Steganalysis -Iterative Rule Learning to Discover Patterns

Authors

  • Megala G Computer Science and Engineering, N.S.S College of Engineering, Palakkad, Kerala
  • Mohan M Computer Science and Engineering, N.S.S College of Engineering, Palakkad, Kerala

DOI:

https://doi.org/10.26438/ijcse/v6si6.4347

Keywords:

Steganalysis, Fuzzy rules, Evolutionary Genetic Algorithm, Iterative Rule Learning

Abstract

In these years, everything is leading to new development and digitization. With these developments in technology, main challenge which exists is the threat of security. Steganography method usually embeds the sensitive messages in visually innocent cover images. The target of steganalysis is to determine the stego images from that of empty images. Every method depending on its hiding capacity of secret data in images place a unique markings or signature in stego images. To find this kind of markings in the images leads us to encorporate a classifier to be made for the purpose of finding the stego images which are usually the outcome of such steganography algorithm. In this, approach involves an evolutionary fuzzy rules to take out the markings of stego images in contrast to those empty images. Thus by using knowledge discovered, appropriate models for steganalysis can be involved and stego images can be found out and evolutionary algorithm can be optimized well. Thus the particular signature of steganographic method can be taken out well and also the kind of method used to produce stego image can be predicted.

References

[1]HediehSajedi, “Steganalysis based on steganography pattern discovery”, journal of information security and applications, Vol. 30, pp. 3-14, 2016.

[2]David Garcia, Antonio Gonzalez, Raul Perz, “A feature Construction approach for Genetic Iterative Rule learning Algorithm”, Journal of Computer and System Science, Vol. 80, pp. 101-117, 2014.

[3]Archana O. Vyas, Dr. Sanjay V. Dudul, “Study of Image Steganalysis Techniques”, International Journal of Advanced Research in Computer Science, Vol.6, pp.7-11, 2015.

[4]Xiangwei Kong, Chaouy Feng, Ming Li, Yanqing Guo, “Iterative multi-order feature Alignment for JPEG mismatched Steganalysis”, Neuro computing, Vol. 6, pp. 1 - 13, 2016.

[5]Daniel-Lerch Hostalot, David Magias, “Unsupervised Steganalysis based on Artificial Training sets”, Engineering Applications of Artificial Intelligence, Vol. 50, pp. 45-59, 2016.

[6]Kaushal Solankitt, Anindya Sarkart, B.S.Manjunath, “YASS: Yet Another Steganographic Scheme that Resists Blind Steganalysis”, 2017.

[7]Phill Salee, “Model Based Steganography”, Proc. Conference on Computer Science, 2016.

[8]Jessica Fridrich, Miroslav Goljan, David Soukal, “Perturbed Quantization Steganography with Wet Paper Codes”, Conference on ACM, 2004.

[9]Huai-xiang Zhang, Bo Zhang, Feng Wang, “Automatic Fuzzy Rules Generation Using Fuzzy Genetic Algorithm”, Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009.

[10]Shyi-Ming Chen, Fu-Ming Tsai, “Generating Fuzzy Rules from training instances for fuzzy classification systems”, Expert Systems with Applications, Vol. 35, Issue. 7, pp. 971–987, 2002.

[11]http://www.cs.washington.edu/research/imagedatabase

[12]Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, Chung-Cheng Chiu, “Active steganalysis for histogramshifting based reversible data hiding”, Optics Communications, Vol. 285, pp. 2510-2518, 2012.

[13]R.Chandramouli, “A mathematical framework for active steganalysis”, Multimedia systems, Vol. 9, pp. 303-311, 2003.

Downloads

Published

2018-07-31
CITATION
DOI: 10.26438/ijcse/v6si6.4347
Published: 2018-07-31

How to Cite

[1]
G. Megala and M. Mohan, “Steganalysis -Iterative Rule Learning to Discover Patterns”, Int. J. Comp. Sci. Eng., vol. 6, no. 6, pp. 43–47, Jul. 2018.