Skip to main content
Log in

Minor blind feature based Steganalysis for calibrated JPEG images with cross validation and classification using SVM and SVM-PSO

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The spectacular progress of technology related to the information and communication arena throughout the past epoch made the internet a powerful media for faster communication of data. Though this technology is being admired at one side, there equally exists a challenge for safeguarding the data and privacy of information of a personal without any leak in the data and corresponding mistreatment. Hence, the proposed work primarily aims to investigate the internet communication as well as deter any unwanted happenings, which could occur because of the covert communication. The probable presence of hidden messages is inspected in the digital mass media using the technique of steganalysis. The distinctive features are to be identified, chosen and extracted for universal (blind) steganalysis and are decided by the format of image and its transformation. In this paper, the analysis is carried out in JPEG format images and 10% embedding with 10 fold cross validation. The technique of calibration is used to obtain an estimate of the cover image. Four embedded techniques that have been applied for stegananlysis are Least Significant Bit Matching, LSB Replacement, Pixel Value Differencing (PVD) and F5 respectively. Four different sampling like linear, shuffle, stratified and automatic are considered in this paper. The classifiers used for a comparative study are Support Vector Machine (SVM) and SVM- Particle Swarm Optimization (SVM-PSO). Several kernels namely linear, epanechnikov, multi-quadratic, radial, ANOVA and polynomial are used in classification. The classifier is trained to examine every single coefficient as a separate unit for analysis and the outcome of this analysis helps in finding the decision of steganalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Elbasi E, Eskicioglu AM (2006) Naïve Bayes Classifier Based Watermark Detection in Wavelet Transform. In: Gunsel B, Jain AK, Tekalp AM, Sankur B (eds) Multimedia Content Representation, Classification and Security. MRCS 2006. Lecture Notes in Computer Science, vol 4105. Springer, Berlin, Heidelberg

  2. Allegrini JWBBACOMACOF (2018) Error covariance penalized regression: A novel multivariate model combining penalized regression with multivariate error structure. Anal Chim Acta 1011:20–27

  3. Ashu RCA (2014) Performance evaluation of first and second order features for steganalysis. Int J Comput Appl 92(16):17–22

  4. Attaby MFMMAAKAAA (2018) Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng J 9(4):1965–1974

  5. Barkana ISBYBD (2017) Performance analysis of descriptive statistical features in retinal vessel segmentation via fuzzy logic, ANN, SVM, and classifier fusion. Knowl-Based Syst 118:165–176

  6. Bergmeir RJHKC (2018) A note on the validity of cross-validation for evaluating autoregressive time series prediction. Comput Stat Data Anal 120:70–83

  7. Berrar D (2018) Cross-Validation. https://doi.org/10.1016/B978-0-12-809633-8.20349-X

  8. Bhasin V, Bedi P (2013) Steganalysis for JPEG Images Using Extreme Learning Machine. 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp 1361–1366

  9. Bhat VH, Krishna S, Shenoy PD, Venugopal KR, Patnaik LM (2010) “HUBFIRE — A multi-class SVM based JPEG steganalysis using HBCL statistics and Fr Index,” 2010 International Conference on Security and Cryptography (SECRYPT), Athens, pp 1–6

  10. Briffa HGSAWAWJA (2009) Has F5 really been broken? In: 3rd International conference on imaging for crime detection and prevention

  11. Castelli (2019) Supervised learning: Classification. Encycl Bioinforma Comput Biol:342–349

  12. Celik GSMTMU (2004) Universal image steganalysis using rate-distortion curves. In: SPIE 5306, security, steganography, and watermarking of multimedia content

  13. Chaeikar AASS (2019) Ensemble SW image steganalysis: A low dimension method for LSBR detection. Signal Process Image Commun 70:233–245

  14. Christaline JA, Ramesh R, Vaishali D (2014) Steganalysis with Classifier Combinations

  15. Demidova IKYSNSNTL (2017) Intellectual Approaches to Improvement of the Classification Decisions Quality on the Base of the SVM Classifier. Procedia Comput Sci 103:222–230

  16. Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In Proceedings of the 9th workshop on Multimedia & security (MM&Sec '07). Association for Computing Machinery, New York, NY, USA, 3–14

  17. Fridrich J, Goljan M, Hogea D (2003) Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas FAP (ed) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg

  18. Harmsen JJ, Pearlman WA (2004) Kernel Fisher discriminant for steganalysis of JPEG hiding methods, Proc. SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI

  19. Hou TZLJYWX (2017) Combating highly imbalanced steganalysis with small training samples using feature selection. J Vis Commun Image Represent:243–256

  20. Ibrahim RKT (2011) Steganography algorithm to hide secret message inside an image. ArXiv, abs/1112.2809, pp. 102–108

  21. Wu GFXZRA (2016) Unbalanced JPEG image steganalysis via multiview data match. J Vis Commun Image Represent 34:103–107

  22. Jassim FA (2013) A novel steganography algorithm for hiding text in image using five Modulus method. Int J Comput Appl 72(17):39–44

  23. Jegou MDCSH (2008) Hamming embedding and weak geometric consistency for large scale image search. In: Proceedings of the 10th european conference on computer vision

  24. Jiang NMEWXWM (2004) Quantitative steganalysis of binary images. In: International conference on image processing

  25. Jiang WWG (2017) Error estimation based on variance analysis of k -fold cross-validation. Pattern Recogn 69:94–106

  26. Kalita M, Tuithung T (2016) A Comparative Study of Steganography Algorithms of Spatial and Transform Domain

  27. Kang J-S, You Y, Sung MY (2007)Steganography using block-based adaptive threshold,2007 22nd international symposium on computer and information sciences, Ankara, pp 1–7

  28. Kawaguchi E (2005) BPCS-Steganography – Principle and Applications. In: Khosla R, Howlett RJ, Jain LC (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science, vol 3684. Springer, Berlin, Heidelberg

  29. Ker AD, Bas p, Böhme R, Cogranne R, Craver S, Filler T, Fridrich J, Pevný T (2013) Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the first ACM workshop on Information hiding and multimedia security (IH&MMSec '13). Association for Computing Machinery, New York, NY, USA, 45–58

  30. Kodovský J, Fridrich J (2009) Calibration revisited. In: Proceedings of the 11th ACM workshop on Multimedia and security (MM&Sec '09). Association for Computing Machinery, New York, NY, USA, pp 63–74

  31. Kokkinos KGMY (2018) Managing the computational cost of model selection and cross-validation in extreme learning machines via Cholesky, SVD, QR and eigen decompositions. Neurocomputing 295:29–45

  32. Kumar PRMBR (2011) Data Security and Authentication Using Steganography. Int J Comput Sci Inf Technol 2(4):1453–1456

  33. Kumar UP, Shankar DD (2019) Cross-Validation and Blind Feature Analysis of 25 Percent Embedding on JPEG Image Format using SVM. Int J Innov Technol Exploring Eng. https://doi.org/10.35940/ijitee.K1240.09811S19

  34. Kumar UP, Shankar DD (2019) Blind Steganalysis for JPEG Images using SVM and SVM-PSO Classifiers. https://doi.org/10.35940/ijitee.K1250.09811S19

  35. Zhenyu L, Adrian B (2018) Steganalysis of 3D objects using statistics of local feature sets. Inf Sci 415–416(2017):85–99

  36. Malathi P, GireeshKumar T (2016) Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains. Procedia Comput Sci 93:878–885

  37. Mehta NAR (2018) Splicing detection for combined dct, dwt and spatial markov-features using ensemble classifier. Procedia Comput Sci 132:1695–1705

  38. Miche Y, Roue B, Lendasse A, Bas P (2006) A Feature Selection Methodology for Steganalysis. In: Gunsel B, Jain AK, Tekalp AM, Sankur B (eds) Multimedia Content Representation, Classification and Security. MRCS 2006. Lecture Notes in Computer Science, vol 4105. Springer, Berlin, Heidelberg

  39. Miché Y, Bas P, Jutten C, Lendasse A, Simula O (2007) Extracting relevant features of steganographic schemes by feature selection techniques

  40. Miché Y, Bas P, Lendasse A (2010) Using multiple re-embeddings for quantitative steganalysis and image reliability estimation. Int J Comput Appl. https://doi.org/10.5120/4347-046

  41. Nagaraj V, Vijayalakshmi V, Zayaraz G (2011) Modulo based Image Steganography Technique against Statistical and Histogram Analysis

  42. Pathak RK, Meena S (2015) LSB based image steganography using PN sequence & GCD transform, 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, pp 1–5

  43. Pedronette DC, Weng Y, Baldassin A, Hou C (2019) Semi-supervised and active learning through Manifold Reciprocal kNN Graph for image retrieval. Neurocomputing 340:19–31

  44. Pevny T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis, Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 650503

  45. Rajput RANAG (2012) Performance evaluation of exponential discriminant analysis with feature selection for steganalysis. Def Sci J 62(1):19–24

  46. Sajedi H (2016) Steganalysis based on steganography pattern discovery. J Inf Secur Appl 30:3–14

  47. Schaefer G, Stich M (2004) UCID: an uncompressed color image database, Proc. SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia

  48. Sharma A (2016) Security and information hiding based on DNA steganography. Int J Comput Sci Mob Comput 5(3):827–832

  49. Tan Y, Tan W, Guo X (2013) Integrated lossy and lossless compression with LSB Insertion technique in steganography, Proc. SPIE 8878, Fifth International Conference on Digital Image Processing, Beijing

  50. Tang MFWM (2010) an extential steganalysis of information hiding for F5. In: 2nd international workshop on intelligent systems and applications, pp 1–4

  51. Thai RCFRTH (2014) Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm. IEEE Trans Image Process 23(5):1980–1993

  52. Veena SAST (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105:39–49

  53. Wang YXLZYRBDL (2019) A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability. Pattern Recogn 87:106–117

  54. Wu H, Wu N, Tsai C, Hwang M (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In IEE Proceedings - Vision, Image and Signal Processing, vol. 152, no. 5, pp 611–615

  55. Xia Z, Yang L, Sun X, Liang W, Sun D, Ruan Z (2011) A Learning-Based Steganalytic Method against LSB Matching Steganography

  56. Xu OHYMZDLCCSXMGH-YFY-BSL (2018) Representative splitting cross validation. Chemom Intell Lab Syst 183:29–35

  57. Yu XY, Wang A (2009) Steganalysis Based on Regression Model and Bayesion Network, 2009 International Conference on Multimedia Information Networking and Security, Hubei, pp 41–44

  58. Zhu ZWCCDGY (2018) Regularized fisher linear discriminant through two threshold variation strategies for imbalanced problems. Knowl-Based Syst 150:57–73

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepa D. Shankar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shankar, D.D., Azhakath, A.S. Minor blind feature based Steganalysis for calibrated JPEG images with cross validation and classification using SVM and SVM-PSO. Multimed Tools Appl 80, 4073–4092 (2021). https://doi.org/10.1007/s11042-020-09820-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09820-7

Keywords

Navigation