Chapter 1 STEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION
نویسندگان
چکیده
Several steganography tools are freely available over the Internet, ranging from straight forward least significant embedding to complex transform domain encrypted algorithms within digital images. Given the number of tools available, the digital forensics investigator must not only determine that an image contains embedded hidden information but the method used during the embedding process, also know as detecting a stego fingerprint. The determination of the embedding method is the first step in extracting the hidden information. This paper focuses on identifying the stego fingerprint within jpeg images. The classes of methods targeted are F5, JSteg, Model Based, OutGuess, and StegHide. Each of these embedding methods presents different challenges when attempting to extract the hidden information because each of them embed data in dramatically different ways. The embedding methods are separated by using features developed from sets of stego images developed with the mentioned embedding methods as training data for a multiclass support vector machine classifier. For new images, the image features are calculated and evaluated based on their associated label to the most similar class, i.e. clean or embedding method feature space. Results from the SVM demonstrate that, in the worst case scenario, it is possible to separate the embedding methods by 87.0%.
منابع مشابه
Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...
متن کاملDetection of Fake Accounts in Social Networks Based on One Class Classification
Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...
متن کاملFusion of Multi-class Steg- Analysis Systems Using Bayesian Model Averaging
Several steganography methods are available over the Internet for hiding information within digital images. A digital forensics examiner must be able to extract a hidden message from a digital image. Extraction requires first identifying the embedding method used. Several steganalysis systems exist that identify a subset of the available embedding methods. Each steganalysis systems has its own ...
متن کاملMulti-Class Classification Fusion using Boosting for Identifying Steganography Methods
There are over 250 image steganography methods available on the Internet. In digital image steganalysis an analyst has three goals, first determine if an embedded message exists, next determine the embedding method used to create the stego image and finally extract the hidden message. The objective of this paper lies on the second goal, that is, to identify the embedding technique used to creat...
متن کاملvegetation change detection using multi-temporal remotly sensed data during recent three decades by artificial intelligence technique (Case study: protected area of Bashgol)
Quantitative and qualitative information of vegetation and its changes in duration of time as a basic foundation of determination of habitat quality, priority of protected area and also determination of price of ecosystem services in order to optimum management of natural resources and sustainable development is a very important technical point. In other hand, researchers are interested in rem...
متن کامل