Skip to main content

Abstract

The aim is to propose basic steganalytical tool that can use multiple methods of analysis. We describe two detection methods that were implemented. These methods include improved detection capability than conventional steganalytical tools thanks to use of artificial neural network and several other innovative improvements. In our work is important to understand the behavior of the targeted steganography algorithm. Then we can use its weaknesses to increase the detection capability. We analyze prepared stegogrammes by application of several conventional algorithms such as image difference. Then we can determine where are the most suitable areas of image for embedding the message by steganography algorithm.

Two of our plug-ins are focused on steganography algorithms Steghide, OutGuess2.0 and F5. These algorithms are open source and easy accessible, so the risk of their abuse is high. We use several approaches, such as calibration process and blockiness calculation to detect the presence of steganography message in suspected image. Calibration process is designed for creation of calibration image, that represents the original cover work and for comparison to suspected image. Blockiness calculation serves us as a statistical metric that react to the presence of secret message. Next we deploy the artificial neural network to improve detection capability.

Second plug-in utilizes a detection method that is based on analysis of inner structures of JPEG format. This detection method uses overall quality calculation based on quantization tables and Huffman coding table. These informations are processed by neural network that is able to decide whatever the suspicious file contains embedded data and which steganography algorithm was used to create this file with tested confidence larger than 93% and for detection capability up to 99%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Doërr, G., Dugelay, J.-L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Sig. Process. 52(10), 2955–2964 (2004)

    Article  Google Scholar 

  2. Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)

    Article  Google Scholar 

  3. Bhattacharyya, S.: A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. J. Global Res. Comput. Sci. 2(4), 1–16 (2011)

    MathSciNet  Google Scholar 

  4. Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  MATH  Google Scholar 

  5. Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34(3), 671–683 (2001)

    Article  MATH  Google Scholar 

  6. Walia, E., Jain, P., Navdeep, N.: An analysis of LSB & DCT based steganography. Global J. Comput. Sci. Technol. 10(1), 4–8 (2010)

    Google Scholar 

  7. Fridrich, J., Goljan, M., Hogea, D.: Attacking the outguess. In: Proceedings of the ACM Workshop on Multimedia and Security. Juan-les-Pins, France (2002)

    Google Scholar 

  8. Chen, C.L.P., et al.: A pattern recognition system for JPEG steganography detection. Optics Commun. 285(21), 4252–4261 (2012)

    Article  Google Scholar 

  9. Liu, Q., et al.: An improved approach to steganalysis of JPEG images. Inf. Sci. 180(9), 1643–1655 (2010)

    Article  Google Scholar 

  10. Gul, G., Kurugollu, F.: A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). In: International Workshop on Information Hiding, pp. 71–84. Springer, Heidelberg (2011)

    Google Scholar 

  11. Andriotis, P., Oikonomou, G., Tryfonas, T.: JPEG steganography detection with Benford’s Law. Digital Invest. 9(3), 246–257 (2013)

    Article  Google Scholar 

  12. Oplatkova, Z., Holoska, J., Zelinka, I., Senkerik, R.: Detection of Steganography Inserted by OutGuess and Steghide by Means of Neural Networks. In: 2009 Third Asia International Conference on Modelling & Simulation, pp. 7–12. IEEE (2009). doi:10.1109/AMS.2009.28. ISBN 9781-4244-4154-9. Accessed 01 Aug 2016

  13. Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: International Workshop on Information Hiding, pp. 67–81. Springer, Heidelberg (2004)

    Google Scholar 

  14. Licev, L., Hendrych, J., Kuncicky, R.: Neural stegoclassifier. In: 2016 6th International Conference on IT Convergence and Security (ICITCS), pp. 1–3. IEEE (2016)

    Google Scholar 

  15. Fu, D., et al.: JPEG steganalysis using empirical transition matrix in block DCT domain. In: MMSP, pp. 310–313 (2006)

    Google Scholar 

Download references

Acknowledgements

The following grant is acknowledged for the financial support provided for this research: Technology Agency of the Czech Republic - TACR - TF01000091.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Radim Kunčický .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Hendrych, J., Kunčický, R., Ličev, L. (2018). New Approach to Steganography Detection via Steganalysis Framework. In: Abraham, A., Kovalev, S., Tarassov, V., Snasel, V., Vasileva, M., Sukhanov, A. (eds) Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’17). IITI 2017. Advances in Intelligent Systems and Computing, vol 679. Springer, Cham. https://doi.org/10.1007/978-3-319-68321-8_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68321-8_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68320-1

  • Online ISBN: 978-3-319-68321-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics