Skip to main content

Advertisement

Log in

Nature inspired metaheuristics for improved JPEG steganalysis

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The performance accuracy of JPEG steganalysis depends on the best features extracted from the images. This demands extraction of all possible features that undergo changes during embedding. The computational complexity due to such large number of features necessitates feature set optimization. Existing research in JPEG image steganalysis tend to extract rich feature sets and reduce them by statistical feature reduction techniques. Compared to these techniques, genetic algorithm based optimization techniques are more promising as they converge to global minima. The objective of this paper is to implement genetic based optimization to reduce the high dimensional image features and hence obtain improved classification accuracy. The method implemented includes the extraction of image features in terms of co-occurrence matrices of the differences of all possible Discrete Cosine Transform (DCT) coefficients to give 200 × 23,230 features. These features are optimized by a nature inspired meta-heuristic, Ant Lion Optimization (ALO) which considers the features as ants that move in random space. The fitness function for the antlion to hunt the ants is proportional to the traps built by the antlion. The proposed steganalyser has been tested for classification accuracies with different payloads. The classifiers implemented include Support Vector Machines (SVM), Multi Layer Perceptron (MLP) and fusion classifiers based on Bayes, Decision template and Dempster Schafer data fusion schemes. The results show that highest average classification accuracy has been obtained for Bayes fusion classifier followed by Dempster Schafer fusion classifier. It has been noted that the performance of fusion classifiers is better compared to individual classifiers. Thus the proposed method gives better classification accuracy for JPEG steganalysis than existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Bas P, Filler T, Pevny T (2011) Break our steganographic system --- the ins and outs of organizing BOSS. In: Proceedings of Information Hiding Conference 6958:59–70. http://dde.binghamton.edu/download/. Accessed 2 May 2016

  2. Bianchi L, Dorigo M, Gambardella LM, Gutjahr WJ (2009) A survey on metaheuristics for stochastic combinatorial optimization. Nat Comput 8:239–287 http://code.ulb.ac.be/dbfiles/BiaDorGamGut2009natcomp.pdf. Accessed 30 May 2016

    Article  MathSciNet  MATH  Google Scholar 

  3. Chenggang Y, Yongdong Z, Jizheng X, Feng D, Liang L, Qionghai D, Feng W (2014) A highly parallel framework for HEVC coding unit partitioning Tree decision on many-core processors. IEEE Signal Processing Lett 21(5):573–576

    Article  Google Scholar 

  4. Chenggang Y, Yongdong Z, Jizheng X, Feng D, Jun Z, Qionghai D, Feng W (2014) Efficient parallel framework for HEVC motion estimation on many-Core processors. IEEE Trans Circuits Syst Video Technol 24(12):2077–2089

    Article  Google Scholar 

  5. Chenggang Y, Yongdong Z, Feng D, Jizheng X, Liang L, Qionghai D (2014) Efficient parallel HEVC intra prediction on many-core processor. Electron Lett 50(11):805–806

    Article  Google Scholar 

  6. Chhikara RR, Sharma P, Singh L (2016) An improved dynamic discrete firefly algorithm for blind image steganalysis. Int J Mach Learn Cybern. doi:10.1007/s13042-016-0610-3

  7. Chikkara RR, Singh L (2017) An improved discrete firefly and t-test based algorithm for blind image steganalysis, In: Proc. of 6th International Conference on Intelligent Systems, Modelling and Simulation (ISMS). IEEEXplore Digital library. http://ieeexplore.ieee.org/document/7311210/. Accessed May 24

  8. Christaline JA, Ramesh R, Vaishali D (2014) Steganalysis with classifier combinations. ARPN Journal of Engineering and Applied Sciences 9(12). http://www.arpnjournals.com/jeas/research_papers/rp_2014/jeas_1214_1402.pdf. Accessed 2 May 2016

  9. Christaline JA, Ramesh R, Vaishali D (2015) Critical review of image steganalysis techniques. International Journal of Advanced Intelligence Paradigms, Inderscience 7(3/4):368–381 www.inderscienceonline.com/doi/abs/10.1504/IJAIP.2015.073715. Accessed 27 May 2016

    Article  Google Scholar 

  10. Christaline JA, Ramesh R, Vaishali D (2016) Optimized JPEG Steganalysis. International Journal of Multimedia and Ubiquitous Engineering, SERSC 11(1):385–396. doi:10.14257/ijmue.2016.11.1.37 Accessed 2 May 2016

    Article  Google Scholar 

  11. Christaline JA, Ramesh R, Vaishali D (2016) Bio-inspired computational algorithms for improved image steganalysis. Indian Journal of Science and Technology 9(10). http://www.indjst.org/index.php/indjst/article/viewFile/88995/68459. Accessed 2 May 2016

  12. Fridrich J, Kodvosky J (2012) Rich models for Steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882 http://dde.binghamton.edu/kodovsky/pdf/TIFS2012-SRM.pdf. Accessed 30 May 2016

    Article  Google Scholar 

  13. Holub V, Fridrich J (2013) Random projection s of residuals for digital image Steganalysis. IEEE Trans Inf Forensics Secur 8(12):1996–2006 http://dde.binghamton.edu/vholub/pdf/TIFS13_Random_Projections_of_Residuals_for_Digital.pdf. Accessed 22 May 2016

    Article  Google Scholar 

  14. Huang F, Li B, Huang J (2008) Universal JPEG steganalysis based on microscopic and macroscopic calibration. In: Proceedings IEEE International Conference on Image Processing ICIP, 52:2068–2071. http://ieeexplore.ieee.org/document/4712193/. Accessed 19 May 2016

  15. Kaveh A, Khayatazad M (2012) A new meta-heuristic method: ray optimization. Comput Struct 112:283–294 www.sciencedirect.com/science/article/pii/S0045794912002131. Accessed 29 May 2016

    Article  Google Scholar 

  16. Kaveh A, Ghazaan MI, Bakhshpoori T (2013) An improved ray optimization algorithm for design of truss structures. Civ Eng 57:97–112 https://pp.bme.hu/ci/article/viewFile/7166/6159. Accessed 31 May 2016

    Google Scholar 

  17. Kaveh A, Ghazaan MI, Bakhshpoori T (2013) An improved ray optimization algorithm for design of truss structures. Civ Eng 57:97–112. https://pp.bme.hu/ci/article/viewFile/7166/6159. Accessed 1 June 2016

  18. Kodovsky J, Fridrich, J (2011) Steganalysis in high dimension: fusing classifiers built on random subspace. In: Proc. Of SPIE, Electronic Imaging, Media, Watermarking, Security and Forensics XIII, pp. 23–26. http://dde.binghamton.edu/kodovsky/pdf/Kod11spie.pdf. Accessed 21 May 2016

  19. Kuncheva LI (2002) A theoretical study on six classifier fusion strategies. IEEE Trans Pattern Anal Mach Intell 24(2):281–286 http://machine-learning.martinsewell.com/ensembles/Kuncheva2002a.pdf. Accessed 2 May 2016

    Article  Google Scholar 

  20. Liu Q (2011) Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery. In: Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence, pp 25–30. http://www.shsu.edu/~qxl005/New/Publications/Mifor2011.pdf. Accessed 29 May 2016

  21. Liu Q (2011) Steganalysis of DCT embedding based adaptive steganography and YASS. In: Proceedings of the 13th ACM workshop on Multimedia and Security, Buffalo. https://pdfs.semanticscholar.org/ca6f/92a55790769a56fe9c4b87179a09fd50df9a.pdf. Accessed 22 May 2016

  22. Mirjalili SA (2015) The ant Lion optimizer. Adv Eng Softw 83:80–98. doi:10.1016/j.advengsoft.2015.01 Accessed 28 May 2016

    Article  Google Scholar 

  23. Pevny T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp EJ, Wong PW (eds) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 6505(1):3–14. https://pdfs.semanticscholar.org/b7a7/700eaf1c2803a511ac4ca71ae128e09b2a18.pdf. Accessed 29 May 2016

  24. Rajabioun R (2011) Cuckoo Optimization Algorithm. Applied Soft Computing 11:5508–5518. dl.acm.org/citation.cfm?id=2039522. Accessed 31 May 2016

  25. Roshini D, Samsudin A (2009) A digital steganalysis: computational intelligence approach. Int J Comput 3(1):161–170 https://www.researchgate.net/profile/Roshidi_Din/publication/228844865_Digital_Steganalysis_Computational_Intelligence_Approach/links/0fcfd5066a469e19ac000000.pdf?origin=publication_list. Accessed 25 May 2016

    Google Scholar 

  26. Sajedi H (2017) Image steganalysis using artificial bee colony algorithm. J Exp Theor Artif Intell. http://tandfonline.com/doi/abs/10.1080/0952813X.2016.1266037. Accessed 7 June 2017

  27. Shi YQ, Chen C, and Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.646.5540&rep=rep1&type=pdf. Accessed 22 May 2016

  28. Talbi EG (2009) Metaheuristics: from design to implementation, vol 74. Sons, John Wiley &

    Book  MATH  Google Scholar 

  29. Wang Y, Liu JF, Zhang WM (2009) Blind JPEG steganalysis based on correlations of DCT coefficients in multi-directions and calibrations. In: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security, 1:495–499. http://ieeexplore.ieee.org/document/5368437/. Accessed 9 June 2016

  30. Windeatt T (2006) Accuracy/diversity and ensemble MLP classifier design. IEEE Trans Neural Netw 17(5):1194–1211 http://ieeexplore.ieee.org/document/1687930/. Accessed 12 May 2016

    Article  Google Scholar 

  31. Yang XS (2010) Firefly algorithm, stochastic test functions and design optimization. International Journal of Bio-Inspired Computation 2(2):78–84 https://arxiv.org/pdf/1003.1409.pdf. Accessed 1 June 2016

    Article  Google Scholar 

  32. Yang XS, Deb S (2010) Engineering optimisation by cuckoo search. International Journal of Mathematical Modelling and Numerical Optimization 1(4):330–343

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anita Christaline. J.

Appendices

Appendices

  1. A.

    Few of the Clean and Stego images in this research for Payload = 0.5 bpdct

figure e

Embedding output

figure f
  1. B.

    Features extracted from 200 images (100 clean and 100 stego) for payload of 0.5.

figure g
  1. C.

    Convergence of Elite fitness by ALO optimizer for 400 iterations

figure h
  1. D.

    Time Complexity Calculation for Image number 74

figure i
  1. E.

    Time Calculation for 200 images (Feature extraction and optimization)

figure j

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anita Christaline. J, Ramesh. R, Gomathy. C et al. Nature inspired metaheuristics for improved JPEG steganalysis. Multimed Tools Appl 77, 13701–13720 (2018). https://doi.org/10.1007/s11042-017-4983-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4983-4

Keywords

Navigation