Abstract
The spectacular progress of technology related to the information and communication arena throughout the past epoch made the internet a powerful media for faster communication of data. Though this technology is being admired at one side, there equally exists a challenge for safeguarding the data and privacy of information of a personal without any leak in the data and corresponding mistreatment. Hence, the proposed work primarily aims to investigate the internet communication as well as deter any unwanted happenings, which could occur because of the covert communication. The probable presence of hidden messages is inspected in the digital mass media using the technique of steganalysis. The distinctive features are to be identified, chosen and extracted for universal (blind) steganalysis and are decided by the format of image and its transformation. In this paper, the analysis is carried out in JPEG format images and 10% embedding with 10 fold cross validation. The technique of calibration is used to obtain an estimate of the cover image. Four embedded techniques that have been applied for stegananlysis are Least Significant Bit Matching, LSB Replacement, Pixel Value Differencing (PVD) and F5 respectively. Four different sampling like linear, shuffle, stratified and automatic are considered in this paper. The classifiers used for a comparative study are Support Vector Machine (SVM) and SVM- Particle Swarm Optimization (SVM-PSO). Several kernels namely linear, epanechnikov, multi-quadratic, radial, ANOVA and polynomial are used in classification. The classifier is trained to examine every single coefficient as a separate unit for analysis and the outcome of this analysis helps in finding the decision of steganalysis.
Similar content being viewed by others
References
Elbasi E, Eskicioglu AM (2006) Naïve Bayes Classifier Based Watermark Detection in Wavelet Transform. In: Gunsel B, Jain AK, Tekalp AM, Sankur B (eds) Multimedia Content Representation, Classification and Security. MRCS 2006. Lecture Notes in Computer Science, vol 4105. Springer, Berlin, Heidelberg
Allegrini JWBBACOMACOF (2018) Error covariance penalized regression: A novel multivariate model combining penalized regression with multivariate error structure. Anal Chim Acta 1011:20–27
Ashu RCA (2014) Performance evaluation of first and second order features for steganalysis. Int J Comput Appl 92(16):17–22
Attaby MFMMAAKAAA (2018) Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng J 9(4):1965–1974
Barkana ISBYBD (2017) Performance analysis of descriptive statistical features in retinal vessel segmentation via fuzzy logic, ANN, SVM, and classifier fusion. Knowl-Based Syst 118:165–176
Bergmeir RJHKC (2018) A note on the validity of cross-validation for evaluating autoregressive time series prediction. Comput Stat Data Anal 120:70–83
Berrar D (2018) Cross-Validation. https://doi.org/10.1016/B978-0-12-809633-8.20349-X
Bhasin V, Bedi P (2013) Steganalysis for JPEG Images Using Extreme Learning Machine. 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp 1361–1366
Bhat VH, Krishna S, Shenoy PD, Venugopal KR, Patnaik LM (2010) “HUBFIRE — A multi-class SVM based JPEG steganalysis using HBCL statistics and Fr Index,” 2010 International Conference on Security and Cryptography (SECRYPT), Athens, pp 1–6
Briffa HGSAWAWJA (2009) Has F5 really been broken? In: 3rd International conference on imaging for crime detection and prevention
Castelli (2019) Supervised learning: Classification. Encycl Bioinforma Comput Biol:342–349
Celik GSMTMU (2004) Universal image steganalysis using rate-distortion curves. In: SPIE 5306, security, steganography, and watermarking of multimedia content
Chaeikar AASS (2019) Ensemble SW image steganalysis: A low dimension method for LSBR detection. Signal Process Image Commun 70:233–245
Christaline JA, Ramesh R, Vaishali D (2014) Steganalysis with Classifier Combinations
Demidova IKYSNSNTL (2017) Intellectual Approaches to Improvement of the Classification Decisions Quality on the Base of the SVM Classifier. Procedia Comput Sci 103:222–230
Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In Proceedings of the 9th workshop on Multimedia & security (MM&Sec '07). Association for Computing Machinery, New York, NY, USA, 3–14
Fridrich J, Goljan M, Hogea D (2003) Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas FAP (ed) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg
Harmsen JJ, Pearlman WA (2004) Kernel Fisher discriminant for steganalysis of JPEG hiding methods, Proc. SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI
Hou TZLJYWX (2017) Combating highly imbalanced steganalysis with small training samples using feature selection. J Vis Commun Image Represent:243–256
Ibrahim RKT (2011) Steganography algorithm to hide secret message inside an image. ArXiv, abs/1112.2809, pp. 102–108
Wu GFXZRA (2016) Unbalanced JPEG image steganalysis via multiview data match. J Vis Commun Image Represent 34:103–107
Jassim FA (2013) A novel steganography algorithm for hiding text in image using five Modulus method. Int J Comput Appl 72(17):39–44
Jegou MDCSH (2008) Hamming embedding and weak geometric consistency for large scale image search. In: Proceedings of the 10th european conference on computer vision
Jiang NMEWXWM (2004) Quantitative steganalysis of binary images. In: International conference on image processing
Jiang WWG (2017) Error estimation based on variance analysis of k -fold cross-validation. Pattern Recogn 69:94–106
Kalita M, Tuithung T (2016) A Comparative Study of Steganography Algorithms of Spatial and Transform Domain
Kang J-S, You Y, Sung MY (2007)Steganography using block-based adaptive threshold,2007 22nd international symposium on computer and information sciences, Ankara, pp 1–7
Kawaguchi E (2005) BPCS-Steganography – Principle and Applications. In: Khosla R, Howlett RJ, Jain LC (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science, vol 3684. Springer, Berlin, Heidelberg
Ker AD, Bas p, Böhme R, Cogranne R, Craver S, Filler T, Fridrich J, Pevný T (2013) Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the first ACM workshop on Information hiding and multimedia security (IH&MMSec '13). Association for Computing Machinery, New York, NY, USA, 45–58
Kodovský J, Fridrich J (2009) Calibration revisited. In: Proceedings of the 11th ACM workshop on Multimedia and security (MM&Sec '09). Association for Computing Machinery, New York, NY, USA, pp 63–74
Kokkinos KGMY (2018) Managing the computational cost of model selection and cross-validation in extreme learning machines via Cholesky, SVD, QR and eigen decompositions. Neurocomputing 295:29–45
Kumar PRMBR (2011) Data Security and Authentication Using Steganography. Int J Comput Sci Inf Technol 2(4):1453–1456
Kumar UP, Shankar DD (2019) Cross-Validation and Blind Feature Analysis of 25 Percent Embedding on JPEG Image Format using SVM. Int J Innov Technol Exploring Eng. https://doi.org/10.35940/ijitee.K1240.09811S19
Kumar UP, Shankar DD (2019) Blind Steganalysis for JPEG Images using SVM and SVM-PSO Classifiers. https://doi.org/10.35940/ijitee.K1250.09811S19
Zhenyu L, Adrian B (2018) Steganalysis of 3D objects using statistics of local feature sets. Inf Sci 415–416(2017):85–99
Malathi P, GireeshKumar T (2016) Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains. Procedia Comput Sci 93:878–885
Mehta NAR (2018) Splicing detection for combined dct, dwt and spatial markov-features using ensemble classifier. Procedia Comput Sci 132:1695–1705
Miche Y, Roue B, Lendasse A, Bas P (2006) A Feature Selection Methodology for Steganalysis. In: Gunsel B, Jain AK, Tekalp AM, Sankur B (eds) Multimedia Content Representation, Classification and Security. MRCS 2006. Lecture Notes in Computer Science, vol 4105. Springer, Berlin, Heidelberg
Miché Y, Bas P, Jutten C, Lendasse A, Simula O (2007) Extracting relevant features of steganographic schemes by feature selection techniques
Miché Y, Bas P, Lendasse A (2010) Using multiple re-embeddings for quantitative steganalysis and image reliability estimation. Int J Comput Appl. https://doi.org/10.5120/4347-046
Nagaraj V, Vijayalakshmi V, Zayaraz G (2011) Modulo based Image Steganography Technique against Statistical and Histogram Analysis
Pathak RK, Meena S (2015) LSB based image steganography using PN sequence & GCD transform, 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, pp 1–5
Pedronette DC, Weng Y, Baldassin A, Hou C (2019) Semi-supervised and active learning through Manifold Reciprocal kNN Graph for image retrieval. Neurocomputing 340:19–31
Pevny T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis, Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 650503
Rajput RANAG (2012) Performance evaluation of exponential discriminant analysis with feature selection for steganalysis. Def Sci J 62(1):19–24
Sajedi H (2016) Steganalysis based on steganography pattern discovery. J Inf Secur Appl 30:3–14
Schaefer G, Stich M (2004) UCID: an uncompressed color image database, Proc. SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia
Sharma A (2016) Security and information hiding based on DNA steganography. Int J Comput Sci Mob Comput 5(3):827–832
Tan Y, Tan W, Guo X (2013) Integrated lossy and lossless compression with LSB Insertion technique in steganography, Proc. SPIE 8878, Fifth International Conference on Digital Image Processing, Beijing
Tang MFWM (2010) an extential steganalysis of information hiding for F5. In: 2nd international workshop on intelligent systems and applications, pp 1–4
Thai RCFRTH (2014) Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm. IEEE Trans Image Process 23(5):1980–1993
Veena SAST (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105:39–49
Wang YXLZYRBDL (2019) A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability. Pattern Recogn 87:106–117
Wu H, Wu N, Tsai C, Hwang M (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In IEE Proceedings - Vision, Image and Signal Processing, vol. 152, no. 5, pp 611–615
Xia Z, Yang L, Sun X, Liang W, Sun D, Ruan Z (2011) A Learning-Based Steganalytic Method against LSB Matching Steganography
Xu OHYMZDLCCSXMGH-YFY-BSL (2018) Representative splitting cross validation. Chemom Intell Lab Syst 183:29–35
Yu XY, Wang A (2009) Steganalysis Based on Regression Model and Bayesion Network, 2009 International Conference on Multimedia Information Networking and Security, Hubei, pp 41–44
Zhu ZWCCDGY (2018) Regularized fisher linear discriminant through two threshold variation strategies for imbalanced problems. Knowl-Based Syst 150:57–73
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shankar, D.D., Azhakath, A.S. Minor blind feature based Steganalysis for calibrated JPEG images with cross validation and classification using SVM and SVM-PSO. Multimed Tools Appl 80, 4073–4092 (2021). https://doi.org/10.1007/s11042-020-09820-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09820-7