List of Journals    /    Call For Papers    /    Subscriptions    /    Login
 
 
 
 
 SEARCH
By Author By Title
 
 
ABOUT CSC
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 CALL FOR PAPERS
 Call For Papers CFP
 Special Issue CFP
AUTHOR GUIDELINES
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 FOR REVIEWERS
 Reviewer Guidelines
 FOR EDITORIAL
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 CSC LIBRARY
 Browse CSC Library
 Open Access Policy
  SERVICES
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 SUBSCRIPTIONS
 Subscriptions
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Librarians
 Subscriptions Agents
 Order Form
 DOWNLOADS
 
 
 
 
Implementation of Radial Basis Function Neural Network for Image Steganalysis
Full text
 PDF(306.2KB)
Source 
International Journal of Computer Science and Security (IJCSS)
Table of Contents
Download Complete Issue    PDF(1.35MB)
Volume:  2    Issue:  1
Pages:  1-86
Publication Date:   February 2008
ISSN (Online): 1985-1553
Pages 
12 - 22
Author(s)  
 
Published Date   
30-02-2008 
Publisher 
CSC Journals, Kuala Lumpur, Malaysia
ADDITIONAL INFORMATION
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
 
KEYWORDS:   Steganography, carrier image, covert image 
 
 
This Manuscript is indexed in the following databases/websites:-
1. Directory of Open Access Journals (DOAJ)
2. OpenJ-Gate
3. Docstoc
4. Scribd
5. PDFCAST
6. Google Scholar
7. WorldCat
8. ScientificCommons
9. Academic Journals Database
10. Libsearch
11. refSeek
12. ResearchGATE
13. Bielefeld Academic Search Engine (BASE)
14. iSEEK
15. Socol@r
16. slideshare
17. Chinese Directory Of Open Access
 
 
Steganographic tools and techniques are becoming more potential and widespread. Illegal use of steganography poses serious challenges to the law enforcement agencies. Limited work has been carried out on supervised steganalysis using neural network as a classifier. We present a combined method of identifying the presence of covert information in a carrier image using fisher’s linear discriminant (FLD) function followed by the radial basis function (RBF). Experiments show promising results when compared to the existing supervised steganalysis methods, but arranging the retrieved information is still a challenging problem. 
 
 
 
1 R.A.Fisher, “The Use of Multiple Measurements in Taxonomic Problems,” Ann. of Eugenics, vol. 7, pp. 178 – 188, 1936.
2 J.W.Sammon, “An Optimal Discriminant Plane,” IEEE Trans. On Comp, vol. 19, no. 9, pp. 826 – 829, 1970.
3 D.H.Foley, “Consideration of Sample and Feature Size,” IEEE Trans., on Info. Theory, vol.18, no. 5, pp. 626 – 681, September 1972.
4 J.W Sammon., “Interactive Pattern Analysis and Classification”, IEEE Trans. on Comp., vol. 19, no. 7, pp. 594–616, 1970.
5 J.Kittler, P.C.Young P.C, “Approach to Feature Selection Based on the Karhunen-Loeve Expansion,” Pattern Recognition, Vol. 5, No 5, pp. 335 – 352, 1973.
6 H.Friedman, J.W Turkey, “A Projection Pursuit Algorithm for Exploratory Data Analysis,” IEEE Trans. on Comp., vol. 23, no. 9, pp. 881–890, 1974.
7 D.H Foley, J.E.Sammon, “An Optimal Set of Discriminant Vectors,” IEEE Trans. on Comp., vol. 24, no. 3, pp. 281 – 289, 1975.
8 J. Fehlauer., B.A Eisenstein., “A Declustering Criterion for Feature Extraction in Pattern Recognition, IEEE Trans. on Comp., vol. 27, no. 3, pp. 261 – 266, 1978.
9 E.Gelsema, R.Eden, “Mapping Algorithms in ISPAHAN,” pattern Recognition, vol. 12, no. 3, pp.127 – 136, 1980.
10 V.C.Klema, A.J.Laub, “The Singular Value Decomposition: Its Computation and Some Applications,” IEEE Trans. on Automatic Control, vol. 25, no.2, pp. 164 – 176, 1980.
11 D.F.Mix, R.A.Jones, “A Dimensionality Reduction Techniques Based on a Least Squared Error Criterion, IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 4, no. 1, pp. 537 – 544, 1982.
12 Simmons, G. J., “The Prisoners’ Problem and the Subliminal Channel,” CRYPTO83, Advances in Cryptology, August 22-24, pp. 51 – 67, 1984.
13 B.J.Sullivan, B.Liu, “On the Use of Singular Value Decomposition and Decimation in Discrete- Time Band-Limited Signal Extrapolation,” IEEE Trans. on Acoustics, Speech and Signal Processing, vol. 32, no. 6, pp. 1201 – 1212, 1984.
14 W.Siedlecki, K.Siedlecka, J. Skalansky, “An Overview of Mapping Techniques for Exploratory Data Analysis,” Pattern Recognition, vol. 21, no. 5, pp. 411 – 429, 1988.
15 Z.Q.Hong, Y.J.Yang, “Optimal Discriminate Plane for a Small Number of Samples and Design Method of Classifier on the Plane,” pattern recognition, vol. 24, pp. 317 – 324, 1991.
16 W.Siedlecki, K.Siedlecka., J.Skalancky, “Experiments on Mapping Techniques for Exploratory Pattern Analysis,” Pattern Recognition, vol. 21, no.5, pp. 431 – 438, 1988.
17 P.Gallinari, S. Thiria., F.Badran., F Fogelman-Soulie F., “On The Relations Between Discriminant Analysis and Multilayer Perceptrons,” Neural Networks, vol. 4, no.3, pp.349 – 360, 1991.
18 K.Liu, Y.Q.Cheng, J.Y.Yang J.Y., “A Generalized Optimal Set of Discriminant Vectors,” Pattern Recognition, vol. 25, no. 7, pp. 731 – 739, 1992.
19 Y.Q.Cheng, Y.M.Zhuang, J.Y.Yang, “Optimal Fisher Discriminant Analysis Using the Rank Decomposition,” Pattern Recognition, vol. 25, no. 1, pp. 101 – 111, 1992.
20 R. J. Anderson and F.A.P Petitcolas, “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, vol. 16 no. 4, pp. 474 -484, 1998.
21 N. Provos and P. Honeyman, “Detecting steganographic content on the internet,” CITI Technical Report 01-11, August, 2001.
22 N.Johnson and J. Sklansky, “Exploring steganography: seeing the unseen,” IEEE Computer, pp. 26 – 34, 1998.
23 A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems,” Third Information Hiding Workshop, September. 1999.
24 J. Fridrich, R. Du, and M. Long, “Steganalysis of lsb encoding in color images,” IEEE ICME, vol. 3, pp. 1279 – 1282, March 2000.
25 R. Chandramouli, “A mathematical framework for active steganalysis,” ACM Multimedia Systems, vol, 9, no.3, pp.303 – 311, September 2003.
26 Meng Joo Er,.Shiqian Wu, Juwei Lu and Hock Lye Toh, “Face Recognition with Radial Basis Function(RBF) Neural Networks,” IEEE Trans. on Neural Networks, vol. 13, no.3, pp. 697 – 910, May 2002.
27 S. Lyu and H. Farid, “Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines,” SPIE Symposium on Electronic Imaging, San Jose, CA, 2004.
28 J. Harmsen and W. Pearlman, “Steganalysis of additive noise modelable information hiding,” Proc. SPIE Electronic Imaging, 2003.
29 Ryan Benton and Henry Chu, “Soft Computing Approach to Steganalysis of LSB Embedding in Digital Images,” Third International Conference on Information Technology: Research and Education, ITRE, pp. 105 – 109, June 2005.
30 Shi, Y.Q, Guorong Xuan, Zou, D, Jianjiong Gao, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chen, W, Chen C, “Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network,” IEEE International Conference on Multimedia and Expo, ICME , July 2005.
31 Shalin Trivedi and R. Chandramouli, “Secret Key Estimation in Sequential Steganography,” IEEE Trans. on Signal Proc., vol. 53, no. 2, pp. 746 - 757, February 2005.
32 Ming Jiang, Wong, E.K. Memon, N. Xiaolin Wu, “Steganalysis of halftone images,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP, vol. 2, pp. 793 – 796, March 2005.
33 Liang Sun, Chong-Zhao Han, Ning Dai, Jian-Jing Shen, “Feature Selection Based on Bhattacharyya Distance: A Generalized Rough Set Method,” Sixth World Congress on Intelligent Control and Automation, WCICA, vol. 2, pp. 101-105, June, 2006.
34 H. Farid, “Detecting hidden messages using higher-order statistical models,” Proc. IEEE Int. Conf. Image Processing, New York, pp.905- 908, Sep. 2002.
35 Zugen Liu, Xuezeng Pan, Lie Shi, Jimin Wang, Lingdi Ping, “Effective steganalysis based on statistical moments of differential characteristic function,” International Conference on Computational Intelligence and Security, vol. 2, pp. 1195 – 1198, November 2006.
 
 
 
1 S. R. Baragada, S. Ramakrishna, M. S. Rao, S. Purushothaman. "Polynomial Discriminant Radial Basis Function for Steganalysis". IJCSNS International Journal of Computer Science and Network Security, 9(2):209-218, 2009
2 S. Mansor, R. bin Din, A. Samsudin. "Analysis of Natural Language Steganography". International Journal of Computer Science and Security (IJCSS), 3(2):62-153, 2009
3 S. R. Baragada, S. Ramakrishna, M. S. Rao and S. Purushothaman, “Polynomial Discriminant Radial Basis Function for Steganalysis”, International Journal of Computer Science and Network Security (IJCSNS), 9 (2), pp. 209-218, 2009.
4 S. R. Baragada, S. Ramakrishna, M. S. Rao and S. Purushothaman, “Polynomial Vector Discriminant Back Propagation Algorithm Neural Network for Steganalysis”, International Journal of Computer Science and Network Security (IJCSNS), 10(5), 2010.
5 S. Mansor and R. B. Din, A. Samsudin, “Analysis of Natural Language Steganography”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 113 – 125, 2009.
6 R. Kalaivani and P. Thangaraj, “An Effective Technique to Identify River’s Stage through Satellite Images by Means of RBFNN”, Computer Science Computational Intelligence and Information Technology Communications in Computer and Information Science, 250( 3), pp. 822-825, 2001.
7 M.K. Bhowmik, D. Bhattacharjee, M. Nasipuri, D. K. Basu and M. Kundu, “A Parallel Framework for Multilayer Perceptron for Human Face Recognition”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 491 – 507, 2010.
 
 
 
1 MENDELEY
 
2 Indian National Centre for Ocean Information Services
 
 
 
Sambasiva Rao Baragada : Colleagues
S. Ramakrishna : Colleagues
M.S. Rao, S. Purushothaman : Colleagues  
 
 
 
  Untitled Document
 
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
 
  
 
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.