Applied Soft Computing 67 (2018) 505–518 Contents lists available at ScienceDirect Applied Soft Computing journal homepage: www.elsevier.com/locate/asoc Robust steganographic method based on unconventional approach of neural networks Robert Jarusek, Eva Volna, Martin Kotyrba University of Ostrava, Department of Informatics and Computers, 30. dubna 22, 70103, Ostrava, Czech Republic a r t i c l e i n f o Article history: Received 7 September 2017 Received in revised form 14 March 2018 Accepted 18 March 2018 Available online 26 March 2018 Keywords: Steganography Robustness Watermark Neural network Discrete cosine transform DCT a b s t r a c t The article deals with the issue of using an apparatus of neural networks in the area of steganography. A new method called STEGONN was proposed. The proposed method is robust enough to an attack and the hidden message hard to be falsified. The core of our work lies in a design and implementation of a method for the use of neural networks as a native coder and decoder of a secret message (digital watermark) with an emphasis on the minimum necessary level of image data modification covermedium. A covermedium is not perceived as a passive cover of a secret message, but we make active use of cover medium data, primarily its data markers (image markers) to insert a secret message. The advantage over other stegano- graphic methods is the fact that the method implicitly offer the possibility to detect corrupted parts of the stegomedium and inform the user about possible manipulation with the image. The characteristics of the proposed method have been experimentally verified and compared with commercially available steganographic applications. © 2018 Elsevier B.V. All rights reserved. 1. Introduction The aim of steganography is to hide a message (information, data) in a place where no one expects it while its presence is not detectable. Authors [11] mention three aspects of assessing systems for hiding information: capacity security robustness Capacity is understood as the amount of information which can be hidden in the medium, security represents impossibility of an intruder to reveal the secret message, and robustness expresses the capability of the medium to hold hidden data even after its possible modification. The steganographic process is depicted in Fig. 1 The issue of hiding information in graphical data is complicated primarily due to its demands on sufficient robustness and capac- ity to insert a secret message into image data, where the data should be modified the least possible. An ideal state is when a secret information is inserted into image data so that the image data itself (covermedium) is not modified in any way, i.e. cover- medium = stegomedium. Corresponding author. E-mail addresses: robert.jarusek@osu.cz (R. Jarusek), eva.volna@osu.cz (E. Volna), martin.kotyrba@osu.cz (M. Kotyrba). 2. Current steganographic methods Currently, there are four basic steganographic methods, namely: End Of File (EOF) [3], Least significant bit (LSB) [9], and meth- ods based on the use of Discrete Cosine Transform (DCT) [1] or Discrete Wavelet Transform (DWT) [4]. Models to effectively cal- culate the degree of digital image’s trustworthiness are mentioned in [14]. Table 1 provides a comparison of selected Steganographic approaches. The levels where individual algorithms meet the requirements are defined as none, low, medium, and high. The comparative criteria are as follows: Visibility: subjective visibility of a secret message in a ste- gomedium PSNR (peak signal-to-noise ratio) expresses the ratio between the maximum possible energy of signal and the energy of noise defined by the relation (1) PSNR = 10 · log 10 MAX 2 MSE = 20 · log 10 MAX MSE (1) where MAX is the maximum possible value of a pixel in an image (i.e. 255 for 8 bits per channel). https://doi.org/10.1016/j.asoc.2018.03.023 1568-4946/© 2018 Elsevier B.V. All rights reserved.