{"id":"https://openalex.org/W4406461863","doi":"https://doi.org/10.1109/bigdata62323.2024.10825959","title":"From Spatial to Frequency Domain: Defending Medical Image Classification Against Steganography-Based Adversarial Attacks","display_name":"From Spatial to Frequency Domain: Defending Medical Image Classification Against Steganography-Based Adversarial Attacks","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406461863","doi":"https://doi.org/10.1109/bigdata62323.2024.10825959"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata62323.2024.10825959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825959","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115905200","display_name":"Farah Aladwan","orcid":null},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Farah Aladwan","raw_affiliation_strings":["Anglia Ruskin University,School of Computing and Information Science,UK"],"affiliations":[{"raw_affiliation_string":"Anglia Ruskin University,School of Computing and Information Science,UK","institution_ids":["https://openalex.org/I51216347"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039235730","display_name":"Raj Mani Shukla","orcid":"https://orcid.org/0000-0002-8239-7325"},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Raj Mani Shukla","raw_affiliation_strings":["Anglia Ruskin University,School of Computing and Information Science,UK"],"affiliations":[{"raw_affiliation_string":"Anglia Ruskin University,School of Computing and Information Science,UK","institution_ids":["https://openalex.org/I51216347"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084359988","display_name":"Hossein Abroshan","orcid":"https://orcid.org/0000-0001-9315-4428"},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hossein Abroshan","raw_affiliation_strings":["Anglia Ruskin University,School of Computing and Information Science,UK"],"affiliations":[{"raw_affiliation_string":"Anglia Ruskin University,School of Computing and Information Science,UK","institution_ids":["https://openalex.org/I51216347"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058734055","display_name":"Shareeful Islam","orcid":"https://orcid.org/0000-0003-0885-1881"},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shareeful Islam","raw_affiliation_strings":["Anglia Ruskin University,School of Computing and Information Science,UK"],"affiliations":[{"raw_affiliation_string":"Anglia Ruskin University,School of Computing and Information Science,UK","institution_ids":["https://openalex.org/I51216347"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103321085","display_name":"Ronak Al-Haddad","orcid":"https://orcid.org/0009-0004-1593-3337"},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ronak Al-Haddad","raw_affiliation_strings":["Anglia Ruskin University,School of Computing and Information Science,UK"],"affiliations":[{"raw_affiliation_string":"Anglia Ruskin University,School of Computing and Information Science,UK","institution_ids":["https://openalex.org/I51216347"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5115905200"],"corresponding_institution_ids":["https://openalex.org/I51216347"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23850124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4466","last_page":"4473"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11515","display_name":"Bacillus and Francisella bacterial research","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8300557136535645},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7118217349052429},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.674950361251831},{"id":"https://openalex.org/keywords/frequency-domain","display_name":"Frequency domain","score":0.5534552931785583},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5332127809524536},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5172848701477051},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4407120645046234},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42597830295562744},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.39674609899520874},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.38119709491729736},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1260126531124115}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8300557136535645},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7118217349052429},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.674950361251831},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.5534552931785583},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5332127809524536},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5172848701477051},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4407120645046234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42597830295562744},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.39674609899520874},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.38119709491729736},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1260126531124115},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata62323.2024.10825959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825959","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W569478347","https://openalex.org/W1673923490","https://openalex.org/W1794737594","https://openalex.org/W1945616565","https://openalex.org/W2103320971","https://openalex.org/W2306226233","https://openalex.org/W2607219512","https://openalex.org/W2618043096","https://openalex.org/W2620038827","https://openalex.org/W2749193951","https://openalex.org/W2771036112","https://openalex.org/W2834603693","https://openalex.org/W2962933288","https://openalex.org/W2963001136","https://openalex.org/W2963542245","https://openalex.org/W2963744840","https://openalex.org/W2963857521","https://openalex.org/W2964082701","https://openalex.org/W3102720581","https://openalex.org/W3175786209","https://openalex.org/W4293568373","https://openalex.org/W4293846201","https://openalex.org/W4300725094","https://openalex.org/W4377130655","https://openalex.org/W4386962652","https://openalex.org/W4396214365","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6698362697","https://openalex.org/W6725195833","https://openalex.org/W6743223498","https://openalex.org/W6745272055","https://openalex.org/W6746523225","https://openalex.org/W6748475379","https://openalex.org/W6780248173","https://openalex.org/W6852865405"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W2990774877","https://openalex.org/W3093339210"],"abstract_inverted_index":{"Deep":[0],"learning":[1,242],"models":[2,243],"have":[3,32],"demonstrated":[4],"exceptional":[5],"performance":[6],"in":[7,22,147,217],"medical":[8],"image":[9,58,194,219],"classification":[10],"tasks.":[11],"However,":[12],"their":[13],"susceptibility":[14,223],"to":[15,35,43,88,103,119,142,200,224],"adversarial":[16,84,109,132,154,186,205,225,249],"attacks":[17,85,112,133],"raises":[18],"significant":[19],"concerns,":[20],"especially":[21],"critical":[23],"domains":[24],"like":[25],"healthcare.":[26],"In":[27,72],"response,":[28,73],"various":[29],"defense":[30,233],"mechanisms":[31,234],"been":[33],"developed":[34],"enhance":[36,44,108],"model":[37,45,62],"robustness.":[38],"Despite":[39],"the":[40,66,125,151,171,202,238],"efforts":[41],"made":[42],"robustness,":[46],"many":[47],"existing":[48],"methods":[49,189],"face":[50],"limitations,":[51],"such":[52],"as":[53,182],"high":[54],"computational":[55],"costs,":[56],"degraded":[57],"quality,":[59],"and":[60,115,139,163,178,196],"reduced":[61],"accuracy,":[63],"which":[64,99],"motivate":[65],"need":[67,126],"for":[68,127,136],"more":[69,134],"effective":[70],"solutions.":[71],"this":[74,208],"study":[75],"examines":[76],"how":[77,96],"resilient":[78],"neural":[79],"networks":[80],"(NNs)":[81],"are":[82,100],"against":[83,185,244],"when":[86],"used":[87,181],"classify":[89],"chest":[90],"X-ray":[91],"images.":[92,148],"This":[93],"article":[94],"addresses":[95],"steganography":[97],"techniques,":[98],"often":[101],"utilized":[102],"embed":[104],"data":[105],"imperceptibly,":[106],"could":[107],"perturbations,":[110],"making":[111,131],"less":[113],"visible":[114],"posing":[116],"a":[117,245],"challenge":[118],"current":[120],"defenses.":[121],"These":[122,188],"techniques":[123],"highlight":[124],"stronger":[128],"defenses":[129],"by":[130,144,170],"difficult":[135],"automated":[137],"systems":[138],"human":[140],"observers":[141],"detect":[143],"hiding":[145],"perturbations":[146,155],"We":[149],"investigate":[150],"embedding":[152],"of":[153,173,193,204,240,248],"using":[156],"wavelet,":[157],"Joint":[158],"Photographic":[159],"Experts":[160],"Group":[161],"(JPEG),":[162],"discrete":[164,174],"cosine":[165],"transform":[166,176],"(DCT)":[167],"methods,":[168],"followed":[169],"application":[172],"Fourier":[175],"(DFT),":[177],"Gaussian":[179],"filtering":[180],"defensive":[183],"strategies":[184],"attacks.":[187],"leverage":[190],"distinct":[191],"properties":[192],"processing":[195],"frequency":[197],"domain":[198],"analysis":[199],"mitigate":[201],"impact":[203],"perturbations.":[206],"Furthermore,":[207],"paper":[209],"comprehensively":[210],"analyzes":[211],"each":[212],"technique,":[213],"detailing":[214],"its":[215],"effectiveness":[216],"preserving":[218],"quality":[220],"while":[221],"reducing":[222],"noise.":[226],"Our":[227],"findings":[228],"demonstrate":[229],"that":[230],"combining":[231],"these":[232],"can":[235],"significantly":[236],"improve":[237],"resilience":[239],"machine":[241],"wide":[246],"range":[247],"strategies.":[250]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
