Skip to main content

2018 | OriginalPaper | Buchkapitel

New Approach to Steganography Detection via Steganalysis Framework

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The aim is to propose basic steganalytical tool that can use multiple methods of analysis. We describe two detection methods that were implemented. These methods include improved detection capability than conventional steganalytical tools thanks to use of artificial neural network and several other innovative improvements. In our work is important to understand the behavior of the targeted steganography algorithm. Then we can use its weaknesses to increase the detection capability. We analyze prepared stegogrammes by application of several conventional algorithms such as image difference. Then we can determine where are the most suitable areas of image for embedding the message by steganography algorithm.
Two of our plug-ins are focused on steganography algorithms Steghide, OutGuess2.0 and F5. These algorithms are open source and easy accessible, so the risk of their abuse is high. We use several approaches, such as calibration process and blockiness calculation to detect the presence of steganography message in suspected image. Calibration process is designed for creation of calibration image, that represents the original cover work and for comparison to suspected image. Blockiness calculation serves us as a statistical metric that react to the presence of secret message. Next we deploy the artificial neural network to improve detection capability.
Second plug-in utilizes a detection method that is based on analysis of inner structures of JPEG format. This detection method uses overall quality calculation based on quantization tables and Huffman coding table. These informations are processed by neural network that is able to decide whatever the suspicious file contains embedded data and which steganography algorithm was used to create this file with tested confidence larger than 93% and for detection capability up to 99%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Doërr, G., Dugelay, J.-L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Sig. Process. 52(10), 2955–2964 (2004)CrossRef Doërr, G., Dugelay, J.-L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Sig. Process. 52(10), 2955–2964 (2004)CrossRef
2.
Zurück zum Zitat Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)CrossRef Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)CrossRef
3.
Zurück zum Zitat Bhattacharyya, S.: A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. J. Global Res. Comput. Sci. 2(4), 1–16 (2011)MathSciNet Bhattacharyya, S.: A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. J. Global Res. Comput. Sci. 2(4), 1–16 (2011)MathSciNet
4.
Zurück zum Zitat Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)CrossRefMATH Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)CrossRefMATH
5.
Zurück zum Zitat Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34(3), 671–683 (2001)CrossRefMATH Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34(3), 671–683 (2001)CrossRefMATH
6.
Zurück zum Zitat Walia, E., Jain, P., Navdeep, N.: An analysis of LSB & DCT based steganography. Global J. Comput. Sci. Technol. 10(1), 4–8 (2010) Walia, E., Jain, P., Navdeep, N.: An analysis of LSB & DCT based steganography. Global J. Comput. Sci. Technol. 10(1), 4–8 (2010)
7.
Zurück zum Zitat Fridrich, J., Goljan, M., Hogea, D.: Attacking the outguess. In: Proceedings of the ACM Workshop on Multimedia and Security. Juan-les-Pins, France (2002) Fridrich, J., Goljan, M., Hogea, D.: Attacking the outguess. In: Proceedings of the ACM Workshop on Multimedia and Security. Juan-les-Pins, France (2002)
8.
Zurück zum Zitat Chen, C.L.P., et al.: A pattern recognition system for JPEG steganography detection. Optics Commun. 285(21), 4252–4261 (2012)CrossRef Chen, C.L.P., et al.: A pattern recognition system for JPEG steganography detection. Optics Commun. 285(21), 4252–4261 (2012)CrossRef
9.
Zurück zum Zitat Liu, Q., et al.: An improved approach to steganalysis of JPEG images. Inf. Sci. 180(9), 1643–1655 (2010)CrossRef Liu, Q., et al.: An improved approach to steganalysis of JPEG images. Inf. Sci. 180(9), 1643–1655 (2010)CrossRef
10.
Zurück zum Zitat Gul, G., Kurugollu, F.: A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). In: International Workshop on Information Hiding, pp. 71–84. Springer, Heidelberg (2011) Gul, G., Kurugollu, F.: A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). In: International Workshop on Information Hiding, pp. 71–84. Springer, Heidelberg (2011)
11.
Zurück zum Zitat Andriotis, P., Oikonomou, G., Tryfonas, T.: JPEG steganography detection with Benford’s Law. Digital Invest. 9(3), 246–257 (2013)CrossRef Andriotis, P., Oikonomou, G., Tryfonas, T.: JPEG steganography detection with Benford’s Law. Digital Invest. 9(3), 246–257 (2013)CrossRef
12.
Zurück zum Zitat Oplatkova, Z., Holoska, J., Zelinka, I., Senkerik, R.: Detection of Steganography Inserted by OutGuess and Steghide by Means of Neural Networks. In: 2009 Third Asia International Conference on Modelling & Simulation, pp. 7–12. IEEE (2009). doi:10.1109/AMS.2009.28. ISBN 9781-4244-4154-9. Accessed 01 Aug 2016 Oplatkova, Z., Holoska, J., Zelinka, I., Senkerik, R.: Detection of Steganography Inserted by OutGuess and Steghide by Means of Neural Networks. In: 2009 Third Asia International Conference on Modelling & Simulation, pp. 7–12. IEEE (2009). doi:10.​1109/​AMS.​2009.​28. ISBN 9781-4244-4154-9. Accessed 01 Aug 2016
13.
Zurück zum Zitat Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: International Workshop on Information Hiding, pp. 67–81. Springer, Heidelberg (2004) Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: International Workshop on Information Hiding, pp. 67–81. Springer, Heidelberg (2004)
14.
Zurück zum Zitat Licev, L., Hendrych, J., Kuncicky, R.: Neural stegoclassifier. In: 2016 6th International Conference on IT Convergence and Security (ICITCS), pp. 1–3. IEEE (2016) Licev, L., Hendrych, J., Kuncicky, R.: Neural stegoclassifier. In: 2016 6th International Conference on IT Convergence and Security (ICITCS), pp. 1–3. IEEE (2016)
15.
Zurück zum Zitat Fu, D., et al.: JPEG steganalysis using empirical transition matrix in block DCT domain. In: MMSP, pp. 310–313 (2006) Fu, D., et al.: JPEG steganalysis using empirical transition matrix in block DCT domain. In: MMSP, pp. 310–313 (2006)
Metadaten
Titel
New Approach to Steganography Detection via Steganalysis Framework
verfasst von
Jakub Hendrych
Radim Kunčický
Lačezar Ličev
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-68321-8_51

Premium Partner