Abstract
The aim is to propose basic steganalytical tool that can use multiple methods of analysis. We describe two detection methods that were implemented. These methods include improved detection capability than conventional steganalytical tools thanks to use of artificial neural network and several other innovative improvements. In our work is important to understand the behavior of the targeted steganography algorithm. Then we can use its weaknesses to increase the detection capability. We analyze prepared stegogrammes by application of several conventional algorithms such as image difference. Then we can determine where are the most suitable areas of image for embedding the message by steganography algorithm.
Two of our plug-ins are focused on steganography algorithms Steghide, OutGuess2.0 and F5. These algorithms are open source and easy accessible, so the risk of their abuse is high. We use several approaches, such as calibration process and blockiness calculation to detect the presence of steganography message in suspected image. Calibration process is designed for creation of calibration image, that represents the original cover work and for comparison to suspected image. Blockiness calculation serves us as a statistical metric that react to the presence of secret message. Next we deploy the artificial neural network to improve detection capability.
Second plug-in utilizes a detection method that is based on analysis of inner structures of JPEG format. This detection method uses overall quality calculation based on quantization tables and Huffman coding table. These informations are processed by neural network that is able to decide whatever the suspicious file contains embedded data and which steganography algorithm was used to create this file with tested confidence larger than 93% and for detection capability up to 99%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Doërr, G., Dugelay, J.-L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Sig. Process. 52(10), 2955–2964 (2004)
Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)
Bhattacharyya, S.: A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. J. Global Res. Comput. Sci. 2(4), 1–16 (2011)
Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)
Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34(3), 671–683 (2001)
Walia, E., Jain, P., Navdeep, N.: An analysis of LSB & DCT based steganography. Global J. Comput. Sci. Technol. 10(1), 4–8 (2010)
Fridrich, J., Goljan, M., Hogea, D.: Attacking the outguess. In: Proceedings of the ACM Workshop on Multimedia and Security. Juan-les-Pins, France (2002)
Chen, C.L.P., et al.: A pattern recognition system for JPEG steganography detection. Optics Commun. 285(21), 4252–4261 (2012)
Liu, Q., et al.: An improved approach to steganalysis of JPEG images. Inf. Sci. 180(9), 1643–1655 (2010)
Gul, G., Kurugollu, F.: A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). In: International Workshop on Information Hiding, pp. 71–84. Springer, Heidelberg (2011)
Andriotis, P., Oikonomou, G., Tryfonas, T.: JPEG steganography detection with Benford’s Law. Digital Invest. 9(3), 246–257 (2013)
Oplatkova, Z., Holoska, J., Zelinka, I., Senkerik, R.: Detection of Steganography Inserted by OutGuess and Steghide by Means of Neural Networks. In: 2009 Third Asia International Conference on Modelling & Simulation, pp. 7–12. IEEE (2009). doi:10.1109/AMS.2009.28. ISBN 9781-4244-4154-9. Accessed 01 Aug 2016
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: International Workshop on Information Hiding, pp. 67–81. Springer, Heidelberg (2004)
Licev, L., Hendrych, J., Kuncicky, R.: Neural stegoclassifier. In: 2016 6th International Conference on IT Convergence and Security (ICITCS), pp. 1–3. IEEE (2016)
Fu, D., et al.: JPEG steganalysis using empirical transition matrix in block DCT domain. In: MMSP, pp. 310–313 (2006)
Acknowledgements
The following grant is acknowledged for the financial support provided for this research: Technology Agency of the Czech Republic - TACR - TF01000091.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Hendrych, J., Kunčický, R., Ličev, L. (2018). New Approach to Steganography Detection via Steganalysis Framework. In: Abraham, A., Kovalev, S., Tarassov, V., Snasel, V., Vasileva, M., Sukhanov, A. (eds) Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’17). IITI 2017. Advances in Intelligent Systems and Computing, vol 679. Springer, Cham. https://doi.org/10.1007/978-3-319-68321-8_51
Download citation
DOI: https://doi.org/10.1007/978-3-319-68321-8_51
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68320-1
Online ISBN: 978-3-319-68321-8
eBook Packages: EngineeringEngineering (R0)