Open Access Open Access  Restricted Access Subscription or Fee Access

A Scheme Based on Convolutional Neural Network and Fuzzy Logic to Identify the Location of Possible Secret Data in a Digital Image


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irea.v12i1.23475

Abstract


Recently, there have been various proposals for improving the precision of steganalysis, which is the art of detecting the presence of a steganographic payload. In addition, a few existing research works focus on identifying the specific location of concealed data by a contemporary adaptive steganographic algorithm. This work presents a new algorithm that employs fuzzy logic and a Convolutional Neural Network (CNN) to reveal any hidden information within the content of a digital image. The proposed model comprises two primary components: a Mamdani-based inference module to generate the stego image’s fuzzy correlations and a CNN module that classifies the image's features to locate the locations of the steganographic payload. The method uses recall rate, precision rate, and accuracy for evaluation metrics, demonstrating superior performance compared to the existing models. The experimental results identify the proposed approach's outperformance over the existing approaches. Notably, locating the payload hidden under WOW achieves an accuracy superior to 90% with a payload of 0.5 bpp, which indicates that it can accurately identify almost all the modified pixels.
Copyright © 2024 Praise Worthy Prize - All rights reserved.

Keywords


Convolutional Neural Network; Cybersecurity; Information Security; National Security; Steganalysis

Full Text:

PDF


References


N. J. De La Croix, C. C. Islamy, and T. Ahmad, "Secret Message Protection using Fuzzy Logic and Difference Expansion in Digital Images," in Proceedings of the 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development, NIGERCON 2022, Institute of Electrical and Electronics Engineers Inc., 2022.
https://doi.org/10.1109/NIGERCON54645.2022.9803151

A. J. Ilham, T. Ahmad, N. J. D. La Croix, P. Maniriho, and M. Ntahobari, "Data Hiding Scheme Based on Quad General Difference Expansion Cluster," Int J Adv Sci Eng Inf Technol, vol. 12, no. 6, p. 2288, Nov. 2022.
https://doi.org/10.18517/ijaseit.12.6.16002

I. Théophile, N. J. De La Croix, and T. Ahmad, "Fuzzy Logic-based Steganographic Scheme for high Payload Capacity with high Imperceptibility," in 2023 11th International Symposium on Digital Forensics and Security (ISDFS), IEEE, May 2023, pp. 1-6.
https://doi.org/10.1109/ISDFS58141.2023.10131727

N. J. De La Croix, C. C. Islamy, and T. Ahmad, "Reversible Data Hiding using Pixel-Value-Ordering and Difference Expansion in Digital Images," in Proceeding - IEEE International Conference on Communication, Networks and Satellite, COMNETSAT 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 33-38.
https://doi.org/10.1109/COMNETSAT56033.2022.9994516

I. B. Prayogi, T. Ahmad, N. J. De La Croix, and P. Maniriho, "Hiding Messages in Audio using Modulus Operation and Simple Partition," in Proceedings of 2021 13th International Conference on Information and Communication Technology and System, ICTS 2021, Institute of Electrical and Electronics Engineers Inc., 2021, pp. 51-55.
https://doi.org/10.1109/ICTS52701.2021.9609028

T. Denemark and J. Fridrich, "Steganalysis Features for Content-Adaptive JPEG Steganography," 2016.
https://doi.org/10.1109/TIFS.2016.2555281

M. Boroumand, M. Chen, and J. Fridrich, "Deep residual network for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181-1193, May 2019.
https://doi.org/10.1109/TIFS.2018.2871749

X. Han and T. Zhang, "Spatial Steganalysis Based on Non-Local Block and Multi-Channel Convolutional Networks," IEEE Access, vol. 10, pp. 87241-87253, 2022.
https://doi.org/10.1109/ACCESS.2022.3199351

I. Castillo Camacho and K. Wang, "Convolutional neural network initialization approaches for image manipulation detection," Digital Signal Processing: A Review Journal, vol. 122, Apr. 2022.
https://doi.org/10.1016/j.dsp.2021.103376

G. Xu, "Deep convolutional neural network to detect J-UNIWARD," in IH and MMSec 2017 - Proceedings of the 2017 ACM Workshop on Information Hiding and Multimedia Security, Association for Computing Machinery, Inc, Jun. 2017, pp. 67-73.
https://doi.org/10.1145/3082031.3083236

J. D. L. C. Ntivuguruzwa and T. Ahmad, "A convolutional neural network to detect possible hidden data in spatial domain images," Cybersecurity, vol. 6, no. 1, p. 23, Sep. 2023.
https://doi.org/10.1186/s42400-023-00156-x

T. S. Reinel et al., "GBRAS-Net: A Convolutional Neural Network Architecture for Spatial Image Steganalysis," IEEE Access, vol. 9, pp. 14340-14350, 2021.
https://doi.org/10.1109/ACCESS.2021.3052494

T. Filler and J. Fridrich, "Gibbs Construction in Steganography," IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 705-720, Dec. 2010.
https://doi.org/10.1109/TIFS.2010.2077629

Weiqi Luo, Fangjun Huang, and Jiwu Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, Jun. 2010.
https://doi.org/10.1109/TIFS.2010.2041812

J. D. L. C. Ntivuguruzwa, A. Tohari, and M. I. Royyana, "Pixel-block-based Steganalysis Method for Hidden Data Location in Digital Images," International Journal of Intelligent Engineering and Systems, vol. 16, no. 6, pp. 375-385, Dec. 2023.
https://doi.org/10.22266/ijies2023.1231.31

T. Filler, J. Judas, and J. Fridrich, "Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935, Sep. 2011.
https://doi.org/10.1109/TIFS.2011.2134094

T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by a subtractive pixel adjacency matrix," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
https://doi.org/10.1109/TIFS.2010.2045842

T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, "Selection-channel-aware rich model for Steganalysis of digital images," in 2014 IEEE International Workshop on Information Forensics and Security (WIFS), IEEE, Dec. 2014, pp. 48-53.
https://doi.org/10.1109/WIFS.2014.7084302

J. Fridrich and J. Kodovsky, "Rich Models for Steganalysis of Digital Images," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
https://doi.org/10.1109/TIFS.2012.2190402

V. Holub and J. Fridrich, "Phase-Aware Projection Model for Steganalysis of JPEG Images." [Online].
Available: http://dde.binghamton.edu

W. Tang, S. Tan, B. Li, and J. Huang, "Automatic Steganographic Distortion Learning Using a Generative Adversarial Network," IEEE Signal Process Lett, vol. 24, no. 10, pp. 1547-1551, Oct. 2017.
https://doi.org/10.1109/LSP.2017.2745572

Y. Sun, H. Zhang, T. Zhang, and R. Wang, "Deep neural networks for efficient steganographic payload location," in Journal of Real-Time Image Processing, Springer Verlag, Jun. 2019, pp. 635-647.
https://doi.org/10.1007/s11554-019-00849-y

T. Qiao, X. Luo, B. Pan, Y. Chen, and X. Wu, "Toward Steganographic Payload Location via Neighboring Weight Algorithm," Security and Communication Networks, vol. 2022, 2022.
https://doi.org/10.1155/2022/1400708

B. Pan, T. Qiao, J. Li, Y. Chen, and C. Yang, "Novel Hidden Bit Location Method towards JPEG Steganography," Security and Communication Networks, vol. 2022, 2022.
https://doi.org/10.1155/2022/8230263

J. Wang, C. Yang, M. Zhu, X. Song, Y. Liu, and Y. Lian, "JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image," EURASIP J Image Video Process, vol. 2021, no. 1, Dec. 2021.
https://doi.org/10.1186/s13640-020-00542-2

Q. Liu, T. Qiao, M. Xu, and N. Zheng, "Fuzzy Localization of Steganographic Flipped Bits via Modification Map," IEEE Access, vol. 7, pp. 74157-74167, 2019.
https://doi.org/10.1109/ACCESS.2019.2920304

C. Yang, F. Liu, S. Ge, J. Lu, and J. Huang, "Locating secret messages based on quantitative steganalysis," Mathematical Biosciences and Engineering, vol. 16, no. 5, pp. 4908-4922, 2019.
https://doi.org/10.3934/mbe.2019247

W. Tang, H. Li, W. Luo, and J. Huang, "Adaptive Steganalysis Based on Embedding Probabilities of Pixels," IEEE Transactions on Information Forensics and Security, pp. 1-1, 2015.
https://doi.org/10.1109/TIFS.2015.2507159

W. Tang, H. Li, W. Luo, and J. Huang, "Adaptive steganalysis against WOW embedding algorithm," in IH and MMSec 2014 - Proceedings of the 2014 ACM Information Hiding and Multimedia Security Workshop, Association for Computing Machinery, Jun. 2014, pp. 91-96.
https://doi.org/10.1145/2600918.2600935

T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, "Selection-Channel-Aware Rich Model for Steganalysis of Digital Images."

J. Yang, K. Liu, X. Kang, E. K. Wong, and Y.-Q. Shi, "Spatial Image Steganography Based on Generative Adversarial Network," Apr. 2018, [Online].
Available: http://arxiv.org/abs/1804.07939

N. J. De La Croix and T. Ahmad, "Toward secret data location via fuzzy logic and convolutional neural network," Egyptian Informatics Journal, vol. 24, no. 3, p. 100385, Sep. 2023.
https://doi.org/10.1016/j.eij.2023.05.010

Andrew D. Ker, Ivans Lubenko, "Feature reduction and payload location with WAM steganalysis," Proc. SPIE 7254, Media Forensics and Security, 72540A (4 February 2009).
https://doi.org/10.1117/12.805910

M. Yedroudj, M. Chaumont, and F. Comby, "How to augment a small learning set for improving the performances of a CNN-based steganalyzer?," Jan. 2018, [Online].
Available: http://arxiv.org/abs/1801.04076

S. Huang, M. Zhang, Y. Ke, X. Bi, and Y. Kong, "Image steganalysis based on attention augmented convolution," Multimed Tools Appl, vol. 81, no. 14, pp. 19471-19490, Jun. 2022.
https://doi.org/10.1007/s11042-021-11862-4

Y. Qian, J. Dong, W. Wang, and T. Tan, "Learning and transferring representations for image steganalysis using convolutional neural network," in Proceedings - International Conference on Image Processing, ICIP, IEEE Computer Society, Aug. 2016, pp. 2752-2756.
https://doi.org/10.1109/ICIP.2016.7532860

H. Yang, H. He, W. Zhang, and X. Cao, "FedSteg: A Federated Transfer Learning Framework for Secure Image Steganalysis," IEEE Trans Netw Sci Eng, vol. 8, no. 2, pp. 1084-1094, Apr. 2021.
https://doi.org/10.1109/TNSE.2020.2996612

F. Yalcinkaya and A. Erbas, "Convolutional neural network and fuzzy logic-based hybrid melanoma diagnosis system," Elektronika ir Elektrotechnika, vol. 27, no. 2, pp. 69-77, 2021.
https://doi.org/10.5755/j02.eie.28843

N. J. de La Croix and T. Ahmad, "Toward Hidden Data Detection via Local Features Optimization in Spatial Domain Images," in 2023 Conference on Information Communications Technology and Society (ICTAS), IEEE, Mar. 2023, pp. 1-6.
https://doi.org/10.1109/ICTAS56421.2023.10082736

R. Zhang, F. Zhu, J. Liu, and G. Liu, "Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1138-1150, 2020.
https://doi.org/10.1109/TIFS.2019.2936913

P. Bas, T. Filler, and T. Pevný, "Break Our Steganographic System": The Ins and Outs of Organizing BOSS," 2011, pp. 59-70.
https://doi.org/10.1007/978-3-642-24178-9_5

T. Pevný, J. Fridrich, and A. D. Ker, "From blind to quantitative steganalysis," in IEEE Transactions on Information Forensics and Security, Apr. 2012, pp. 445-454.
https://doi.org/10.1109/TIFS.2011.2175918

D. Hu, Q. Shen, S. Zhou, X. Liu, Y. Fan, and L. Wang, "Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks," Security and Communication Networks, vol. 2017, 2017.
https://doi.org/10.1155/2017/2314860


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize