Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3310986.3311000acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlscConference Proceedingsconference-collections
research-article

A Study on Machine Learning for Steganalysis

Published: 25 January 2019 Publication History

Abstract

Data security is very important when sensitive data are transmitted over the Internet. Steganography and steganalysis techniques can solve the problem of copyright, ownership, and detection malicious data. Steganography is to hide secret data without distortion and steganalysis is to detect the presence of hidden data. In this paper, steganography and steganalysis techniques are described together with machine learning frameworks to show that machine learning framework can be used to detect the secret data hiding in image using steganography algorithms.

References

[1]
Khan, A., Siddiqa, A., Munib, S., and Malik, S. A. 2014. A recent survey of reversible watermarking techniques, Information Sciences 279 (2014), 251--272.
[2]
Subhedar, M. S. and Mankar, V.H. 2014. Current status and key issues in image steganography: a survey, Computer Science Review 13 (2014), 95--113.
[3]
Nissar, A., Mir, A. H. (2010). Classification of steganalysis techniques: a study, Digital Signal Processing 20 (2010), 1758--1770.
[4]
Cho, S., Cha, B. H., Gawecki, M., and Kuo, C. C. 2013. Block-based image steganalysis: algorithm and performance evaluation, J. Vis. Commun. Image R. 24 (2013), 846--856.
[5]
Karampidis, K., Kavallieratour, E., and Papadourakis, G. 2018. A review of image steganalysis techniques for digital forensics. Journal of Information Security and Applications 40 (2018), 217--235.
[6]
Musumeci, F. et al. 2018. An overview on application of machine learning techniques in optical networks. Computer Science, Cornell University Library (Oct. 2018), 1--27. https://arxiv.org/abs/1803.07976
[7]
Lee, J. H., Shin, J., and Realff, M. J. 2018. Machine Learning: overview of the recent progresses and implications for the process systems engineering field. Computer and Chemical Engineering 114 (Oct. 2017), 111--121.
[8]
Schmidhuber, J. 2015. Deep learning in neural networks: an overview. Neural Networks 61 (Oct. 2014), 85--117.
[9]
Machine learning, https://en.wikipedia.org/
[10]
Scikit-learn, https://scikit-learn.org/
[11]
TensorFlow, https://www.tensorflow.org/
[12]
Keras, https://keras.io
[13]
Jung, K.H., 2016. A survey Jung, A survey of reversible data hiding methods in dual images, IETE Technical Review 33 (2016), 441--452.
[14]
Jung, K.H., 2018. A survey of interpolation-based reversible data hiding methods, Multimedia Tools and Applications 77 (2018), 7795--7810.

Cited By

View all
  • (2024)Machine Learning Based Detection of Hidden Data in Network PacketsInformation Systems for Intelligent Systems10.1007/978-981-99-8612-5_44(543-552)Online publication date: 27-Feb-2024
  • (2023)Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block CiphersAdvancements in Smart Computing and Information Security10.1007/978-3-031-23095-0_4(59-69)Online publication date: 11-Jan-2023
  • (2023)StegIm: Image in Image SteganographyICT Innovations 2022. Reshaping the Future Towards a New Normal10.1007/978-3-031-22792-9_2(13-25)Online publication date: 1-Jan-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICMLSC '19: Proceedings of the 3rd International Conference on Machine Learning and Soft Computing
January 2019
268 pages
ISBN:9781450366120
DOI:10.1145/3310986
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 January 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Deep Learning
  2. Machine Learning
  3. Steganalysis
  4. Steganography

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICMLSC 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)38
  • Downloads (Last 6 weeks)8
Reflects downloads up to 29 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Machine Learning Based Detection of Hidden Data in Network PacketsInformation Systems for Intelligent Systems10.1007/978-981-99-8612-5_44(543-552)Online publication date: 27-Feb-2024
  • (2023)Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block CiphersAdvancements in Smart Computing and Information Security10.1007/978-3-031-23095-0_4(59-69)Online publication date: 11-Jan-2023
  • (2023)StegIm: Image in Image SteganographyICT Innovations 2022. Reshaping the Future Towards a New Normal10.1007/978-3-031-22792-9_2(13-25)Online publication date: 1-Jan-2023
  • (2022)Comprising Survey of Steganography & Cryptography: Evaluations, Techniques and Trends in Future Research2022 8th International Conference on Signal Processing and Communication (ICSC)10.1109/ICSC56524.2022.10009533(315-323)Online publication date: 1-Dec-2022
  • (2022)Deep Residual Neural Networks with Attention Mechanism for Spatial Image Steganalysis2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00260(1721-1727)Online publication date: Dec-2022
  • (2022)Information theoretic steganalysis of processed image LSB steganographyMultimedia Tools and Applications10.1007/s11042-022-13931-882:9(13595-13615)Online publication date: 26-Sep-2022
  • (2022)Image Steganography for Confidential Communication and Secured Data StoringSoft Computing for Security Applications10.1007/978-981-19-3590-9_24(315-324)Online publication date: 30-Sep-2022
  • (2022)Securing the COVID Patients’ Medical Records Using Encrypted Image SteganographyICT Systems and Sustainability10.1007/978-981-16-5987-4_43(421-440)Online publication date: 4-Jan-2022
  • (2022)StegYou: Model for Hiding, Retrieving and Detecting Digital Data in ImagesProceedings of the Future Technologies Conference (FTC) 2022, Volume 210.1007/978-3-031-18458-1_32(467-485)Online publication date: 13-Oct-2022
  • (2021)Machine Learning and Deep Learning in Steganography and SteganalysisMultidisciplinary Approach to Modern Digital Steganography10.4018/978-1-7998-7160-6.ch004(75-98)Online publication date: 2021
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media