Presenting a New Method of Image Steganalysis Based on MLP Neural Network
Journal Title: Passive Defense - Year 2023, Vol 14, Issue 4
Abstract
The ever-increasing development of telecommunications has made secure transmission one of the most important issues today. Since there is a high hiding capacity in the image, the use of image encryption is much more common than other methods of encryption. This article uses the covert imaging technique with the wavelet transform method, and the results show that this method has high resistance. For the analysis of hidden images, an algorithmic wavelet transform method using matrix features (GLCM) and co-occurrence vectors (DCL) is presented. After checking these values in the original and cover images, the different features between these images are extracted and used to train the multilayer neural network (MLP). The classification stage has been performed using the layers of this neural network and the proposed algorithm has been tested for a database of 200 standard images (Casia-Iris). The detection accuracy of 90% of the hidden images in the proposed method shows the superiority of this hidden mining method over other methods.
Authors and Affiliations
Saeed Talati, ٍEsfahani Reza
Studying the Adaptation of the Historic Cities to the Principles of Modern Passive-Defense in the Central Plateau of Iran
Human life has always been in danger throughout history, and the struggle for survival has always made man inevitably prepared. Threats are both made by man or are natural. The type of exposure to these threats has diffe...
Investigation and Analysis of Fiber Concrete Lining of Tunnel Opening Under the Effect of Thermal Load
Examining the thermal behavior of concrete lining of tunnels against thermal loads is of special practical importance. The purpose of this research is to investigate the behavior of fiber concrete lining tunnels with rec...
Evaluation of Urban Land Use with Emphasis on Passive Defense
Throughout history, territories have always been exposed to natural hazards (earthquakes, floods, etc.) and human hazards (war) and have caused a lot of human and financial losses. Therefore, the importance of passive de...
Improving Electrical Distribution Systems Resilience by their Optimal and Adaptable Operation in the Presence of Mobile Power Sources
Natural disasters and cyber-attacks pose many risks to the acceptable performance of power grids. In addition, the bitter experiences, gained from the recent Natural disasters in the country, lead to a greater focus on t...
Steganography Audio Based on Zero-Tree Wavelet Transform Algorithm
Audio steganography is very important, equally steganography in other media (image, video, etc.). In this paper is presented steganography of audio based on embedded zero-tree waveleten transform algorithm. Improving the...