Literature DB >> 28196080

Extreme learning machine based optimal embedding location finder for image steganography.

Hayfaa Abdulzahra Atee1,2, Robiah Ahmad2, Norliza Mohd Noor2, Abdul Monem S Rahma3, Yazan Aljeroudi4.   

Abstract

In image steganography, determining the optimum location for embedding the secret message precisely with minimum distortion of the host medium remains a challenging issue. Yet, an effective approach for the selection of the best embedding location with least deformation is far from being achieved. To attain this goal, we propose a novel approach for image steganography with high-performance, where extreme learning machine (ELM) algorithm is modified to create a supervised mathematical model. This ELM is first trained on a part of an image or any host medium before being tested in the regression mode. This allowed us to choose the optimal location for embedding the message with best values of the predicted evaluation metrics. Contrast, homogeneity, and other texture features are used for training on a new metric. Furthermore, the developed ELM is exploited for counter over-fitting while training. The performance of the proposed steganography approach is evaluated by computing the correlation, structural similarity (SSIM) index, fusion matrices, and mean square error (MSE). The modified ELM is found to outperform the existing approaches in terms of imperceptibility. Excellent features of the experimental results demonstrate that the proposed steganographic approach is greatly proficient for preserving the visual information of an image. An improvement in the imperceptibility as much as 28% is achieved compared to the existing state of the art methods.

Entities:  

Mesh:

Year:  2017        PMID: 28196080      PMCID: PMC5308843          DOI: 10.1371/journal.pone.0170329

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


Introduction

Over the decades, the ever-escalating advancements of communication technology allowed the free transferring and sharing of confidential information over the complex internet network. This free sharing of sensitive information in the form of data files, and video/audio recordings posed severe security threats. The preservation of users’ privacy is repeatedly threatened by the highly sophisticated and deceptive phishing attacks. Thus, absolute protection of sensitive data communication from unauthorized accesses or attacks is demanded. Presently, the secured communication is achieved via mathematical models assisted cryptographic and steganographic techniques. Ironically, cryptography being the encryption of a plain-text for generating the cipher-text does not obscure the data existence. It rather makes the data incomprehensible to protect the secret message from attacks or unauthorized access. For absolutely secured information communication, the limitations of cryptography are surmounted by introducing a new technique called steganography. However, most of the conventional steganographic techniques suffer from high computational loads when selecting the best location for concealing the message in the host medium with minimal deformation. This shortcoming can be overcome by introducing the neural network (NN) based steganographic technique, where the NN uses a distributed representation to store the learning knowledge. Thus, accessing the concealed data without knowing the topology of the NN appears practically infeasible [1]. Although some researchers prefer models with interpretability power such as explicit mathematical or statistical models or even heuristically encoded models such as fuzzy models, it has been proved that black box type of models when learning is feasible have more capability of capturing complicated knowledge and proving functionality in real world type of systems [2][3][4]. Such black box models have dramatically proved high efficiency in the state of the art of speech recognition, visual object recognition and many other fields [5]. Using information-hiding protocols, the steganographic technique embeds the message into a cover medium to keep the hidden data from being detected. This cover medium may be an image, video, or audio file. Among various steganographic techniques image steganography (concealing data into an image) is most popular and widely used because it allows an easy exchange of vast amount of images via the internet [6]. On top, the image steganography assisted hidden data cannot be recognized through the visual inspection [7]. Lately, in the image steganography domain the heuristic searching optimization became attractive [5]. Despite much research achieving an efficient steganographic algorithm for finding the best embedding location with reduced computational time expenses remains challenging. Depending on embedded locations, the image steganographic algorithms are categorized into spatial[8][9] and frequency domain embedding. The later one is also called transform-domain embedding [10]–[13]. In the spatial domain, the least significant bit (LSB) based steganography [8][9] is the most extensively used method [14], where the carrier or cover image LSB is applied to conceal the secret message. Conversely, in the least significant bit replacement (LSBR) based steganography, the hidden secret message can be uncovered by the existing steganalysis methods [15][16]. Thus, it is weak against visual and statistical attacks. The least significant bit matching (LSBM) method also called ± embedding method provides better security than LSBR. However, it is incompatible for most of the model-preserving steganographic techniques [17]. Despite their high capacity the spatial-domain techniques are not robust against image-processing operations, noise attacks, lossy compression, and filtering. Furthermore, they offset the statistical properties of the image due to the sole usage of the BMP format. As aforementioned, in frequency-domain steganography the secret data are concealed in the significant parts of the cover image. This domain is comprised of several transforms such as discrete cosine transforms (DCT), discrete wavelet transforms (DWT), and discrete Fourier transforms (DFT). These transforms are used as media for hiding a message into an image [18]. Although both DWT and DCT have relatively smaller capacities but the former one is superior in terms of robustness against image-processing operations, statistical and noise attacks as well as distortion [19]. Thus, the steganographic techniques in the frequency-domain possess better immunity to attacks than the one spatial-domain. The limitations involving the spatial-domain techniques are overcome using frequency-domain. Numerous researches are performed with DWT [10], [12]. The presence of rounding error in the inverse DFT make it disadvantageous for steganographic applications [20]. Table 1 presents a brief summary of embedding the secret information in spatial or frequency domain.
Table 1

The embedding domain for the existing state of the art methods.

Author(s)Domain and TechniqueProsCons
Banerjee, Bhattacharyya, and Sanyal 2013Spatial–LSBCapable of extracting the secret message without the cover imageCapacity issue has not addressed
Pevny, Filler, and Bas 2010Spatial–LSBAllows the embedder to conceal seven times longer message with same securityApplied theoretically and did not test by real data such as text or images
Wu, Hsien C. et al. 2009Spatial–LSBHigh payload in cover imageUnsatisfied image quality
Luo, Huang, and Huang 2010Spatial-LSBThe visual quality and security have been improved significantly compared to conventional LSBDid not tested against image processing or statistical analysis
Islam and Gupta 2014Spatial–LSBMBetter security than LSBRConflicting for most of the model-preserving steganographic techniques
Abdelwahab and Hassaan 2008Frequency–DWTDoes not require the original cover image to extract the embedded secret image.Did not tested for text into image.
Prabakaran and Bhavani 2012Frequency-DWTHiding a large-size secret image into a small-size cover image.The quality of stego-image is not satisfied.
Some researchers have combined the spatial and frequency domains. The [21][22] introduced a framework for optimizing the adaptive distortion function to achieve minimal statistical detectability. The [23] improved the detection percentage and classified the images as stego or clean. Furthermore, spatial or frequency domain techniques are integrated with other techniques including artificial NN (ANN), genetic algorithm (GA), or both to attain enhanced steganographic performances. Spatial-domain based GAs are used [1], [24] to minimize the distortion and. GA and ANN are used [25] to accelerate the training speed. Frequency-domain ANN is used [26] to augment the embedding capacity. Spatial domain based ANN is utilized [27] to realize good approximation capacity, faster convergence, and a more stable performance surface. This type of ANN is also used [28] to increase the approximation capacity and minimize distortion. The ANN is also used with steganography for message embedding [25], where the secret message is assumed to represent an image. This allowed the steganographer to change the message data freely provided the visual information is preserved. However, this assumption is not applied to the text messages. Meanwhile, ANN is also used for digital watermarking to authenticate the image [29], in which concealing a secret message is not required [30]. ANN is employed for the capacity maximization [28], steganographic content detection [31-33], identification of the embedded data in an image when applied to steganalysis or as a classifier and determination of the lower and upper bounds of embedding capacity [34]. Likewise, GAs are used in steganography for diverse purposes. GA is used to model the steganography problem [24] for search and optimization. Besides, for optimization with minimum distortion the GAs are utilized, where a stego image closer to the cover image is obtained [1], [35]. The [11] presents DCT with Markov as a detection and classifier for images. Table 2 summarizes different embedding techniques with combined spatial and frequency domains.
Table 2

The combined spatial and frequency domains with different embedding techniques for the existing state of the art methods.

Author(s)Domain and TechniqueProsCons
Tomás Filler and Fridrich 2011Frequency-DCT and SpatialStrong against many types of steganalysisHigh complexity
Tom Filler, Judas, and Fridrich 2011Frequency-DCT and spatialThe methods are not limited to binary embedding and allow the embedder to choose the amplitude of embedding changes dynamically based on the cover-image content.Focus on payload aspects rather than embedding
Pathak and Selvakumar, 2014Frequency-DCT and SpatialIt is used as a classifier and embedding.This method omitted some features of images.
Iranpour and Rahmati 2014Spatial and GAEnhancing the security by minimize the distortion.Omitted the optimum number of blocks as well as their sizes.
El-Emam and AL-Zubidy 2013Frequency GA and ANNAllowed the steganographer to change the message data freely provided the visual information is preserved.Omits the text steganography.
Tsai et al. 2009Frequency and ANNAugment the embedding capacity and supports true-color secret image with size constraint on shares.Hiding small image into large image.
Husien and Badi 2014Spatial and ANNGood approximation capacity, faster convergence, and more stable performance surface.Did not present numerical comparisons with other works.
Ghaleb Al-jbara, Mat Kiah, and Jalab 2012Spatial-LSB and ANNIncreases the approximation capacity.PSNR and MSE are not satisfied and did not tested against image processing.
El-Alfy 2013Spatial domain-PVD and ANN99% rates of detection have been achieved.Applied only in transformed domain.
Pratt, Konda, and Chu 2008Spatial-LSB, and ANNIt is especially challenging when the embedding rate is low, such as below 10 percent of all embedded data.It is used as a steganalysis and not as embedding. Some error rates have been addressed in extracting the embedded data.
Nazeri and Kanan 2014Spatial domain and GAIt is modeling the steganography problem as a search and optimization problem.Did not tested against image processing or any statistical analysis attack.
Roy and Laha 2015Spatial- LSB and GAHigh security and robustness.The image quality (PSNR) is not satisfied.
Cho, Seongho, Byung-Ho Cha, Martin Gawecki, and C.-C. Jay Kuo 2013Frequency–DCT and MarkovTested in terms of spatial and frequency domainsUsing as a classifier not as embedding
Lately, the learning ability of NNs is exploited to expand the optimization potential of conventional data-hiding techniques. In steganography, ANN is used either for the classification of the stego image or for the detection of the embedded data in an image. We intend to reduce the distortion in a stego image as much as possible by appropriately selecting the location in the image for messages embedment. Theoretically, an ELM demonstrates a good generalization performance and universal approximation at extremely fast learning speeds. It can be used for either classification or regression purposes [36]. Inspired by such notable advantages, we propose an ELM-based supervised mathematical model called Optimal Embedding Location Finder (OELF) for image steganography. In addition, a novel fusion metric (fusion1) is introduced for the training in the regression mode to realize the best performance metric for steganography. Another novel fusion metric (fusion2) is developed for evaluating the results. To the best of our knowledge, for the first time we use the machine learning to determine the best location with least sensitive area for embedding. This paper is organized as follows. Section 2 depicts the proposed OELF model. Section 3 highlights the detail mathematical background of steganography. Section 4 describes the proposed methodology. Section 5 explains the experimental results with various attributes. Section 6 concludes the paper with further outlook.

Optimal Embedding Location Finder (OELF) model

Most traditional steganographic methods embed the message into an image by ignoring the significance of the image’s spatial features. Nevertheless, the identification of best embedding location is critically decided by the message homogeneity and other texture features [37] of the blocks. A location having least image distortion is considered to be the optimum one. To protect the embedding process from a steganalysis, any form of distortion in the image must be minimized after the payload is inserted. Furthermore, the cover image and stego image must be approximately identical both visually and statistically. The selected area and the embedding method are the primary factors that affect the distortion. Based on OELF model an ELM is proposed for finding the best embedding location. It is worth noting that ELM is beneficial due to its universal approximation capacity which allows rapid training with good over-fitting avoidance than other classical NN based approaches [36]. Thus, a modified ELM is used to train a single-hidden-layer NN with a varying number of neurons. Appendix A provides a short depiction of ELM.

Background of steganography modeling

As mentioned earlier, OELF locates the most suitable window for embedding the secret message into the image without affecting its visual features. Initially, the image is partitioned into (8 × 8) block pixels and one bit of the message is inserted into each block. Depending on the message size, the image is then partitioned into overlapping square windows to embed the message. The features of contrast (C), energy (Enr), homogeneity (H), entropy (Ent), correlation (Corr), standard deviation (Std), and the mean (M) of each square window are calculated using: where i and j are the horizontal and vertical pixel coordinates, respectively, and p is the pixel value. where N is the number of the window pixels. After calculating the window features and embedding the message in the corresponding window, the resultant imperceptibility is represented using one of three metrics including correlation, MSE, and SSIM. The expression for MSE and SSIM yields: where N and M are the length and width of the image, respectively. where μ and μ are the local mean, σ and σ are the standard deviation, σ is the cross-covariance, C1 and C2 are constants.

Methodology

The following subsections describe the detailed methodology including the input (host or cover image), the message to be embedded in the image, the output (stego image) and the evaluation metrics of imperceptibility.

Input and output determination

Two images such as Lena and Sails from the standard database are used to analyze the trends between the imperceptibility and the texture features of the image. Imperceptibility is measured in terms of correlation, MSE, and SSIM between two corresponding square windows for the host and stego images with respect to the extracted features. Figs 1–6 show the trends of the imperceptibility of the Lena and Sails images after the message is embedded into a square window regarding the corresponding texture features in this window. It is evident that all the features (contrast, energy, homogeneity, entropy, correlation, entropy, and Std) are strongly correlated. The occurrence of less variability in the imperceptibility correlation with respect to the set of features implies their equivalent usage in the machine learning model.
Fig 1

Relationship of the correlation metric to the texture features (a) contrast, (b) energy, (c) homogeneity, (d) entropy, (e) correlation, (f) mean, and (g) standard deviation for Lena image.

Fig 6

Relationship of the SSIM metric to the texture features (a) contrast, (b) energy, (c) homogeneity, (d) entropy, (e) correlation, (f) mean, and (g) standard deviation for Sails image.

Table 3 summarizes the trends of imperceptibility to texture feature.
Table 3

Trends of the imperceptibility to the texture feature for the Lena and Sails images.

FeaturesMeasures
CorrelationMSESSIM
ContrastPositiveNo trendNegative
EnergyPositiveNo trendNegative
HomogeneityPositiveNo trendNegative
CorrelationPositiveNo trendNegative
MeanPositiveNo trendNegative
Standard deviationPositiveNo trendNegative
EntropyPositiveNo trendNegative
A detail analysis of such trends between the imperceptibility and the texture features of the image allowed us to determine the possible causality among them. Thus, the machine learning is designed with an optimized embedder or steganographer.

Model design

The following steps are adopted to develop the proposed model: Partitioning of the (N × M) host image into (K × L) pixel non-overlapping sub-blocks, where (K = L = 8). Determination of the number of blocks needed to embed the message according to the message bits’ size m. Determination of the minimum square window size (SWS) from the image that contains the required blocks. The SWS is calculated using: Creation of raw data set of the square windows with a scanning resolution of 4 pixels NOS. The size of the data set is: where N and M are the length and width of the image, respectively, and SWS is the square window size.

Data set preparation

Fig 7 illustrates the schematic framework for the creation of the learning data set and the feature domain prior to the ELM training and testing. The texture feature extraction, metric calculation and embedding are performed for building the learning data set. It is customary to explain briefly the embedding and the feature extraction procedure.
Fig 7

Construction of data set and feature domain.

Wavelet transform based embedding

As aforementioned, the message must be embedded into its corresponding square window for each square window in the data set. The learning data are extracted from the raw data set using the embedding process and the calculation of the resultant visual imperceptibility metrics. To achieve this goal, the following steps are executed: For message bit one, the value is quantized to the nearest even number with the index (8, 8) in the corresponding block. Otherwise, it is quantized to the nearest odd number. The wavelet transform for each sub-block is computed by inverting the wavelet. The wavelet is transformed to its corresponding spatial domain. The embedding process is repeated until the final bit of the message is embedded. For each square window, the corresponding visual metrics are calculated. These metrics include correlation, MSE, SSIM, and fusion1. The expression for fusion1 yields:

Texture feature extraction

The texture features are extracted using the following steps: The co-occurrence matrix is built for each square window whose sub-blocks are used for embedding the message bits. The feature function (contrast, energy, homogeneity, entropy, correlation, and standard deviation) of the co-occurrence matrix is computed for each square window. The expression for features yields

Extreme Learning Machine (ELM)

ELM training

The prepared data is represented the matrix form where n is the number of square windows, f1, f2,…, f7 are the extracted features, y is the corresponding output metrics, and i = 1, 2, 3, 4 correspond to the Corr, MSE, SSIM, and fusion1, respectively. A neural network of ñ hidden neurons is built and trained on a part of X to predict y. Furthermore, the training and the testing phases are validated using the RMSE before applying the ELM-based model. Now we turn our attention in determining the optimal training percentage and the optimum number of neuron.

RMSE for training and testing

The OELF being a supervised model the authentication of the training and testing phases are necessary. They play a decisive role in the proposed model. In the present case, OELF is trained to predict the visual imperceptibility metrics (Corr and SSIM) and the fusion1 metric. The RSMEs of the proposed OELF model for the training and testing phase are computed to evaluate its predictability performance. Table 4 summarizes the RSME values of the square window for each of the similarity metrics. The computed RSMEs for all the metrics in both the training phase and testing phase with different images are discerned to be approximately zero, indicating the suitability of the proposed model.
Table 4

RMSEs for the training phase and testing phase for different images.

ImagesMeasureRMSE (Training phase)RMSE (Testing phase)
LenaCorr0.00000025920.0000002604
MSE0.0001839800.0001953800
SSIM0.00000600680.0000063730
Fusion10.00000598130.0000063790
SailsCorr0.00000139950.0000014011
MSE0.0001793400.0001922900
SSIM0.00000977570.0000088329
Fusion10.00100000000.0011000000
BaboonCorr0.00000106230.0000010641
MSE0.0001930100.0002089800
SSIM0.00000413150.0000042289
Fusion10.00000225540.0000023760
4.2.01Corr0.00000008330.0000000874
MSE0.0001933900.0002117400
SSIM0.00008910800.0000968680
Fusion10.00008911700.0000968790

Developed ELM training

A number of issues need to be addressed when using ELM. First, an appropriate training–testing ratio has to be determined accurately to avoid over-fitting for using a high training percentage and under-fitting for using a low training percentage. Second, the ELM does not provide the user with the exact number of neurons to be selected for building the network structure. Moreover, the performance of the model depends on the accurate determination neurons number, where a large (small) number of neurons lead to over (under) fitting [38] [2]. The used data set is partitioned into 50% training and 50% testing. Next, the number of neurons is increased from 50 to 200 at a step of 5. In each case, the data set is partitioned into 80% for training and 20% for validation. Validation is performed on a part of the training data set because in the normal functioning mode of the system the testing data set is unavailable. The number of neurons in the hidden layer corresponding to the best validation accuracy is then selected. Once the optimal number of neurons is selected, the search for the best training–testing ratio is performed by assigning a fixed testing data set size. Allocation of fixed percentage of the data for testing is required to avoid the bias in the RSME with increasing testing data set. Afterward, the percentage of the training data is increased from 10% to 60% for validating each case using the validation part composed of 20% of the training data set. From the total data set, 50% is found to be best for training. Table 5 summarizes the training data set (%) dependent accuracy levels for the Lena, Sails and Baboon images. Figs 8–11 displays the training data set percentages dependent variation in the Corr, MSE, SSIM, and fusion1 values between the host and stego images (Lena, Sails, and Baboon).
Table 5

Accuracy levels of the different training data set percentages for the Lena, Sails and Baboon images.

ImagesTraining (%)Sample No.CorrMSESSIMfusion1
Lena105040.0000000346330.000199740.00000960580.0000096302
2010080.0000000311630.000191030.00000668140.0000066951
3015120.0000000328580.000198340.00000692030.0000069401
4020160.0000000305320.000194070.00000666750.0000066905
5025200.0000000289310.000193400.00000648970.0000065042
6030250.0000000323760.000199640.00000649970.0000065511
Sails105040.0000000612090.000204950.00001072300.0000094358
2010080.0000000603830.000198970.00000732740.0000071024
3015120.0000000589050.000194390.00000748160.0000074046
4020160.0000000551830.000179930.00000627950.0000062419
5025200.0000000548120.000180180.00000677820.0000068851
6030250.0000000561170.000182780.00000646540.0000065537
Baboon105040.0000000647920.000206440.00000267580.0000021155
2010080.0000000619510.000205150.00000192490.0000019248
3015120.0000000617390.000204480.00000185800.0000019298
4020160.0000000601800.000200390.00000200360.0000020270
5025200.0000000594640.000197120.00000181420.0000018343
6030250.0000000595670.000197830.00000195050.0000019876
Fig 8

Training data set percentage dependent variation of Corr for the Lena, Sails, and Baboon images.

Fig 11

Training data set percentage dependent variation of fusion1 for the Lena, Sails, and Baboon images.

Design and optimization of ELM

Fig 12 depicts schematically the framework of the proposed OELF model, which is achieved using the following steps:
Fig 12

General framework of the proposed OELF model.

The data set is partitioned into 50% for training as well as validation and 50% for testing. The ELM regression model is designed based on the training data set (Appendix A) which is partitioned into 80% for training and 20% for validation. The ELM regression model is further used to predict the best square window in terms of the fusion2 metric. The embedding process is performed to insert the secret message into the identified optimum square window for generating the stego image. Using the ELM training the message is embedded into each square window and all visual imperceptibility metrics are determined via fusion2 metric given by:

Experiments and results

Experiments are conducted on Intel®Core™ i7-2670QM CPU @ 2.20 GHz 6 GB RAM computer with 64-bit operating system. The proposed OELF model is evaluated using 24 gray scale images of size (512 × 512) pixels. Total 5041 square windows are obtained, in which square windows of (232 × 232) are used. The message of size 100 bytes is utilized for embedment. Fig 13 illustrates the tested images before (left panel of each image) and after (right panel of each image) embedding.
Fig 13

Achieved host (left) and stego (right) images.

Table 6 enlists the RMSEs of the ELM prediction for the visual imperceptibility metrics of the host and stego images for 50% training data set.
Table 6

RMSE values obtained using the ELM model for various images.

ImageCorrMSESSIMfusion2
Lena0.0000000289310.000193400.00000648976.2242
Sails0.0000000548120.000180180.00000677825.9077
Baboon0.0000000594640.000197120.00000181426.3427
4.2.010.0000000729100.000214920.00008974206.7471
Barbara0.0000000461850.000206710.00000389816.5776
Boat0.0000000463840.000188740.00000140976.1217
Boy0.0000000369930.000182590.00023143005.8925
Bridge0.0000000379950.000189650.00000065186.0393
Cameraman0.0000000344470.000195190.00000874326.3871
Car0.0000000501140.000195260.00037844006.1066
Couple0.0000000747320.000178510.00000709625.7333
Elaine0.0000000480130.000182820.00000115865.9634
Fruits0.0000000910420.000184450.00003884105.9403
Fry mire0.0000000293720.000200570.00100000006.0890
Gold hill0.0000000686360.000202800.00000486906.4077
Lake0.0000000282590.000192340.00002954206.0766
Serrano0.0000000277050.000212710.00120000006.1314
Sport team0.0000000187670.000192720.00180000005.9935
Tulips0.0000000417710.000206460.00002470106.7391
Watch0.0000001701900.000218920.00120000006.0348
Zelda0.0000000760980.000199570.00000616286.4019
Pepper0.0000000425330.000194570.00000988276.2634
F160.0000000500380.000199400.00011493006.3402
Tiffany0.0000001383700.000187620.00010041005.9857
The experimental results obtained using the proposed OELF model are compared (Table 7 and Fig 14) with the art-of-the existing methods [24], [39] in terms of the fusion2 metric. OELF approach is found to outperform the other methods [24], [39] in terms of imperceptivity and fusion2 measure which are nearly 28% and 114%, respectively. Thus, OELF is demonstrated to be a useful steganography technique for embedding text in images with minimum level of distortion. Furthermore, it requires only a small training part of the host image features.
Table 7

Comparison of the OELF model results with other existing models.

Proposed OELF modelKanan and Nazeri [24]Miao Qi et al. [39]
ImageMSECorr.SSIMFusion2MSECorr.SSIMFusion2MSECorr.SSIMFusion2
Lena0.0011330.9999990.999989881.88790.0013840.9999990.999996722.15690.0129390.9999980.99991077.2759
Sails0.0011300.9999990.999996884.87090.0013880.9999990.999994720.18710.0123290.9999950.99995781.1051
Baboon0.0011260.9999990.999997887.86880.0013720.9999990.999998728.17640.0125120.9999960.99999479.9213
4.2.010.0011990.9999990.999948833.48310.0012660.9999990.999981789.57580.0133050.9999970.99993775.1510
Barbara0.0012050.9999990.999994829.56490.0013800.9999990.999995724.15090.0117790.9999970.99997284.8887
Boat0.0011090.9999990.999996901.41610.0014070.9999990.999995710.41410.0128780.9999970.99992977.6436
Boy0.0011810.9999990.999971846.28430.0012770.9999990.999992782.51340.0127560.9999980.99999278.3917
Bridge0.0010640.9999990.999998939.58250.0013990.9999990.999994714.28450.0119080.9999980.99998884.0194
Camera-man0.0010990.9999990.999995909.62580.0013610.9999990.999994734.29300.0132440.9999980.99992875.4968
Car0.0010800.9999990.999961925.50330.0011940.9999990.999982837.50630.0109250.9999970.99997391.5281
Couple0.0011170.9999990.999995894.68490.0013800.9999990.999995724.15150.0122070.9999960.99999681.9194
Elaine0.0012390.9999990.999995806.59320.0013770.9999990.999995726.15700.0124510.9999970.99994780.3092
Fruits0.0011820.9999990.999966845.59760.0013800.9999990.999987724.14520.0146480.9999970.99995568.2634
Fry-mire0.0012730.9999990.999600784.98950.0012960.9999990.999995771.00790.0107420.9999990.99999593.0905
Gold- hill0.0011480.9999990.999995870.90600.0014190.9999990.999992704.68280.0123900.9999970.99993780.7041
Lake0.0011760.9999990.999990860.38910.0014110.9999990.999990708.49080.0128780.9999980.99999077.6484
Serrano0.0011620.9999990.999817860.38910.0012960.9999990.999993771.00640.0125120.9999980.99999479.9214
Sport -team0.0011550.9999990.999542864.76560.0013040.9999990.999993766.49820.0120230.9999980.99997683.1654
Tulips0.0010620.9999990.999992941.26380.0013840.9999990.999991722.15380.0114130.9999980.99996887.6121
Watch0.0011390.9999990.999730877.23790.0011350.9999990.999987888.61200.0123900.9999960.99999180.7084
Zelda0.0011650.9999990.999986858.06960.0013880.9999990.999983720.16340.0122680.9999960.99991081.5048
Pepper0.0011560.9999990.999985864.43610.0013960.9999990.999990716.23350.0123900.9999970.99998180.7077
F160.0011150.9999990.999976896.19710.0013800.9999990.999990724.14780.0112910.9999970.99996088.5585
Tiffany0.0011310.9999990.999960884.09270.0013960.9999990.999985716.22930.1344400.9999960.99999174.3775
Fig 14

Performance of the proposed imperceptibility metric (fusion2).

Conclusion

Based on ELM, we proposed a novel OELF model to achieve high-performance image steganography. In this approach, a modified ELM algorithm is used to establish the supervised mathematical model for determining the optimum embedding image location with minimal distortion. The ELM is trained on an image part (or any host medium) and tested in the regression mode to select the best location for embedding the message. This allowed in achieving the best values of the predicted evaluation metrics. The training is performed based on a set of the extracted texture, statistical features, and their corresponding visual imperceptibility metrics using a part of the image. The trained model is further used for the performance optimization. The proposed model is demonstrated to outperform the existing state-of-the-art models. The excellent features of the results suggest that the present model may constitute a basis for the development of secured image steganography algorithm. It is worth to look at the robustness of the proposed method against various statistical attacks by incorporating a wider range of features. Also, it is good to further develop the model to have more degree of freedom in terms of the region finding by defining the region analytically instead of explicit geometrical definition (block region). Other worthy development is to create an index for ranking the solution based on Pareto efficiency.

Appendix A

For ELM training, the used data is combined with n arbitrary distinct square windows (xj, tj) with j = 1,…n, x = (x, x,…, x) denotes the input vector and tj denotes the target. It is possible to model the standard Single Hidden Layer Feed Forward Network (SLFN) with an activation function g(x) and ñ hidden layer neurons via: where j = 1,…n, w = (a, a,…, a), bi is the threshold (biases) of the ith hidden node, and βi is the weight connecting the ith hidden node and the output. The above equation is compact form yields: where И = И(a1, a2,…, a, x1, x2,…, xN, b1, b2,…b) with where И is called the hidden layer output matrix of the neural network and T is the target vector. One can prove that if the activation function is differentiable then the required number of the hidden layer neurons is lower than the data size or ñ < n. The training of the neural network is achieved via the following steps: Assigning random weights (w) and biases (bi). Calculating the hidden layer output matrix. Computing the output weights (β) via: where ИT is the Moore-Penrose generalized inverse of hidden layer output matrix.

Original data for Figs 1–6,8–11 and 14.

(XLSX) Click here for additional data file.
  3 in total

Review 1.  Deep learning.

Authors:  Yann LeCun; Yoshua Bengio; Geoffrey Hinton
Journal:  Nature       Date:  2015-05-28       Impact factor: 49.962

2.  Sparse Bayesian extreme learning machine for multi-classification.

Authors:  Jiahua Luo; Chi-Man Vong; Pak-Kin Wong
Journal:  IEEE Trans Neural Netw Learn Syst       Date:  2014-04       Impact factor: 10.451

3.  T2FELA: type-2 fuzzy extreme learning algorithm for fast training of interval type-2 TSK fuzzy logic system.

Authors:  Zhaohong Deng; Kup-Sze Choi; Longbing Cao; Shitong Wang
Journal:  IEEE Trans Neural Netw Learn Syst       Date:  2014-04       Impact factor: 10.451

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.