1(3), 32–44 (2003) [10] Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Proceedings of Information Hiding - Third International Workshop. Springer (September 1999) [11] Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003), http://www.ws.binghamton.edu/fridrich/Research/f5.pdf (last accessed: December 24, 2003) [12] Fridrich, J., Goljan, M., Hogea, D.: New Methodology for Breaking Steganographic Techniques for JPEGs. Submitted to SPIE: Electronic Imaging 2003, Security and Watermarking of Multimedia Contents, Santa Clara, California (2003) [13] Fridrich, J.: Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004) [14] Farid, H., Lyu, S.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003) [15] Hempstalk, K.: Hiding Behind Corners: Using Edges in Images for Better Steganography. In: Proceedings of the Computing Women’s Congress, Hamilton, New Zealand, February 11-19 (2006) [16] http://www.cs.waikato.ac.nz/ml/weka/ [17] Gül, G., Dirik, A.E., Avcibas, I.: Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters 3 (March 2007) [18] Matousek, R.: Using AI Methods to Find a Non-Linear Regression Model with a Coupling Condition. Engineering Mechanics 17(5/6), 419–431 (2011) ISSN: 1802-1484 [19] Volna, E.: Learning and evolution in artificial neural networks: Comparison study. In: ANNIP 2008, Madeira, Portugal, pp. 10–17 (2008) ISBN: 978-989-8111-33-3 [20] Volna, E.: Design of neural network trees. In: Mendel 2008, pp. 978–980. Technical University of Brno (2008) ISBN: 978-80-214-3675-6 [21] Zelinka, I.: SOMA – Self Organizing Migrating Algorithm. In: Babu, B.V., Onwubolu, G. (eds.) New Optimization Techniques in Engineering, 33, ch. 7. Springer (2004) [22] Price, K.: An Introduction to Differential Evolution. In: Corne, D., Dorigo, M., Glover, F. (eds.) New Ideas in Optimization, pp. 79–108. McGraw-Hill, London [23] Matousek, R.: HC12: The Principle of CUDA Implementation. In: MENDEL 2010. Mendel Journal series, pp. 303–308. VUT, Brno (2010) ISBN: 978-80-214-4120-0, ISSN: 1803-3814 [24] Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn., pp. 385–392. MIT Press and McGraw-Hill, Cambridge (2001) ISBN 0-262-03293-7. Section 16.3 [25] ImageMagick, http://www.imagemagick.org/script/index.php [26] Obayashi, S., Jeong, S., Chiba, K.: Multiobjective Design Exploration for Aerodynamic Configurations. American Institute of Aeronautics and Astronautics (August 22, 2007) [27] Mosavi, A.: Multiple Criteria Decision-Making Preprocessing Using Data Mining Tools. IJCSI International Journal of Computer Science Issues 7(2(1)) (March 2010) ISSN (Online): 1694-0784 [28] Witten, I.H., Frank, E., Hall, M.A.: Datamining – Practical Machine Learning Tools and Techniques. Morgan Kaufmann (2011) ISBN: 978-0-12-374856-0 [29] Software OutGuess, http://www.outguess.org [30] Defending Against Statistical Steganalysis Niels Provos. In: 10th USENIX Security Symposium, Washington, DC (August 2001) [31] Hetzl S.: Steghide (1) - Linux man page, http://steghide.sourceforge.net/documentation/manpage.php (cit. May 21, 2008) [32] Westfeld, A.: High Capacity Despite Better Steganalysis (F5-—A Steganographic Algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
utb.fulltext.sponsorship This work was supported by the grants: internal grant agency of Tomas Bata University in Zlin IGA/44/FAI/10/D, grant NO. MSM 7088352101 of the Ministry of Education of the Czech Republic, grant of Grant Agency of Czech Republic GACR 102/09/1680 and by the European Regional Development Fund under the Project CEBIATech No. CZ.1.05/2.1.00/03.0089.
utb.fulltext.projects IGA/44/FAI/10/D
utb.fulltext.projects MSM 7088352101
utb.fulltext.projects GACR 102/09/1680
utb.fulltext.projects CZ.1.05/2.1.00/03.0089
Find Full text

Files in this item

Show simple item record