Open Access Open Access  Restricted Access Subscription or Fee Access

Radial Basis Function Neural Network for Image Steganalysis in Computer Forensics

P. Sujatha, S. Purushothaman, R. Rajeswari

Abstract


The covert communication based on steganography is a challenging technology for governments. Using this most powerful technique terrorists and spies communicate with each other to exchange their plan which is not detected by law enforcement. In order to avoid the misusage of steganographic technique, the government needs to find out some powerful techniques to detect the existence of the hidden data in the digital media. This leads to the concept of steganalysis that is used in many fields such as digital forensics, medical imaging, and journalism. Apart from all modern sciences and technologies, Artificial Neural Network (ANN) plays a vital role in capturing and representing both linear and non-linear relationships. ANN is an intelligent system which enables machines to solve problems like human by extracting and storing the knowledge. Hence to incorporate intelligent method for steganalysis, this paper implements Artificial Neural Network to overcome the drawbacks of the conventional methods. The most powerful Radial basis function algorithm is proposed in this paper since it is more suitable for non-linear data. This paper concentrates on detecting the hidden information for digital forensics application.

Keywords


Artificial Neural Network, Covert Communication, Radial Basis Function (RBF), Steganography, Steganalysis

Full Text:

PDF

References


Monisha Sharma, and Swagota Bera, A review on blind still image steganalysis techniques using features extraction and Pattern classification method, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 2, No. 3, p. 117-135, 2012.

Zhi-Min He, Ng, W.W.Y., Chan, P.P.K., Yeung, D.S., Blind steganalysis with high generalization capability for different image databases using L-GEM, International Conference on Machine Learning and Cybernetics (ICMLC), Vol. 4, p. 1690-1695, 2011.

Sheikhan, M., Moin, M.S., and Pezhmanpour, M., Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform, 10th International Conference on Intelligent Systems Design and Applications (ISDA), p. 368-372, 2010.

Ziwen Sun, Hui Li, Zhijian Wu, and Zhiping Zhou, An Image Steganalysis Method Based on Characteristic Function Moments of Wavelet Subbands, International Conference on Artificial Intelligence and Computational Intelligence, Vol. 1, p. 291-295, 2009.

Feng Fan, Wang Jiazhen, Wen Jiafu, and Bai Xiaojia, Effective Features Extraction Approach to Blind Steganalysis, International Workshop on Intelligent Systems and Applications, p. 1-4, 2009.

Shaohui Liu, Lin Ma, Hongxun Yao, and Debin Zhao, Universal Steganalysis Based on Statistical Models Using Reorganization of Block-based DCT Coefficients, 5th International Conference on Information Assurance and Security, Vol. 1, p. 778-781, 2009.

Gul, G., and Kurugollu, F., SVD Based Universal Spatial Domain Image Steganalysis, IEEE Transactions on Information Forensics and Security, Vol. 5, No. 1, p. 349 – 353, 2009,.

Zhuo Li, Kuijun Lu, Xianting Zeng, and Xuezeng Pan, Feature-Based Steganalysis for JPEG Images, International Conference on Digital Image Processing, p. 76-80, 2009.

Xiao Yi Yu, and Aiming Wang, An Investigation of Genetic Algorithm on Steganalysis Techniques, Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP '09, p. 1118-1121, 2009.

Xue Zhang, and Shang-Ping Zhong, Blind steganalysis method for BMP images based on statistical MWCF and F-score method, International Conference on Wavelet Analysis and Pattern Recognition, p. 442-447, 2009,

Xiongfei He, Fenlin Liu, Xiangyang Luo, and Chunfang Yang, Classification between PS and Stego Images Based on Noise Model, 3rd International Conference on Multimedia and Ubiquitous Engineering, p. 31-36, 2009,.

Ziwen Sun, Hui Li, Zhijian Wu, and Zhiping Zhou, An Image Steganalysis Method Based on Characteristic Function Moments of Wavelet Subbands, International Conference on Artificial Intelligence and Computational Intelligence, Vol. 1, p. 291-295, 2009.

Chao-en Zhou, Jiu-chao Feng, and Yi-xian Yang, Blind steganalysis based on features in fractional Fourier transform domain Communications, International Conference on Circuits and Systems, p. 301-303, 2009.

Malekmohamadi, H., and Ghaemmaghami, S., Reduced complexity enhancement of steganalysis of LSB-matching image steganography, IEEE/ACS International Conference on Computer Systems and Applications, p. 1013-1017, 2009.

Han Zong, Fenlin Liu, and Xiangyang Luo, A wavelet-based blind JPEG image steganalysis using co-occurrence matrix, 11th International Conference on Advanced Communication Technology (ICACT), Vol. 3, p. 1933-1936, 2009.

Mei-Ching Chen, Agaian, S.S., Chen, C.L.P., and Rodriguez, B.M., Steganography detection using RBFNN, International Conference on Machine Learning and Cybernetics, Vol. 7, p. 3720-3725, 2008.

Yuan Liu, Li Huang, Ping Wang, and Guodong Wang, A blind image steganalysis based on features from three domains, Proceedings of Control and Decision Conference (CCDC), p. 2933-2936, 2008.

Lingna Hu, Lingge Jiang, and Chen He, A novel steganalysis of LSB matching based on kernel FDA in grayscale images, International Conference on Neural Networks and Signal Processing, p. 556-559, 2008.

Ferreira, R., Ribeiro, B., Silva, C., and Qingzhong Liu Sung, A.H., Building resilient classifiers for LSB matching steganography, IEEE International Joint Conference on Neural Networks (IJCNN), p. 1562-1567, 2008.

Chen, C., Shi, Y. Q., Chen, W., and Xuan, G., Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function, IEEE International Conference on Image Processing, p. 105–108, 2006.

Liang Sun, Chong-Zhao Han, Ning Dai, and Jian-Jing Shen, Feature Selection Based on Bhattacharyya Distance: A Generalized Rough Set Method, Sixth World Congress on Intelligent Control and Automation, WCICA, Vol. 2, p. 101-105, 2006.

Hong Cai, Sos, Agaian, S., and Yufeng Wang, An Effective Algorithm for Breaking F5, 7th IEEE International Workshop on Multimedia Signal Processing, Shanghai, p. 1-4, 2005.

Yun Shi, Q., Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, and Wen Chen, Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function, IEEE International Conference on Information Technology: Coding and Computing, Vol. 1, p. 768-773, 2005.

Ming Jiang, Edward Wong, Nasir Memon, and Xiaolin Wu, A simple Technique for Estimating Message Lengths for Additive Noise Steganography, 8th International Conference on Control, Automation, Robotics and Vision (ICARCV), Kunming, China, p. 983-986, 2004.

Jacob Jackson, T., Gregg Gunsch, H., Roger Claypoole, L., Jr, and Gary Lamont, B., Blind Steganography Detection Using a Computational Immune System: A Work in Progress, International Journal of Digital Evidence, Vol. 4, No. 1, p. 1-19, 2003.

Chandramouli, R., and Subbalakshmi, K.P., , Active Steganalysis of Spread Spectrum Image Steganography, Proceedings of International Symposium on Circuits and Systems, ISCAS, Vol. 3, p. 830-833, 2003.

Chandramouli, R., A mathematical framework for active steganalysis, ACM Multimedia Systems, Vol. 9, No. 3, p. 303-311, 2003.

Fridrich, J., and Goljan, M, Digital image steganography using stochastic modulation, Proceedings of IST/SPIE’s 15th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA, 2003.

Fridrich, J., and Goljan, M, Digital image steganography using stochastic modulation, Proceedings of IST/SPIE’s 15th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. 2003

Lyu, S., and Farid, H, Detecting Hidden Messages using Higher order Statistics and Support Vector Machines, Lecture Notes in Computer Science, Vol. 2578, p. 340-354., 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.