Loading…
Robust steganographic method based on unconventional approach of neural networks
•The hidden message is inserted into the covermedium under the control of the graphical data of the covermedium itself.•The proposed method is robust enough to an attack and the hidden message hard to be falsified.•This method is a suitable candidate for parallel data processing and verification, i....
Saved in:
Published in: | Applied soft computing 2018-06, Vol.67, p.505-518 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | •The hidden message is inserted into the covermedium under the control of the graphical data of the covermedium itself.•The proposed method is robust enough to an attack and the hidden message hard to be falsified.•This method is a suitable candidate for parallel data processing and verification, i.e. computationally undemanding.•The STEGONN method can be purposefully used to reveal photomontage.•The STEGONN method can be used both as a strictly steganographic method and as a method of a digital signature.
The article deals with the issue of using an apparatus of neural networks in the area of steganography. A new method called STEGONN was proposed. The proposed method is robust enough to an attack and the hidden message hard to be falsified. The core of our work lies in a design and implementation of a method for the use of neural networks as a native coder and decoder of a secret message (digital watermark) with an emphasis on the minimum necessary level of image data modification – covermedium. A covermedium is not perceived as a passive cover of a secret message, but we make active use of cover medium data, primarily its data markers (image markers) to insert a secret message. The advantage over other steganographic methods is the fact that the method implicitly offer the possibility to detect corrupted parts of the stegomedium and inform the user about possible manipulation with the image. The characteristics of the proposed method have been experimentally verified and compared with commercially available steganographic applications. |
---|---|
ISSN: | 1568-4946 1872-9681 |
DOI: | 10.1016/j.asoc.2018.03.023 |