تعداد نشریات | 38 |
تعداد شمارهها | 1,240 |
تعداد مقالات | 8,994 |
تعداد مشاهده مقاله | 7,844,010 |
تعداد دریافت فایل اصل مقاله | 4,705,456 |
ارائه مدل جدید نهان کاوی هوشمند تصویر مبتنی بر شبکه عصبی MLP | ||
پدافند غیرعامل | ||
دوره 14، شماره 4 - شماره پیاپی 56، دی 1402، صفحه 21-32 اصل مقاله (1.38 M) | ||
نوع مقاله: مقاله پژوهشی | ||
نویسندگان | ||
سعید طلعتی1؛ رضا اصفهانی* 2 | ||
1دانشجوی دکتری دانشگاه علوم و فنون هوایی شهید ستاری، تهران، ایران | ||
2استادیار گروه مخابرات دانشگاه جامع امام حسین(ع)، تهران، ایران | ||
تاریخ دریافت: 11 فروردین 1402، تاریخ بازنگری: 27 خرداد 1402، تاریخ پذیرش: 06 تیر 1402 | ||
چکیده | ||
پیشرفت روزافزون مخابرات، انتقال امن را به یکی از مهمترین مسائل امروزه تبدیل کرده است. از آنجا که در تصویر ظرفیت پنهان شدن بالایی وجود دارد استفاده از پنهاننگاری تصویر نسبت به سایر روشهای پنهاننگاری بسیار مرسومتر است. در این مقاله از روش پنهاننگاری به روش تبدیل موجک استفادهشده که نتایج نشان میدهد این روش از مقاومت بالایی بهره میبرد. و برای تحلیل تصاویر پنهانشده به روش تبدیل موجک الگوریتمی با استفاده از ویژگیهای ماتریس (GLCM)و بردارهای همرخدادی (DCL) ارائهشده است. پس از بررسی این مقادیر در تصاویر اصلی و کاور، ویژگیهای متفاوت بین این تصاویر استخراج و برای آموزش شبکه عصبی چندلایه (MLP) استفاده میشوند. مرحله طبقهبندی با استفاده از لایههای این شبکه عصبی انجامشده و الگوریتم پیشنهادی برای پایگاه داده 200 تصویر استاندارد (Casia-Iris) تستشده است. دقت آشکارسازی %90 تصاویر پنهانشده در روش پیشنهادی برتری این روش نهانکاوی در برابر سایر روشها را نشان میدهد. | ||
کلیدواژهها | ||
پنهاننگاری؛ نهانکاوی؛ تبدیل موجک؛ ماتریس همرخدادی؛ شبکه عصبیMLP | ||
عنوان مقاله [English] | ||
Presenting a New Method of Image Steganalysis Based on MLP Neural Network | ||
نویسندگان [English] | ||
Saeed Talati1؛ ٍEsfahani Reza2 | ||
1Phd | ||
2Scientific Department of Communication | ||
چکیده [English] | ||
The ever-increasing development of telecommunications has made secure transmission one of the most important issues today. Since there is a high hiding capacity in the image, the use of image encryption is much more common than other methods of encryption. This article uses the covert imaging technique with the wavelet transform method, and the results show that this method has high resistance. For the analysis of hidden images, an algorithmic wavelet transform method using matrix features (GLCM) and co-occurrence vectors (DCL) is presented. After checking these values in the original and cover images, the different features between these images are extracted and used to train the multilayer neural network (MLP). The classification stage has been performed using the layers of this neural network and the proposed algorithm has been tested for a database of 200 standard images (Casia-Iris). The detection accuracy of 90% of the hidden images in the proposed method shows the superiority of this hidden mining method over other methods. | ||
کلیدواژهها [English] | ||
Steganography, Steganalysis, Wavelet Transform, Co-occurrence Matrix, MLP Neural Network | ||
مراجع | ||
[1] De Rosal Ignatius Moses Setiadi, “Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)” Signal Processing, vol. 206, May 2023. [2] Pratap Chandra Mandal, Imon Mukherjee, Goutam Paul, B. N. Chatter “Digital image steganography: A literature survey” Information Sciences vol. 609, pp. 1451-1488, September 2022. [3] B. F. Alatiyyat and N. C, ”Survey on Image Steganography Techniques” 2nd International Conference on Computing and Information Technology (ICCIT), Tabuk, Saudi Arabia, 2022, pp. 57-64, doi: 10.1109/ICCIT52419.2022.9711651. [4] Saeid Fazli, Maryam Zolfaghari-Nejad, “A New Steganalysis Method for Steganographic Images on DWT Domain” International Journal of Science and Engineering Investigations, March 2012, Vol. 1. [5]Trivikram Muralidharan, “The infinite race between steganography and steganalysis in images”, Signal Processing, vol. 201, December 2022. [6] S. Talati and P. Etezadifar, “Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals” Majlesi Journal of Telecommunication Devices, 9(1), pp. 35-46, 2020. [7] S. Talati, P. EtezadiFar, M. R. Hassani Ahangar, and M. Molazade, “Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP” Majlesi Journal of Telecommunication Devices, 12(1), pp. 7-15, 2023, doi: 10.30486/mjtd.2022.695928. [8] I. R. Farah, I. B. Ismail, and M. B. Ahmed, "A Watermarking System Using the Wavelet Technique for Satellite Images", Word Academy of Science, Engineering and Technology, vol. 17, Dec. 2006. ISSN 1307-6884. [9] C. Rafael Gonzalez, “Digital Image Processing using Matlab”, Pearson Prentice Hall, 2004. [10] Bo Yang and Beixing Deng, “Steganography in Gray Images Using Wavelet”, Department of Electronic Engineering, Tsinghua University, Beijing, China, 2005. [11] S. Ghanbari, “New Steganalysis Method using GlCM and Neural Network” International Journal of Computer Applications, March 2012. [12] S. Talati and M. R. Hassani Ahangar, “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, Majlesi Journal of Telecommunication Devices, 9(1), pp. 17-22, 2020. [13] Talati, S., and M. R. Hasani Ahangar. “Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector.” Electronic and Cyber Defense 9.2 (2021): 1-7. [14] M. Dalal and M. Juneja, “Steganalysis of DWT Based Steganography Technique for SD and HD Videos”. Wireless Pers Commun 128, pp. 2441–2452, 2023. [16] D. Lerch-Hostalot and D. Megías, “Unsupervised Steganalysis Based on Artificial Training Sets.” Engineering Applications of Artificial Intelligence, vol. 50, pp. 45-59 2016. https://doi.org/10.1016/j.engappai.2015.12.013. [17] H. Sajedi, “Steganalysis based on steganography pattern discovery,” Journal of Information Security and Applications, vol. 30, pp. 3–14, 2016. [18] S. Ghanbari, “New steganalysis method using glcm and neural network,” International Journal of Computer Applications; vol. 42(7), pp. 46–50, 2012. [20] Rostami V, Khiavi AS. “Particle Swarm Optimization based feature selection with novel fitness function for image steganalysis”. In: Artificial intelligence and robotics, 2016. p. 109–14. [21] (HUGO), “Steganalysis: breaking highly unde-tectable steganography,” Lecture notes in computer science (including subseries on lecture notes in artificial intelligence lecture notes in bioinfor- matics (LNCS)), vol. 6958, pp. 71–84, 2011. [22] O. Juarez-Sandoval, “Compact image steganalysis for LSB-matching steganography”. In: Proceedings-2017 5th international work- shop on biometrics and forensics, (IWBF 2017), pp. 1–6, 2017. [23] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, 2019. [24] S. Talati and M. R. Hassani Ahangar, “Combining Principal Component Analysis Methods and Self-Organized and Vector Learning Neural Networks for Radar Data”, Majlesi Journal of Telecommunication Devices, vol. 9(2), pp. 65-69, 2020. [25] M. R. Hassani Ahangar, S. Talati, A. Rahmati, and H. Heidari, “The Use of Electronic Warfare and Information Signaling in Network-based Warfare”. Majlesi Journal of Telecommunication Devices, vol. 9(2), pp. 93-97, 2020. [26] M. Aslinezhad, O. Mahmoudi, and S. Talati, “Blind Detection of Channel Parameters Using Combination of the Gaussian Elimination and Interleaving,” Majlesi Journal of Mechatronic Systems, vol. 9(4), pp. 59-67, 2020. [27] S. Talati and A. Amjadi, “Design and Simulation of a Novel Photonic Crystal Fiber with a Low Dispersion Coefficient in the Terahertz Band”. Majlesi Journal of Mechatronic Systems, vol. 9(2), pp. 23-28, 2020. [28] S. Talati, S. M. Alavi, and H. Akbarzade, “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it,” Majlesi Journal of Mechatronic Systems, vol. 10(2), 2021. [29] P. Etezadifar and S. Talati, “Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack,” Majlesi Journal of Telecommunication Devices, 10(2), pp. 55-59, 2021. [30] S. Talati, B. Ebadi, and H. Akbarzade “Determining of the fault location in distribution systems in presence of distributed generation resources using the original post phasors,” QUID 2017, pp. 1806-1812, Special Issue No.1- ISSN: 1692-343X, Medellin-Colombia. April 2017. [31] S.Talati and S. M. Alavi “Radar Systems Deception using Cross-eye Technique,” Majlesi Journal of Mechatronic Systems, vol. 9(3), pp. 19-21, 2020. [32] S.Talati, M. Akbari Thani, and M. R.Hassani Ahangar, “Detection of Radar Targets Using GMDH Deep Neural Network”, Radar Journal, vol. 8 (1), pp. 65-74, 2020. [33] S.Talati, R. Abdollahi, V. Soltaninia, and M. Ayat, “A New Emitter Localization Technique Using Airborne Direction Finder Sensor,” Majlesi Journal of Mechatronic Systems, vol. 10(4), pp. 5-16, 2021. [34] H. Akbarzade, S. M. Alavi, and S. Talati, “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it,” Majlesi Journal of Mechatronic Systems, vol. 10.2, pp. 17-20, 2021. [35] S. M. Hashemi, S. Barati, S. Talati, and H. Noori, “A genetic algorithm approach to optimal placement of switching and protective equipment on a distribution network.” J. Eng. Appl. Sci. vol. 11, pp. 1395-1400, 2016. [36] O. Sharifi-Tehrani and S. Talati, “PPU Adaptive LMS Algorithm, a Hardware-Efficient Approach; a Review on”, Majlesi Journal of Mechatronic Systems, vol. 6, no. 1, Jun. 2017. [37] S. Hashemi, & M. Abyari, Sh. Barati, S.Tahmasebi, and S. Talati, “A proposed method to controller parameter soft tuning as accommodation FTC after unknown input observer FDI,” Journal of Engineering and Applied Sciences, vol. 11, pp. 2818-2829, 2016. [38] S. Talati, et al., “Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder,” Majlesi Journal of Telecommunication Devices 10.3, pp. 119-123, 2021. [39] S. Talati, S. M. Ghazali, M. R. Hassani Ahangar, and S. M. Alavi, “Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder',” Majlesi Journal of Telecommunication Devices, vol. 10(3), pp. 119-123, 2021. doi: 10.52547/mjtd.10.3.119 [40] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, May 2019. [41] S. Talati and P. EtezadiFar, “Electronic attack on radar systems using noise interference,” Majlesi Journal of Mechatronic Systems 10.3, pp. 7-11, 2021. [42] S. M. Ghazali, J. Mazloum, and Y. Baleghid, “Modified binary salp swarm algorithm in EEG signal classification for epilepsy seizure detection,” Biomedical Signal Processing and Control, vol. 78, September 2022, 103858. [43] S. Talati, S. M.Ghazali, V. R. SoltaniNia, “Design and construct full invisible band metamaterial-based coating with layer-by-layer structure in the microwave range from 8 to 10 GHz,” Journal of Physics D: Applied Physics, vol. 56, no. 17, 2023. DOI 10.1088/1361-6463/acb8c7. [44] M. R. Hasani Ahangar and M. Mohammadi, “Evaluation of Efficient Factors on Quality of Service in Routing Protocols,” Passive Defense Quarterly, no. 3, vol. 3, 2012. | ||
آمار تعداد مشاهده مقاله: 1,335 تعداد دریافت فایل اصل مقاله: 976 |