Skip to main content

Performance Study of Combined Artificial Neural Network Algorithms for Image Steganalysis

  • Conference paper
  • First Online:
Proceedings of International Conference on Internet Computing and Information Communications

Abstract

Steganalaysis is a technique for detecting the presence of hidden information. Artificial neural network (ANN) is a widespread method for steganalysis. Back propagation algorithm (BPA), radial basis function (RBF), and functional update back propagation algorithm (FUBPA) are some of the popular ANN algorithms for detecting hidden information. Training and testing performance is improved when two algorithms are combined instead of using them separately. This paper analyzes the performance of combined algorithms of BPARBF and FUBPARBF. Among the two combinations FUBPARBF provides promising results than BPARBF since FUBPA uses less number of iterations for the network to converge. But still organizing the retrieved information is a challenging task.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Martin, A., Sapiro, G., Seroussi, G.: Is image steganography natural? IEEE Trans. Image Process. 14(12), 2040–2050 (2005)

    Article  Google Scholar 

  2. Sullivan, K., Bi, Z., Madhow, U., Chandrasekaran, S., Manjunath, B.S.: Steganalysis of quantization index modulation data hiding. In: Proceedings of IEEE International Conference on Image Processing (ICIP), pp. 1165–1168 Singapore (2004)

    Google Scholar 

  3. Fu, D., Shi Y.Q., Zou, D., Xuan, G.: JPEG steganalysis using empirical transition matrix in block DCT domain. In: Proceedings of 8th IEEE International workshop on Multimedia Signal Processing, pp. 310–313 Victoria, BC (2006)

    Google Scholar 

  4. Shi, Y.Q., Xuan, G., Zou, D., Gao, J., Yang, C., Zhang, Z., Chai, P., Chen, W., Chen, C.: Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. IEEE International Conference on Multimedia and Expo, ICME, Newark pp. 1-4, 6–8 July 2005

    Google Scholar 

  5. Mehrabi, M.A., Faez, K., Bayesteh, A.R.: Image steganalysis based on statistical moments of wavelet sub band histograms in different frequencies and support vector machine. In: 3rd International Conference on Natural Computation,Haikou, vol. 1, pp. 587–590 August 2007

    Google Scholar 

  6. Wang, Y., Moulin, P.: Optimized feature extraction for learning-based image steganalysis. IEEE Trans. Inform. Forens. Secur. 2(1), 31–45 (2007)

    Article  Google Scholar 

  7. Gul, G., Kurugollu, F.: SVD based universal spatial domain image steganalysis. IEEE Trans. Inform. Forens. Secur. 5(2), 349–353 (2010)

    Article  Google Scholar 

  8. Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE Trans. Image Process. 12(2), 221–229 (2003)

    Article  MathSciNet  Google Scholar 

  9. Zhi, L., Fen, S.A. Detection of random LSB image steganography. In: 60th IEEE International Conference on Vehicular Technology, China vol. 3, pp. 2113-2117 September 2004

    Google Scholar 

  10. Chandramouli, R.: A mathematical framework for active steganalysis. ACM Multimedia Syst. 9(3), 303–311 (2003)

    Article  Google Scholar 

  11. Farid H.: Detecting hidden messages using higher-order statistical models. In: Proceedings of IEEE International Conference on Image Processing, pp. 905–908 New York (2002)

    Google Scholar 

  12. Wu, X., Dumitrescu, S., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: 5th International Workshop on Information Hiding, London pp. 355–372 (2002)

    Google Scholar 

  13. Yu, X.Y., Wang, A.: Steganalysis based on regression model and Bayesion network. In: International Conference on Multimedia Information Networking and Security, MINES ‘09.Hubei, vol. 1, pp.41–44 (2009)

    Google Scholar 

  14. Lin, J.-Q.,Zhong, S.-P.: JPEG image steganalysis method based on binary similarity measures. International Conference on Machine Learning and Cybernetics. vol. 4, 2238–2243 (2009)

    Google Scholar 

  15. Zhao, X., Huang, L., Li, L., Yang, W., Chen, Z., Yu, Z.: Steganalysis on character substitution using support vector machine knowledge discovery and data mining, Second International Workshop, Moscow pp. 84–88 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Sujatha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Sujatha, P., Purushothaman, S., Rajeswari, R. (2014). Performance Study of Combined Artificial Neural Network Algorithms for Image Steganalysis. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol 216. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1299-7_41

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1299-7_41

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1298-0

  • Online ISBN: 978-81-322-1299-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics