Steganography is the process of hiding data into public digital medium for secret
communication. The image in which the secret data is hidden is termed
as stego image. The detection of hidden embedded data in the image is the
foundation for blind image steganalysis. The appropriate selection of cover
file type and composition contribute to the successful embedding. A large
number of steganalysis techniques are available for the detection of steganography
in the image. The performance of the steganalysis technique depends
on the ability to extract the discriminative features for the identification of
statistical changes in the image due to the embedded data. The issue encountered
in the blind image steganography is the non-availability of knowledge
about the applied steganography techniques in the images. This paper surveys
various steganalysis methods, different filtering based preprocessing methods,
feature extraction methods, and machine learning based classification methods,
for the proper identification of steganography in the image.
References
[1]
Lerch-Hostalot, D. and Megías, D. (2016) Unsupervised Steganalysis Based on Artificial Training Sets. Engineering Applications of Artificial Intelligence, 50, 45-59. https://doi.org/10.1016/j.engappai.2015.12.013
[2]
Wu, A., Feng, G., Zhang, X. and Ren, Y. (2016) Unbalanced JPEG Image Steganalysis via Multiview Data Match. Journal of Visual Communication and Image Representation, 34, 103-107. https://doi.org/10.1016/j.jvcir.2015.10.013
[3]
Sajedi, H. (2016) Steganalysis Based on Steganography Pattern Discovery. Journal of Information Security and Applications, 30, 3-14. https://doi.org/10.1016/j.jisa.2016.04.001
[4]
Kanan, H.R. and Nazeri, B. (2014) A Novel Image Steganography Scheme with High Embedding Capacity and Tunable Visual Image Quality Based on a Genetic Algorithm. Expert Systems with Applications, 41, 6123-6130. https://doi.org/10.1016/j.eswa.2014.04.022
[5]
Djebbar, F., Ayad, B., Meraim, K.A. and Hamam, H. (2012) Comparative Study of Digital Audio Steganography Techniques. EURASIP Journal on Audio, Speech, and Music Processing, 2012, 1-16. https://doi.org/10.1186/1687-4722-2012-25
[6]
Mandal, P.C. (2012) An Extensive Review of Current Trends in Steganalysis. International Journal of Advanced Research in Computer Engineering & Technology, 1, 215.
[7]
Cho, S., Cha, B.-H., Gawecki, M. and Kuo, C.-C.J. (2013) Block-Based Image Steganalysis: Algorithm and Performance Evaluation. Journal of Visual Communication and Image Representation, 24, 846-856. https://doi.org/10.1016/j.jvcir.2013.05.007
[8]
Goljan, M., Fridrich, J. and Cogranne, R. (2014) Rich Model for Steganalysis of Color Images. 2014 IEEE International Workshop on Information Forensics and Security (WIFS), 185-190. https://doi.org/10.1109/WIFS.2014.7084325
[9]
Guo, J., Guo, Y., Li, L. and Li, M. (2014) A Universal JPEG Image Steganalysis Method Based on Collaborative Representation. International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), 285-289. https://doi.org/10.1109/spac.2014.6982700
[10]
Lerch-Hostalot, D. and Megías, D. (2013) LSB Matching Steganalysis Based on Patterns of Pixel Differences and Random Embedding. Computers & Security, 32, 192-206.
[11]
Xia, Z., Wang, X., Sun, X., Liu, Q. and Xiong, N. (2016) Steganalysis of LSB Matching Using Differences between Nonadjacent Pixels. Multimedia Tools and Applications, 75, 1947-1962. https://doi.org/10.1007/s11042-014-2381-8
[12]
Aneesh, M., Masand, A.A. and Manikantan, K. (2012) Optimal Feature Selection Based on Image Pre-Processing Using Accelerated Binary Particle Swarm Optimization for Enhanced Face Recognition. Procedia Engineering, 30, 750-758.
[13]
Carvajal-Gamez, B.E., Gallegos-Funes, F.J. and Rosales-Silva, A.J. (2013) Color Local Complexity Estimation Based Steganographic (CLCES) Method. Expert Systems with Applications, 40, 1132-1142.
[14]
Gallegos-Funes, F.J., Rosales-Silva, A.J. and Toledo-Lopez, A. (2012) Multichannel Image Processing by Using the Rank M-Type L-Filter. Journal of Visual Communication and Image Representation, 23, 323-330.
[15]
Sajedi, H. and Jamzad, M. (2010) BSS: Boosted Steganography Scheme with Cover Image Preprocessing. Expert systems with Applications, 37, 7703-7710.
[16]
Hussain, C.A., Rao, D.V. and Masthani, S.A. (2016) Robust Pre-Processing Technique Based on Saliency Detection for Content Based Image Retrieval Systems. Procedia Computer Science, 85, 571-580.
[17]
Abhishree, T., Latha, J., Manikantan, K. and Ramachandran, S. (2015) Face Recognition Using Gabor Filter Based Feature Extraction with Anisotropic Diffusion as a Pre-Processing Technique. Procedia Computer Science, 45, 312-321.
[18]
Varadarajan, K., Suhasini, P., Manikantan, K. and Ramachandran, S. (2015) Face Recognition Using Block Based Feature Extraction with CZT and Goertzel-Algo-rithm as a Preprocessing Technique. Procedia Computer Science, 46, 1458-1467.
[19]
Lavangnananda, K. and Waiwing, S. (2015) Effectiveness of Different Preprocessing Techniques on Classification of Various Lengths of Control Charts Patterns. Procedia Computer Science, 69, 44-54.
[20]
Farhat, F. and Ghaemmaghami, S. (2015) Towards Blind Detection of Low-Rate Spatial Embedding in Image Steganalysis. IET Image Processing, 9, 31-42. https://doi.org/10.1049/iet-ipr.2013.0877
[21]
Karimi, H., Shayesteh, M.G. and Akhaee, M.A. (2015) Steganalysis of JPEG Images Using Enhanced Neighbouring Joint Density Features. IET Image Processing, 9, 545-552. https://doi.org/10.1049/iet-ipr.2013.0823
[22]
Song, X., Li, Z., Chen, L. and Liu, J. (2016) Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysis. In: Wang, G., Ray, I., Alcaraz Calero, J. and Thampi, S., Eds., Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science, Vol. 10067, Springer, Cham, 59-72. https://doi.org/10.1007/978-3-319-49145-5_7
[23]
Deepa, G., Keerthi, R., Meghana, N. and Manikantan, K. (2012) Face Recognition Using Spectrum-Based Feature Extraction. Applied Soft Computing, 12, 2913-2923.
[24]
Krisshna, N.A., Deepak, V.K., Manikantan, K. and Ramachandran, S. (2014) Face Recognition Using Transform Domain Feature Extraction and PSO-Based Feature Selection. Applied Soft Computing, 22, 141-161.
[25]
Song, X., Liu, F., Luo, X., Lu, J. and Zhang, Y. (2015) Steganalysis of Perturbed Quantization Steganography Based on the Enhanced Histogram Features. Multimedia Tools and Applications, 74, 11045-11071. https://doi.org/10.1007/s11042-014-2217-6
[26]
Xie, X., Lai, J. and Zheng, W.-S. (2010) Extraction of Illumination Invariant Facial Features from a Single Image Using Nonsubsampled Contourlet Transform. Pattern Recognition, 43, 4177-4189.
[27]
Kodovsky, J., Fridrich, J. and Holub, V. (2012) Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security, 7, 432-444. https://doi.org/10.1109/TIFS.2011.2175919
[28]
Liu, N. and Wang, H. (2010) Ensemble Based Extreme Learning Machine. IEEE Signal Processing Letters, 17, 754-757. https://doi.org/10.1109/LSP.2010.2053356
[29]
Huang, G.-B., Ding, X. and Zhou, H. (2010) Optimization Method Based Extreme Learning Machine for Classification. Neurocomputing, 74, 155-163.
[30]
Huang, G.-B., Zhou, H., Ding, X. and Zhang, R. (2012) Extreme Learning Machine for Regression and Multiclass Classification. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 42, 513-529. https://doi.org/10.1109/TSMCB.2011.2168604
[31]
Bazi, Y., Alajlan, N., Melgani, F., AlHichri, H., Malek, S. and Yager, R.R. (2014) Differential Evolution Extreme Learning Machine for the Classification of Hyperspectral Images. IEEE Geoscience and Remote Sensing Letters, 11, 1066-1070. https://doi.org/10.1109/LGRS.2013.2286078
[32]
Sachnev, V., Ramasamy, S., Sundaram, S., Kim, H.J. and Hwang, H.J. (2015) A Cognitive Ensemble of Extreme Learning Machines for Steganalysis Based on Risk-Sensitive Hinge Loss Function. Cognitive Computation, 7, 103-110. https://doi.org/10.1007/s12559-014-9268-x
[33]
Choi, J.-H., Lee, H.-Y. and Lee, H.-K. (2013) Color Laser Printer Forensic Based on Noisy Feature and Support Vector Machine Classifier. Multimedia Tools and Applications, 67, 363-382. https://doi.org/10.1007/s11042-011-0835-9
[34]
Liu, P., Liu, F., Yang, C. and Song, X. (2015) Improving Steganalysis by Fusing SVM Classifiers for JPEG Images. International Conference on Computer Science and Mechanical Automation (CSMA), Hangzhou, 23-25 October 2015, 185-190. https://doi.org/10.1109/csma.2015.44
[35]
Li, F., Zhang, X., Chen, B. and Feng, G. (2013) JPEG Steganalysis with High-Dimensional Features and Bayesian Ensemble Classifier. IEEE Signal Processing Letters, 20, 233-236. https://doi.org/10.1109/LSP.2013.2240385
[36]
Shankar, D.D., Gireeshkumar, T., Praveen, K., Jithin, R. and Raj, A.S. (2012) Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis. In: Kannan, R. and Andres, F., Eds., Data Engineering and Management. Lecture Notes in Computer Science, Vol. 6411, Springer, Berlin, Heidelberg, 189-195. https://doi.org/10.1007/978-3-642-27872-3_28
[37]
Pevny, T., Bas, P. and Fridrich, J. (2010) Steganalysis by Subtractive Pixel Adjacency matrix. IEEE Transactions on Information Forensics and Security, 5, 215-224. https://doi.org/10.1109/TIFS.2010.2045842
[38]
Liu, Q., Sung, A.H. and Qiao, M. (2009) Improved Detection and Evaluation for JPEG Steganalysis. Proceedings of the 17th ACM International Conference on Multimedia, Beijing, 19-24 October 2009, 873-876. https://doi.org/10.1145/1631272.1631436