Volume 17 , Issue 2 , PP: 377-393, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Mostafa A. Ahmad 1 * , Eftkhar Al-Qhtani 2 , Ahmed H. Samak 3 , Amr Ibrahim 4 , Mourad Elloumi 5 , Ali Ahmed 6
Doi: https://doi.org/10.54216/FPA.170228
Steganalysis can be defined as the science that addresses the process of identifying and detecting hidden information or data within various types of digital media. Recently, Deep Learning (DL) approaches have been employed to build steganalysis systems. However, the problem with steganalysis systems adopting a DL approach is their low accuracy and their need for effective datasets to be used for the training. In this paper, we introduce a DL-based Steganalysis system for the detection and classification of hidden content in images. Our system, called Steg-Analysis Convolutional Neural Network (SA-CNN), relies on a Convolutional Neural Network (CNN) and uses High Pass Filter (HPF) and extra-embedded data. We also propose a preprocessing-based data hiding method to increase the accuracy of SA-CNN in detecting hidden content. Therefore, this ensures the imperceptibility of images used for training SA-CNN. In addition, we use another CNN, called Malicious-Benign Classification CNN (MBC-CNN), that we have developed to classify the extracted hidden content into Malicious or Benign classes. Compared with existing systems, SA-CNN shows a better performance in terms of accuracy, under increased hiding rates ranging from 0.1 to 1.0 bpp, reaching 90%.
Image Steganalysis , Deep Learning , Detection and Classification of Hidden Content
[1] Swetha, V., V. Prajith, and V. Kshema. "Data hiding using video steganography-a survey." International Journal of Science, Engineering and Computer Technology 5.6 (2015): 206.
[2] Taha, Mustafa Sabah, et al. "Combination of steganography and cryptography: A short survey." IOP conference series: materials science and engineering. Vol. 518. No. 5. IOP Publishing, 2019.
[3] Duluta, Andrei, et al. "Secure communication method based on encryption and steganography." 2017 21st International Conference on Control Systems and Computer Science (CSCS). IEEE, 2017.
[4] Douglas, Mandy, et al. "An overview of steganography techniques applied to the protection of biometric data." Multimedia Tools and Applications 77.13 (2018): 17333-17373.
[5] Fridrich, Jessica, Miroslav Goljan, and Dorin Hogea. "Steganalysis of JPEG images: Breaking the F5 algorithm." International Workshop on Information Hiding. Springer, Berlin, Heidelberg, 2002.
[6] Shankar, Deepa D., and Adresya Suresh Azhakath. "Minor blind feature based Steganalysis for calibrated JPEG images with cross validation and classification using SVM and SVM-PSO." Multimedia Tools and Applications 80.3 (2021): 4073-4092.
[7] BOSSWebsite,Online[Available]: http://agents.fel.cvut.cz/boss/index.php?mode=VIEW&tmpl=materials (Accessed 1 May 2021)
[8] Malware Classification on Malimg Dataset, online [Available]: https://paperswithcode.com/sota/malware-classification-on-malimg-dataset (Accessed 27 July 2021)
[9] Project Gutenberg, a library of free eBooks, November 13, 2004, online [Available]: https://www.gutenberg.org/ebooks/ (Accessed 27 July 2021).
[10] Fridrich, Jessica, and Miroslav Goljan. "Practical steganalysis of digital images: state of the art." security and Watermarking of Multimedia Contents IV. Vol. 4675. SPIE, 2002.
[11] Westfeld, Andreas, and Andreas Pfitzmann. "Attacks on steganographic systems." International workshop on information hiding. Springer, Berlin, Heidelberg, 1999.
[12] Fridrich, Jessica, Miroslav Goljan, and Rui Du. "Reliable detection of LSB steganography in color and grayscale images." Proceedings of the 2001 workshop on Multimedia and security: new challenges. 2001.
[13] Harmsen, Jeremiah Joseph, and William A. Pearlman. "Steganalysis of additive-noise modelable information hiding." Security and Watermarking of Multimedia Contents V. Vol. 5020. SPIE, 2003.
[14] Liu, Shaohui, Hongxun Yao, and Wen Gao. "Steganalysis of data hiding techniques in wavelet domain." International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004, Vol. 1. IEEE, 2004.
[15] Kim, Jaeyoung, Hanhoon Park, and Jong-Il Park. "CNN-based image steganalysis using additional data embedding." Multimedia Tools and Applications 79.1 (2020): 1355-1372.
[16] Xu, G., Xu, Y., Zhang, S., & Xie, X. (2021). SFRNet: Feature extraction-fusion Steganalysis network based on squeeze-and-Excitation block and RepVgg block. Security and Communication Networks, 2021, 1-11. https://doi.org/10.1155/2021/3676720
[17] Ge, Y., Zhang, T., Liang, H., Jiang, Q., & Wang, D. (2021). A novel technique for image Steganalysis based on separable convolution and adversarial mechanism. Electronics, 10(22), 2742. https://doi.org/10.3390/electronics1022274
[18] Reinel, T., Brayan, A. H., Alejandro, B. M., Alejandro, M., Daniel, A., Alejandro, A. J., Buenaventura, B. A., Simon, O., Gustavo, I., & Raul, R. (2021). GBRAS-net: A Convolutional neural network architecture for spatial image Steganalysis. IEEE Access, 9, 14340-14350. https://doi.org/10.1109/access.2021.3052494
[19] Lwowski, J., Corley, I., & Hoffman, J. (2020). Neural Steganalysis with spatial rich models for image steganography detection. https://doi.org/10.36227/techrxiv.11949762
[20] Singh, B., Sur, A., & Mitra, P. (2021). Steganalysis of digital images using deep fractal network. IEEE Transactions on Computational Social Systems, 8(3), 599-606. https://doi.org/10.1109/tcss.2021.3052520
[21] Pant, D., & Bista, R. (2021). Image-based malware classification using deep Convolutional neural network and transfer learning. 2021 3rd International Conference on Advanced Information Science and System (AISS 2021). https://doi.org/10.1145/3503047.3503081
[22] Alam, M., Akram, A., Saeed, T., & Arshad, S. (2021). DeepMalware: A deep learning based malware images classification. 2021 International Conference on Cyber Warfare and Security (ICCWS). https://doi.org/10.1109/iccws53234.2021.970302.
[23] Xu, Guanshuo. "Deep convolutional neural network to detect J-UNIWARD." Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. 2017.
[24] Tang, Weixuan, et al. "Automatic steganographic distortion learning using a generative adversarial network." IEEE Signal Processing Letters 24.10 (2017): 1547-1551.
[25] Ye, Jian, Jiangqun Ni, and Yang Yi. "Deep learning hierarchical representations for image steganalysis." IEEE Transactions on Information Forensics and Security 12.11 (2017): 2545-2557.
[26] Yedroudj, Mehdi, Frédéric Comby, and Marc Chaumont. "Yedroudj-net: An efficient CNN for spatial steganalysis." 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2018.
[27] Tsang, Clement Fuji, and Jessica Fridrich. "Steganalyzing images of arbitrary size with CNNs." Electronic Imaging 2018.7 (2018): 121-1.
[28] Zhang, Ru, et al. "Efficient feature learning and multi-size image steganalysis based on CNN." arXiv preprint arXiv:1807.11428 (2018).
[29] Wu, Songtao, Shenghua Zhong, and Yan Liu. "Deep residual learning for image steganalysis." Multimedia tools and applications 77.9 (2018): 10437-10453.
[30] Kim, Jaeyoung, Hanhoon Park, and Jong-Il Park. "CNN-based image steganalysis using additional data embedding." Multimedia Tools and Applications 79.1 (2020): 1355-1372.
[31] Chaganti, R., R, V., Alazab, M., & Pham, T. (2021). Stegomalware: A systematic survey of malware hiding and detection in images, machine learning models and research challenges. https://doi.org/10.36227/techrxiv.1675545
[32] Selvaraj, A., Ezhilarasan, A., Wellington, S. L., & Sam, A. R. (2020). Digital image steganalysis: A survey on paradigm shift from machine learning to deep learning based techniques. IET Image Processing, 15(2), 504-522. https://doi.org/10.1049/ipr2.12043
[33] Eid, W. M., Alotaibi, S. S., Alqahtani, H. M., & Saleh, S. Q. (2022). Digital image Steganalysis: Current methodologies and future challenges. IEEE Access, 10, 92321-92336. https://doi.org/10.1109/access.2022.3202905
[34] Shehab, D. A., & Alhaddad, M. J. (2022). Comprehensive survey of multimedia Steganalysis: Techniques, evaluations, and trends in future research. Symmetry, 14(1), 117. https://doi.org/10.3390/sym14010117
[35] Nataraj, Lakshmanan, et al. "Malware images: visualization and automatic classification." Proceedings of the 8th international symposium on visualization for cyber security. 2011.
[36] Hou, Xiaodan, et al. "Combating highly imbalanced steganalysis with small training samples using feature selection." Journal of Visual Communication and Image Representation 49 (2017): 243-256.
[37] Jia, Ju, et al. "An Effective Imbalanced JPEG Steganalysis Scheme based on Adaptive Cost-Sensitive Feature Learning." IEEE Transactions on Knowledge and Data Engineering (2020).
[38] Wu, Anxin, et al. "Unbalanced JPEG image steganalysis via multiview data match." Journal of visual communication and image representation 34 (2016): 103-107.
[39] Khormali, Aminollah, et al. "COPYCAT: practical adversarial attacks on visualization-based malware detection." arXiv preprint arXiv:1909.09735 (2019).
[40] Osunade, O., and I. A. Ganiyu. "Enhancing the least significant bit (LSB) algorithm for steganography." International Journal of Computer Applications 149.3 (2016): 1-8.
[41] Nagalla, S., & Inampudi, R. B. (2014). Perceptual Weights Based On Local Energy For Image Quality Assessment. International Journal of Image Processing (IJIP), 8(6), 468.
[42] Rouse, D. M., & Hemami, S. S. (2008, October). Understanding and simplifying the structural similarity metric. In 2008 15th IEEE international conference on image processing (pp. 1188-1191). IEEE.
[43] Rustad, S., Syukur, A., & Andono, P. N. (2021). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University-Computer and Information Sciences.
[44] Chicco, D., & Jurman, G. (2020). The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC genomics, 21(1), 1-13.
[45] Kim, Jaeyoung, Hanhoon Park, and Jong-Il Park. "CNN-based image steganalysis using additional data embedding." Multimedia Tools and Applications 79.1 (2020): 1355-1372.
[46] Fridrich J, Kodovsky J (2011) Rich models for steganalysis of digital images. IEEE Transac- ´ tions on Information Forensics and Security 7(3):868–882. http://dde.binghamton.edu/kodovsky/pdf/ TIFS2012-SRM.pdf
[47] Bas, P., Filler, T., Pevný, T. (2011). ”Break Our Steganographic System”: The Ins and Outs of Organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds) Information Hiding. IH 2011. Lecture Notes in Computer Science, vol 6958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24178-9_5
[48] L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath. 2011. Malware images: visualization and automatic classification. In Proceedings of the 8th International Symposium on Visualization for Cyber Security (VizSec '11). Association for Computing Machinery, New York, NY, USA, Article 4, 1–7. https://doi.org/10.1145/2016904.2016908
[49] Yuan Y, Lu W, Feng B, Weng J (2017) Steganalysis with CNN using multi-channels filtered residuals. ICCCS:110–120. [50] Thomas Jefferson, "The Declaration of Independence of the United States of America", Prabhat Prakashan, 2021.