Skip to main content
Erschienen in: Neural Computing and Applications 7/2012

01.10.2012 | Original Article

Improved contourlet-based steganalysis using binary particle swarm optimization and radial basis neural networks

verfasst von: Mansour Sheikhan, Mansoureh Pezhmanpour, M. Shahram Moin

Erschienen in: Neural Computing and Applications | Ausgabe 7/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Steganography is the science of hiding information in a media such as video, image or audio files. On the other hand, the aim of steganalysis is to detect the presence of embedded data in a given media. In this paper, a steganalysis method is presented for the colored joint photographic experts group images in which the statistical moments of contourlet transform coefficients are used as the features. In this way, binary particle swarm optimization algorithm is also employed as a closed-loop feature selection method to select the efficient features in tandem with improvement of the detection rate. Nonlinear support vector machine and two variants of radial basis neural networks, i.e., radial basis function and probabilistic neural network, are used as the classification tools and their performance is compared in detecting the stego and clean images. Experimental results show that even for low embedding rates, the detection accuracy of the proposed method is more than 80% along with 30% reduction in the size of feature set.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE (special issue on protection of multimedia content) 87:1062–1078 Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE (special issue on protection of multimedia content) 87:1062–1078
2.
Zurück zum Zitat Sharp T (2001) An implementation of key-based digital signal steganography. In: The proceedings of the 4th international workshop on information hiding, vol 2137 of Springer LNCS, pp 13–26 Sharp T (2001) An implementation of key-based digital signal steganography. In: The proceedings of the 4th international workshop on information hiding, vol 2137 of Springer LNCS, pp 13–26
3.
Zurück zum Zitat Zhang T, Li W, Zhang Y, Zheng E, Ping X (2010) Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. Inf Sci 180:4685–4694CrossRef Zhang T, Li W, Zhang Y, Zheng E, Ping X (2010) Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. Inf Sci 180:4685–4694CrossRef
4.
Zurück zum Zitat Westfeld A (2001) F5- a steganographic algorithm: high capacity despite better steganalysis. In: The proceedings of the 4th international workshop on information hiding, vol 2137 of Springer LNCS, pp 289–302 Westfeld A (2001) F5- a steganographic algorithm: high capacity despite better steganalysis. In: The proceedings of the 4th international workshop on information hiding, vol 2137 of Springer LNCS, pp 289–302
5.
Zurück zum Zitat Provos N (2001) Defending against statistical steganalysis. In: The proceedings of the 10th USENIX security symposium, pp 24–36 Provos N (2001) Defending against statistical steganalysis. In: The proceedings of the 10th USENIX security symposium, pp 24–36
6.
Zurück zum Zitat Provos J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. Multimedia IEEE 8:22–28 Provos J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. Multimedia IEEE 8:22–28
8.
Zurück zum Zitat Solanki K, Sarkar A, Manjunath BS (2008) YASS: yet another steganographic scheme that resists blind steganalysis. In: The proceedings of the 9th international workshop on information hiding, vol 4567 of Springer LNCS, pp 16–31 Solanki K, Sarkar A, Manjunath BS (2008) YASS: yet another steganographic scheme that resists blind steganalysis. In: The proceedings of the 9th international workshop on information hiding, vol 4567 of Springer LNCS, pp 16–31
9.
Zurück zum Zitat Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47:76–82CrossRef Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47:76–82CrossRef
10.
Zurück zum Zitat Nissar A, Mir AH (2010) Classification of steganalysis techniques: a study. Digit Signal Process 20:1758–1770CrossRef Nissar A, Mir AH (2010) Classification of steganalysis techniques: a study. Digit Signal Process 20:1758–1770CrossRef
11.
Zurück zum Zitat Shi Y, Chen C, Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. In: The proceedings of the 8th international workshop on information hiding, pp 249–264 Shi Y, Chen C, Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. In: The proceedings of the 8th international workshop on information hiding, pp 249–264
12.
Zurück zum Zitat Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inform Forensics Secur 2:31–45CrossRef Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inform Forensics Secur 2:31–45CrossRef
13.
Zurück zum Zitat Pevny T, Fridrich J (2007) Merging Markov and DCT features for multiclass JPEG steganalysis. SPIE-IS & T Electronic Imaging 650503:1–13 Pevny T, Fridrich J (2007) Merging Markov and DCT features for multiclass JPEG steganalysis. SPIE-IS & T Electronic Imaging 650503:1–13
14.
Zurück zum Zitat Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: The proceedings of the ACM workshop on multimedia security, pp 27–30 Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: The proceedings of the ACM workshop on multimedia security, pp 27–30
15.
Zurück zum Zitat Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In: The proceedings of the SPIE 6072, pp 1–13 Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In: The proceedings of the SPIE 6072, pp 1–13
16.
Zurück zum Zitat Ker AD, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In: The proceedings of the SPIE 7254, pp 0A01–0A13 Ker AD, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In: The proceedings of the SPIE 7254, pp 0A01–0A13
17.
Zurück zum Zitat Luo XY, Wang DS, Wang P, Liu FL (2008) A review on blind detection for image steganography. Signal Process 88:2138–2157MATHCrossRef Luo XY, Wang DS, Wang P, Liu FL (2008) A review on blind detection for image steganography. Signal Process 88:2138–2157MATHCrossRef
18.
Zurück zum Zitat Sajedi H, Jamzad M (2010) CBS: contourlet-based steganalysis method. J Signal Process Syst 61:367–373CrossRef Sajedi H, Jamzad M (2010) CBS: contourlet-based steganalysis method. J Signal Process Syst 61:367–373CrossRef
19.
Zurück zum Zitat Po DDY, Do MN (2006) Directional multiscale modeling of images using the contourlet transform. IEEE Trans Image Process 15:1610–1620MathSciNetCrossRef Po DDY, Do MN (2006) Directional multiscale modeling of images using the contourlet transform. IEEE Trans Image Process 15:1610–1620MathSciNetCrossRef
20.
Zurück zum Zitat Sheikhan M, Mohammadi N (2011) Neural-based electricity load forecasting using hybrid of GA and ACO for feature selection. Neural Comput Appl (Published online: 1 May 2011, doi:10.1007/s00521-011-0599-1) Sheikhan M, Mohammadi N (2011) Neural-based electricity load forecasting using hybrid of GA and ACO for feature selection. Neural Comput Appl (Published online: 1 May 2011, doi:10.​1007/​s00521-011-0599-1)
21.
Zurück zum Zitat Lee S, Soak S, Oh S, Pedrycz W, Jeon M (2008) Modified binary particle swarm optimization. Progress Natural Sci 18:1161–1166MathSciNetCrossRef Lee S, Soak S, Oh S, Pedrycz W, Jeon M (2008) Modified binary particle swarm optimization. Progress Natural Sci 18:1161–1166MathSciNetCrossRef
22.
Zurück zum Zitat Lie WN, Lin GS (2005) A feature-based classification technique for blind image steganalysis. IEEE Trans Multimedia 7:1007–1020CrossRef Lie WN, Lin GS (2005) A feature-based classification technique for blind image steganalysis. IEEE Trans Multimedia 7:1007–1020CrossRef
23.
Zurück zum Zitat Xuan GR, Shi YQ, Gao JJ, Zou DK, Yang CY, Zhang ZP, Chai PQ, Chen CH, Chen W (2005) Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: The proceedings of the 7th international information hiding workshop, vol 3727 of Springer LNCS, pp 262–277 Xuan GR, Shi YQ, Gao JJ, Zou DK, Yang CY, Zhang ZP, Chai PQ, Chen CH, Chen W (2005) Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: The proceedings of the 7th international information hiding workshop, vol 3727 of Springer LNCS, pp 262–277
24.
Zurück zum Zitat Zhou Z, Hui M (2009) Steganalysis for Markov feature of difference array in DCT domain. In: The proceedings of the 6th international conference on fuzzy systems and knowledge discovery, vol 7, pp 581–584 Zhou Z, Hui M (2009) Steganalysis for Markov feature of difference array in DCT domain. In: The proceedings of the 6th international conference on fuzzy systems and knowledge discovery, vol 7, pp 581–584
25.
Zurück zum Zitat Lyu S, Farid H (2006) Steganalysis using higher-order image statistics. IEEE Trans Inform Forensics Secur 1:111–119CrossRef Lyu S, Farid H (2006) Steganalysis using higher-order image statistics. IEEE Trans Inform Forensics Secur 1:111–119CrossRef
26.
Zurück zum Zitat Chamorro AGH, Miyatake MN (2010) A new methodology of image steganalysis including for JPEG steganography. In: The proceedings of the international conference on electronics, robotics and automotive mechanics, pp 434–438 Chamorro AGH, Miyatake MN (2010) A new methodology of image steganalysis including for JPEG steganography. In: The proceedings of the international conference on electronics, robotics and automotive mechanics, pp 434–438
27.
Zurück zum Zitat Lin J-Q, Zhong S-P (2009) JPEG image steganalysis method based on binary similarity measures. In: The proceedings of the international conference on machine learning and cybernetics, vol 4, pp 2238–2243 Lin J-Q, Zhong S-P (2009) JPEG image steganalysis method based on binary similarity measures. In: The proceedings of the international conference on machine learning and cybernetics, vol 4, pp 2238–2243
28.
Zurück zum Zitat Bhat VH, Krishna S, Shenoy PD, Venugopal KR, Patnaik LM (2010) HUBFIRE-A multi-class SVM based JPEG steganalysis using HBCL statistics and FR index. In: The proceedings of the international conference on security and cryptography, pp 1–6 Bhat VH, Krishna S, Shenoy PD, Venugopal KR, Patnaik LM (2010) HUBFIRE-A multi-class SVM based JPEG steganalysis using HBCL statistics and FR index. In: The proceedings of the international conference on security and cryptography, pp 1–6
29.
Zurück zum Zitat Yi X, Wang YA (2009) An investigation of genetic algorithm on steganalysis techniques. In: The proceedings of the 5th international conference on intelligent information hiding and multimedia signal processing, pp 1118–1121 Yi X, Wang YA (2009) An investigation of genetic algorithm on steganalysis techniques. In: The proceedings of the 5th international conference on intelligent information hiding and multimedia signal processing, pp 1118–1121
30.
Zurück zum Zitat Zhi-Min He Ng WWY, Chan PPK, Yeung DS (2010) JPEG steganalysis based on class-wise non-principal components analysis and multi-directional Markov model. In: The proceedings of the international conference on machine learning and cybernetics, vol 1, pp 500–503 Zhi-Min He Ng WWY, Chan PPK, Yeung DS (2010) JPEG steganalysis based on class-wise non-principal components analysis and multi-directional Markov model. In: The proceedings of the international conference on machine learning and cybernetics, vol 1, pp 500–503
31.
Zurück zum Zitat Cho S, Wang J, Kuo C-CJ, Cha B-H (2010) Block-based image steganalysis for a multi-classifier. In: The proceedings of the international conference on multimedia and expo, pp 1457–1462 Cho S, Wang J, Kuo C-CJ, Cha B-H (2010) Block-based image steganalysis for a multi-classifier. In: The proceedings of the international conference on multimedia and expo, pp 1457–1462
32.
Zurück zum Zitat Bayram S, Dirik AE, Sencar HT, Memon N (2010) An ensemble of classifiers approach to steganalysis. In: The proceedings of the 20th international conference on pattern recognition, pp 4376–4379 Bayram S, Dirik AE, Sencar HT, Memon N (2010) An ensemble of classifiers approach to steganalysis. In: The proceedings of the 20th international conference on pattern recognition, pp 4376–4379
33.
Zurück zum Zitat Asadi N, Jamzad M, Sajedi H (2008) Improvements of image-steganalysis using boosted combinatorial classifiers and Gaussian high pass filtering. In: The proceedings of the international conference on intelligent information hiding and multimedia signal processing, pp 1508–1511 Asadi N, Jamzad M, Sajedi H (2008) Improvements of image-steganalysis using boosted combinatorial classifiers and Gaussian high pass filtering. In: The proceedings of the international conference on intelligent information hiding and multimedia signal processing, pp 1508–1511
34.
Zurück zum Zitat Luo P, Su Y (2010) Research on simulated annealing clustering algorithm in the steganalysis of image based on the one-class support vector machine. In: The proceedings of the international conference on computer application and system modeling, vol 14, pp 446–450 Luo P, Su Y (2010) Research on simulated annealing clustering algorithm in the steganalysis of image based on the one-class support vector machine. In: The proceedings of the international conference on computer application and system modeling, vol 14, pp 446–450
35.
Zurück zum Zitat Wang Y, Liu J, Zhang W, Lian S (2010) Reliable JPEG steganalysis based on multi-directional correlations. Signal Process Image Commun 25:577–587CrossRef Wang Y, Liu J, Zhang W, Lian S (2010) Reliable JPEG steganalysis based on multi-directional correlations. Signal Process Image Commun 25:577–587CrossRef
36.
Zurück zum Zitat Sabeti V, Samavi S, Mahdavi M, Shirani S (2010) Steganalysis and payload estimation of embedding in pixel differences using neural networks. Pattern Recogn 43:405–415MATHCrossRef Sabeti V, Samavi S, Mahdavi M, Shirani S (2010) Steganalysis and payload estimation of embedding in pixel differences using neural networks. Pattern Recogn 43:405–415MATHCrossRef
37.
Zurück zum Zitat Liu Q, Sung AH, Qiao M, Chen Z, Ribeiro B (2010) An improved approach to steganalysis of JPEG images. Inf Sci 180:1643–1655CrossRef Liu Q, Sung AH, Qiao M, Chen Z, Ribeiro B (2010) An improved approach to steganalysis of JPEG images. Inf Sci 180:1643–1655CrossRef
38.
Zurück zum Zitat Liu Q, Sung AH, Chen Z, Xu J (2008) Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recogn 41:56–66MATHCrossRef Liu Q, Sung AH, Chen Z, Xu J (2008) Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recogn 41:56–66MATHCrossRef
39.
Zurück zum Zitat Raval MS (2009) A secure steganographic technique for blind steganalysis resistance. In: The proceedings of the 7th international conference on advances in pattern recognition, pp 25–28 Raval MS (2009) A secure steganographic technique for blind steganalysis resistance. In: The proceedings of the 7th international conference on advances in pattern recognition, pp 25–28
40.
Zurück zum Zitat Wahab AW, Briffa JA, Schaathun HG, Ho ATS (2009) Conditional probability based steganalysis for JPEG steganography. In: The proceedings of the international conference on signal processing systems, pp 205–209 Wahab AW, Briffa JA, Schaathun HG, Ho ATS (2009) Conditional probability based steganalysis for JPEG steganography. In: The proceedings of the international conference on signal processing systems, pp 205–209
41.
Zurück zum Zitat Yamini B, Sabitha R (2010) Steganalytic attack for an adaptive steganography using support vector machine. In: The proceedings of the international conference on emerging trends in robotics and communication technologies, pp 56–58 Yamini B, Sabitha R (2010) Steganalytic attack for an adaptive steganography using support vector machine. In: The proceedings of the international conference on emerging trends in robotics and communication technologies, pp 56–58
42.
Zurück zum Zitat Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14:2091–2106MathSciNetCrossRef Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14:2091–2106MathSciNetCrossRef
43.
Zurück zum Zitat Zhao Q, Cao J, Hu Y (2009) 3-Joint optimization of feature selection and parameters for multi-class SVM in skin symptomatic recognition. In: The proceedings of the international conference on artificial intelligence and computational intelligence, vol 1, pp 407–411 Zhao Q, Cao J, Hu Y (2009) 3-Joint optimization of feature selection and parameters for multi-class SVM in skin symptomatic recognition. In: The proceedings of the international conference on artificial intelligence and computational intelligence, vol 1, pp 407–411
44.
Zurück zum Zitat Tian J, Li M, Chen F (2010) Dual-population based coevolutionary algorithm for designing RBFNN with feature selection. Expert Syst Appl 37:6904–6918CrossRef Tian J, Li M, Chen F (2010) Dual-population based coevolutionary algorithm for designing RBFNN with feature selection. Expert Syst Appl 37:6904–6918CrossRef
45.
Zurück zum Zitat Liu H, Motoda H (1998) Feature selection for knowledge discovery and data mining. Kluwer, BostonMATHCrossRef Liu H, Motoda H (1998) Feature selection for knowledge discovery and data mining. Kluwer, BostonMATHCrossRef
46.
Zurück zum Zitat Perez CA, Cament LA, Castillo LE (2011) Methodological improvement on local Gabor face recognition based on feature selection and enhanced Borda count. Pattern Recogn 44:951–963CrossRef Perez CA, Cament LA, Castillo LE (2011) Methodological improvement on local Gabor face recognition based on feature selection and enhanced Borda count. Pattern Recogn 44:951–963CrossRef
47.
Zurück zum Zitat Gurwicz Y, Yehezkel R, Lachover B (2011) Multiclass object classification for real-time video surveillance systems. Pattern Recogn Lett 32:805–815CrossRef Gurwicz Y, Yehezkel R, Lachover B (2011) Multiclass object classification for real-time video surveillance systems. Pattern Recogn Lett 32:805–815CrossRef
48.
Zurück zum Zitat Tian D, Zeng X, Keane J (2011) Core-generating approximate minimum entropy discretization for rough set feature selection in pattern classification. Int J Approx Reason 52:863–880CrossRef Tian D, Zeng X, Keane J (2011) Core-generating approximate minimum entropy discretization for rough set feature selection in pattern classification. Int J Approx Reason 52:863–880CrossRef
49.
Zurück zum Zitat Bontempi G (2007) A blocking strategy to improve gene selection for classification of gene expression data. IEEE/ACM Trans Comput Biol Bioinform 4:293–300CrossRef Bontempi G (2007) A blocking strategy to improve gene selection for classification of gene expression data. IEEE/ACM Trans Comput Biol Bioinform 4:293–300CrossRef
50.
Zurück zum Zitat Chang C-Y, Chen S-J, Tsai M-F (2010) Application of support-vector-machine-based method for feature selection and classification of thyroid nodules in ultrasound images. Pattern Recogn 43:3494–3506MATHCrossRef Chang C-Y, Chen S-J, Tsai M-F (2010) Application of support-vector-machine-based method for feature selection and classification of thyroid nodules in ultrasound images. Pattern Recogn 43:3494–3506MATHCrossRef
51.
Zurück zum Zitat Lim CP, Wang SL, Tan KS, Navarro J, Jain LC (2010) Use of the circle segments visualization technique for neural network feature selection and analysis. Neurocomputing 73:613–621CrossRef Lim CP, Wang SL, Tan KS, Navarro J, Jain LC (2010) Use of the circle segments visualization technique for neural network feature selection and analysis. Neurocomputing 73:613–621CrossRef
52.
Zurück zum Zitat Cheng HD, Shan J, Ju W, Guo Y, Zhang L (2010) Automated breast cancer detection and classification using ultrasound images: a survey. Pattern Recogn 43:299–317MATHCrossRef Cheng HD, Shan J, Ju W, Guo Y, Zhang L (2010) Automated breast cancer detection and classification using ultrasound images: a survey. Pattern Recogn 43:299–317MATHCrossRef
53.
Zurück zum Zitat Tsang C-H, Kwong S, Wang H (2007) Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recogn 40:2373–2391MATHCrossRef Tsang C-H, Kwong S, Wang H (2007) Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recogn 40:2373–2391MATHCrossRef
54.
Zurück zum Zitat Bolón-Canedo V, Sánchez-Maroño N, Alonso-Betanzos A (2011) Feature selection and classification in multiple class datasets: an application to KDD Cup 99 dataset. Expert Syst Appl 38:5947–5957CrossRef Bolón-Canedo V, Sánchez-Maroño N, Alonso-Betanzos A (2011) Feature selection and classification in multiple class datasets: an application to KDD Cup 99 dataset. Expert Syst Appl 38:5947–5957CrossRef
55.
Zurück zum Zitat Hua J, Tembe WD, Dougherty ER (2009) Performance of feature selection methods in the classification of high-dimension data. Pattern Recogn 42:409–424MATHCrossRef Hua J, Tembe WD, Dougherty ER (2009) Performance of feature selection methods in the classification of high-dimension data. Pattern Recogn 42:409–424MATHCrossRef
56.
Zurück zum Zitat Heikkinen V, Tokola T, Parkkinen J, Korpela I, Jaaskelainen T (2010) Simulated multispectral imagery for tree species classification using support vector machines. IEEE Trans Geosci Remote Sens 48:1355–1364CrossRef Heikkinen V, Tokola T, Parkkinen J, Korpela I, Jaaskelainen T (2010) Simulated multispectral imagery for tree species classification using support vector machines. IEEE Trans Geosci Remote Sens 48:1355–1364CrossRef
57.
Zurück zum Zitat Puig D, Angel Garcia M, Melendez J (2010) Application-independent feature selection for texture classification. Pattern Recogn 43:3282–3297MATHCrossRef Puig D, Angel Garcia M, Melendez J (2010) Application-independent feature selection for texture classification. Pattern Recogn 43:3282–3297MATHCrossRef
58.
Zurück zum Zitat Ruvolo P, Fasel I, Movellan JR (2010) A learning approach to hierarchical feature selection and aggregation for audio classification. Pattern Recogn Lett 31:1535–1542CrossRef Ruvolo P, Fasel I, Movellan JR (2010) A learning approach to hierarchical feature selection and aggregation for audio classification. Pattern Recogn Lett 31:1535–1542CrossRef
59.
Zurück zum Zitat Tan KC, Teoh EJ, Yu Q, Goh KC (2009) A hybrid evolutionary algorithm for attribute selection in data mining. Expert Syst Appl 36:8616–8630CrossRef Tan KC, Teoh EJ, Yu Q, Goh KC (2009) A hybrid evolutionary algorithm for attribute selection in data mining. Expert Syst Appl 36:8616–8630CrossRef
60.
Zurück zum Zitat Casale S, Russo A, Serrano S (2007) Multistyle classification of speech under stress using feature subset selection based on genetic algorithms. Speech Commun 49:801–810CrossRef Casale S, Russo A, Serrano S (2007) Multistyle classification of speech under stress using feature subset selection based on genetic algorithms. Speech Commun 49:801–810CrossRef
61.
Zurück zum Zitat Gharavian D, Sheikhan M, Nazerieh AR, Garoucy S (2011) Speech emotion recognition using FCBF feature selection method and GA-optimized fuzzy ARTMAP neural network. Neural Comput Appl (Published online: 28 May 2011, doi:10.1007/s00521-011-0643-1) Gharavian D, Sheikhan M, Nazerieh AR, Garoucy S (2011) Speech emotion recognition using FCBF feature selection method and GA-optimized fuzzy ARTMAP neural network. Neural Comput Appl (Published online: 28 May 2011, doi:10.​1007/​s00521-011-0643-1)
62.
Zurück zum Zitat Wang S, Li D, Song X, Wei Y, Li H (2011) A feature selection method based on improved Fisher’s discriminant ratio for text sentiment classification. Expert Syst Appl 38:8696–8702CrossRef Wang S, Li D, Song X, Wei Y, Li H (2011) A feature selection method based on improved Fisher’s discriminant ratio for text sentiment classification. Expert Syst Appl 38:8696–8702CrossRef
63.
Zurück zum Zitat Catal C, Diri B (2009) Investigating the effect of dataset size, metrics sets, and feature selection techniques on software fault prediction problem. Inf Sci 179:1040–1058CrossRef Catal C, Diri B (2009) Investigating the effect of dataset size, metrics sets, and feature selection techniques on software fault prediction problem. Inf Sci 179:1040–1058CrossRef
64.
Zurück zum Zitat Zhao H, Sinha AP, Ge W (2009) Effects of feature construction on classification performance: an empirical study in bank failure prediction. Expert Syst Appl 36:2633–2644CrossRef Zhao H, Sinha AP, Ge W (2009) Effects of feature construction on classification performance: an empirical study in bank failure prediction. Expert Syst Appl 36:2633–2644CrossRef
65.
Zurück zum Zitat Kennedy J, Eberhart RC (1997) A discrete binary version of the particle swarm algorithm. In: The proceedings of the international conference on systems, man and cybernetics, pp 4104–4108 Kennedy J, Eberhart RC (1997) A discrete binary version of the particle swarm algorithm. In: The proceedings of the international conference on systems, man and cybernetics, pp 4104–4108
66.
Zurück zum Zitat Babaoglu I, Findik O, Ülker E (2010) A comparison of feature selection models utilizing binary particle swarm optimization and genetic algorithm in determining coronary artery disease using support vector machine. Expert Syst Appl 37:3177–3183CrossRef Babaoglu I, Findik O, Ülker E (2010) A comparison of feature selection models utilizing binary particle swarm optimization and genetic algorithm in determining coronary artery disease using support vector machine. Expert Syst Appl 37:3177–3183CrossRef
68.
Zurück zum Zitat Boser BE, Guyon IM, Vapnik VN (1992) A training algorithm for optimal margin classifiers. In: The proceedings of the 5th annual ACM workshop on COLT, pp 144–152 Boser BE, Guyon IM, Vapnik VN (1992) A training algorithm for optimal margin classifiers. In: The proceedings of the 5th annual ACM workshop on COLT, pp 144–152
69.
Zurück zum Zitat Shihong Y, Ping L, Peiyi H (2003) SVM classification: its content and challenges. Appl Math J Chinese Univ Ser B 18:332–342MathSciNetMATHCrossRef Shihong Y, Ping L, Peiyi H (2003) SVM classification: its content and challenges. Appl Math J Chinese Univ Ser B 18:332–342MathSciNetMATHCrossRef
70.
Zurück zum Zitat Moody J (1989) Fast learning in networks of locally-tuned processing units. Neural Comput 1:281–294CrossRef Moody J (1989) Fast learning in networks of locally-tuned processing units. Neural Comput 1:281–294CrossRef
71.
Zurück zum Zitat Haykin S (1994) Neural networks: a comprehensive foundation. Macmillan College Publishing Company, New YorkMATH Haykin S (1994) Neural networks: a comprehensive foundation. Macmillan College Publishing Company, New YorkMATH
72.
Zurück zum Zitat Specht DF (1990) Probabilistic neural networks. Neural Netw 3:109–118CrossRef Specht DF (1990) Probabilistic neural networks. Neural Netw 3:109–118CrossRef
78.
Zurück zum Zitat Liu Q, Sung AH, Ribeiro B, Wei M, Chen Z, Xu J (2008) Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci 178:21–36CrossRef Liu Q, Sung AH, Ribeiro B, Wei M, Chen Z, Xu J (2008) Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci 178:21–36CrossRef
79.
Zurück zum Zitat Geetha S, Sivatha Sindhu SS, Kamaraj N (2009) Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. Comput Secur 28:683–697CrossRef Geetha S, Sivatha Sindhu SS, Kamaraj N (2009) Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. Comput Secur 28:683–697CrossRef
Metadaten
Titel
Improved contourlet-based steganalysis using binary particle swarm optimization and radial basis neural networks
verfasst von
Mansour Sheikhan
Mansoureh Pezhmanpour
M. Shahram Moin
Publikationsdatum
01.10.2012
Verlag
Springer-Verlag
Erschienen in
Neural Computing and Applications / Ausgabe 7/2012
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-011-0729-9

Weitere Artikel der Ausgabe 7/2012

Neural Computing and Applications 7/2012 Zur Ausgabe

Premium Partner