  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Fusion: Practice and Applications</full_title>
  <abbrev_title>FPA</abbrev_title>
  <issn media_type="print">2692-4048</issn>
  <issn media_type="electronic">2770-0070</issn>
  <doi_data>
   <doi>10.54216/FPA</doi>
   <resource>https://www.americaspg.com/journals/show/3380</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2018</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2018</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Deep Learning-Based Steganalysis for Detection and Classification of Possible Hidden Content in Images</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, Bisha 61922, Saudi Arabia</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Mostafa</given_name>
    <surname>Mostafa</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Information Systems, College of Computing and Information Technology, University of Bisha, Bisha 61922, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Eftkhar Al</given_name>
    <surname>Al-Qhtani</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, Bisha 61922, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ahmed H.</given_name>
    <surname>Samak</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, Bisha 61922, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Amr</given_name>
    <surname>Ibrahim</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, Bisha 61922, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Mourad</given_name>
    <surname>Elloumi</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Information technology Department, Faculty of Computers and Information, Menoufia University, Egypt</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ali</given_name>
    <surname>Ahmed</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Steganalysis can be defined as the science that addresses the process of identifying and detecting hidden information or data within various types of digital media. Recently, Deep Learning (DL) approaches have been employed to build steganalysis systems. However, the problem with steganalysis systems adopting a DL approach is their low accuracy and their need for effective datasets to be used for the training. In this paper, we introduce a DL-based Steganalysis system for the detection and classification of hidden content in images. Our system, called Steg-Analysis Convolutional Neural Network (SA-CNN), relies on a Convolutional Neural Network (CNN) and uses High Pass Filter (HPF) and extra-embedded data. We also propose a preprocessing-based data hiding method to increase the accuracy of SA-CNN in detecting hidden content. Therefore, this ensures the imperceptibility of images used for training SA-CNN. In addition, we use another CNN, called Malicious-Benign Classification CNN (MBC-CNN), that we have developed to classify the extracted hidden content into Malicious or Benign classes. Compared with existing systems, SA-CNN shows a better performance in terms of accuracy, under increased hiding rates ranging from 0.1 to 1.0 bpp, reaching 90%.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>377</first_page>
   <last_page>393</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/FPA.170228</doi>
   <resource>https://www.americaspg.com/articleinfo/3/show/3380</resource>
  </doi_data>
 </journal_article>
</journal>
