Impact of features selected by Principal Component Analysis in featured based steganalysis in calibrated and non-calibrated images

Authors

  • Deepa D. Shankar Banasthali Vidyapith, Rajasthan Author

DOI:

https://doi.org/10.61841/hbyfmz89

Keywords:

Steganalysis, DCT, feature set,, PCA, SVM classifier.

Abstract

Steganalysis is helpful in finding the hidden information/data/message in cover images. In simple form, the confidential and concealed message has to be extracted efficiently in steganalysis. This paper performs universal steganalysis based on the features using F5 and Pixel Value Differencing (PVD) algorithms. The feature extraction is carried out through Discrete Cosine Transform (DCT) techniques. The dimensions or size of the feature vector/ feature set is reasonably diminished by Principal Component Analysis (PCA). The extracted features are the combined DCT and Markovian features that have 274 features. These features are inputted to the Linear Support Vector Machine (SVM) for classifying the stego and cover image. Prior to analysis, the images are calibrated so as to improve the efficiency of classifier. The analysis is done with different embedding percentages and the training and testing images are split in the ratio of 80 and 20 for SVM classifier.

 

Downloads

Download data is not yet available.

References

1. Al-Shaaby, A., & Al-Kharobi, T. (2017). Cryptography and Steganography: New Approach. Transactions on Networks and Communications (Vol. 5).

2. Alimoradi, D., & Hasanzadeh, M. (2014). The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images. Journal of Computing and Security, 1(1), 39–46.

3. Amritha, P., & Adathil, A. (2014). Payload Estimation in Universal Steganalysis. Defence Science Journal, 60(4), 412–414.

4. Bachrach, M., & Shih, F. Y. (2011). Image steganography and steganalysis. Wiley Interdisciplinary Reviews: Computational Statistics, 3(3), 251–259.

5. Badr, S. M., Smaial, G., & H. Khalil, A. (2014). A Review on Steganalysis Techniques: From Image Format Point of View. International Journal of Computer Applications, 102(4), 11–19.

6. Cao, G., & Bouman, C. (2008). Covariance estimation for high dimensional data vectors using the sparse matrix transform. Advances in Neural Information Processing Systems (NIPS), 1–9.

7. Clark, D. (2006). Variance and covariance due to inflation. CAS Forum, 61–95.

8. Das, S., Das, S., Bandyopadhyay, B., & Sanyal, S. (2011). Steganography and Steganalysis: Different Approaches.

9. Duric, Z., Jacobs, M., & Jajodia, S. (2005). Information Hiding: Steganography and Steganalysis (pp. 171–187).

10. Eltyeb, E. (2013). Comparison of LSB Steganography in BMP and JPEG Images. International Journal of Soft Computing and Engineering (IJSCE), 3(5), 91–95.

11. Fazli, S., & Zolfaghari-Nejad, M. (2012). A New Steganalysis Method for Steganographic Images on DWT Domain. International Journal of Science and Engineering Investigations, 1(2), 1–4.

12. Fridrich, J. (2004). Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes (pp. 67–81)

13. He, F. Y., Zhong, S. P., & Chen, K. Z. (2012). JPEG Steganalysis Based on Feature Fusion by Principal Component Analysis. Applied Mechanics and Materials, 263–266, 2933–2938.

14. Huang, F., & Huang, J. (2009). Calibration based universal JPEG steganalysis. Science in China Series F: Information Sciences (Vol. 52).

15. Jain, D., & Singh, V. (2018). An Efficient Hybrid Feature Selection model for Dimensionality Reduction. Procedia Computer Science, 132, 333–341.

16. Kanan, C., & Cottrell, G. W. (2012). Color-to-Grayscale: Does the Method Matter in Image Recognition? PLoS ONE, 7(1), e29740.

17. Kodovský, J., & Fridrich, J. (2009). Calibration revisited, 63.

18. Kumar, T., & Verma, K. (2010). A Theory Based on Conversion of RGB image to Gray image. International Journal of Computer Applications (Vol. 7).

19. Lever, J., Krzywinski, M., & Altman, N. (2017). Points of Significance: Principal component analysis. Nature Methods, 14(7), 641–642.

20. Li, E., & Yu, J. (2017). A Forensic Mobile Application Designed for both Steganalysis and Steganography in Digital Images. Electronic Imaging, 2017(6), 84–89.

21. Liu, Q., Sung, A. H., Qiao, M., Chen, Z., & Ribeiro, B. (2010). An improved approach to steganalysis of JPEG images. Information Sciences, 180(9), 1643–1655.

22. Mishra, S., Sarkar, U., Taraphder, S., Datta, S., Swain, D., Saikhom, R., Laishram, M. (2017). Principal Component Analysis. International Journal of Livestock Research, 1.

23. Mohammadi, F. G., & Abadeh, M. S. (2014). Image steganalysis using a bee colony based feature selection algorithm. Engineering Applications of Artificial Intelligence, 31, 35–43.

24. Mohammadi, F. G., & Sajedi, H. (2017). Region based Image Steganalysis using Artificial Bee Colony. Journal of Visual Communication and Image Representation, 44, 214–226.

25. Pathak, P., & Selvakumar, S. (2014). Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation. Digital Investigation, 11(1), 67–77.

26. Paul, L. C., Suman, A. Al, & Sultan, N. (2013). Methodological Analysis of Principal Component Analysis (PCA) Method. IJCEM International Journal of Computational Engineering & Management ISSN, 16(2), 2230–7893.

27. Pevny, T., & Fridrich, J. (2007). Merging Markov and DCT features for multi-class JPEG steganalysis. Security, Steganography, and Watermarking of Multimedia Contents IX, 6505, 650503.

28. Prasad, S., & Pal, A. K. (2017). An RGB colour image steganography scheme using overlapping block- based pixel-value differencing. Royal Society Open Science, 4(4), 161066.

29. Priya, R. L., Eswaran, P., & Kamakshi, S. L. P. (2013). Blind Steganalysis with Modified Markov Features and RBFNN, 2(5), 2031–2038.

30. Pujari, M. A. A., & Shinde, M. S. S. (2016). Data Security using Cryptography and Steganography. IOSR Journal of Computer Engineering, 18(04), 130–139.

31. Rabee, A. M., Mohamed, M. H., & Mahdy, Y. B. (2018). Blind JPEG steganalysis based on DCT coefficients differences. Multimedia Tools and Applications, 77(6), 7763–7777.

32. Sabeti, V., Samavi, S., Mahdavi, M., & Shirani, S. (2007). Steganalysis of Pixel-Value Differencing Steganographic Method. In 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (pp. 292–295). IEEE.

33. Sabnis, S. K., & Awale, R. N. (2016). Statistical Steganalysis of High Capacity Image Steganography with Cryptography. Procedia Computer Science, 79, 321–327.

34. Swagota Bera, M., & Sharma, M. (2015). A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis. International Journal of Engineering Research and Development, 11(09), 2278–67.

35. Tanwar, R., & Malhotrab, S. (2017). Scope of Support Vector Machine in Steganography. IOP Conference Series: Materials Science and Engineering, 225, 012077.

36. Veena, S. T., & Arivazhagan, S. (2018). Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recognition Letters, 105, 39–49.

37. Vigil, A., Rathor, S. S., & Singh, J. (2016). Secure binary image steganography using F5 algorithm based on data hiding and diffusion techniques (Vol. 9).

38. Voropaev, M. (2009). Variance-covariance based risk allocation in credit portfolios: analytical approximation, (May), 1–9.

39. Watanabe, S., Murakami, K., Furukawa, T., & Zhao, Q. (2016). Steganalysis of JPEG image-based steganography with support vector machine. In 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp. 631–636). IEEE.

40. Wiggins, R. H., Davidson, H. C., Harnsberger, H. R., Lauman, J. R., & Goede, P. A. (2001). Image File Formats: Past, Present, and Future. RadioGraphics, 21(3), 789–798.

41. Xuan, G., Cui, X., Shi, Y. Q., Chen, W., Tong, X., & Huang, C. (2007). JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model. Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007.

42. Zhang, J., Lu, W., Yin, X., Liu, W., & Yeung, Y. (2019). Binary image steganography based on joint distortion measurement. Journal of Visual Communication and Image Representation, 58, 600–605.

Downloads

Published

30.06.2020

How to Cite

Shankar, D. D. (2020). Impact of features selected by Principal Component Analysis in featured based steganalysis in calibrated and non-calibrated images. International Journal of Psychosocial Rehabilitation, 24(6), 4226-4243. https://doi.org/10.61841/hbyfmz89