Open Access Open Access  Restricted Access Subscription or Fee Access

Steganalysis: Multi-Class Classification of Images Using Linear Support Vector Machine

B. Yamini, Dr.R. Sabitha

Abstract


Steganographic techniques have been used to embed covert messages inside a piece of unsuspicious media and sending it without anyone’s knowledge about the survival of the covert message. Steganalysis is the process of detecting the presence of concealed information from the stego image and it can lead to the prevention of terrible security incidents. Steganalysis consist of two stages, the first stage is to identify the existence of the hidden message and the second stage is to retrieve the content of the message. In the existing method, for identifying the existence of the message, two-class classification using Support Vector Machine is used to differentiate the cover and stego images. In this paper, a new technique called multi-class classification using Linear Support Vector Machine is used to differentiate the cover and different type’s stego images.


Keywords


Steganography, Steganalysis, Stego Image, Two-class classification, Multi-classClassisification and Linear Support Vector Machine.

Full Text:

PDF

References


Mahdi Ramezani and Shahrokh Ghaemmaghami,“Adaptive Image Steganography with Mod-4 Embedding using Image Contrast”, Intl. Conf. on IEEE CCNC 2010 proceedings.

M. Raja Sekar, Prof. P Prem Chand & Prof. I .V. Muralikrishna,“Image Authentication using Support Vector Machines”,Journals of Advanced Research in Computer Engineering”,vol. 3,No. 2,July- December 2009, pp. 367-374.

Chen, X., Faltemier, T., Flynn, P., and Bowyer, K., “Human face modeling and face recognition through multi-view high resolution stereopsis”, In Conference on computer vision and pattern Recognition (2006) pp.50-56.

Bicego, M., Grosso, E., and Tistarelli, M.,“ Face Authentication using One-Class Support Vector Machines”, In International Workshop on Biometric Recognition Systems(2005) 15-22.

Chen, Y., Zhou, X.S., and Huang, T.S., “ One- Class SVM for Learning in Image Retrival”, In IEEE International Conference on Image Processing, (2001) 34-37.

Carson, C., and Greenspan, H., “Blobworld Image Segmentation using Expectation Maximization and its Application to Image Querying. IEEE Transaction on Pattern Analysis and Machine Intelligence, 24(8) (2002) 1026-1037.

Burges, C.J., “ A Tutorial on Support Vector Machines for Pattern Recognition”, Data Mining and Knowledge Discovery, 2(1998) 121-167.

Ben-hur, A., Horn, D., Siegelmann, H., and Vapnik,V., “ Support Vector Clustering”,Journal of Machine Learning Research, 2 (2001) 125-137.

Chapelle, O., and Haffner, p., and Vapnik, V.N., “Support Vector Machines For Histogram based image classification”, IEEE transaction on Neural Networks, 10(5) (1999) 1055-1064.

Burges, C.J., “A Tutorial on Support Vector Machines for Pattern Recognition”, Bell Laboratories, 2(1998) 1-43.

Kang Leng Chiew , Josef Pieprzyk, “Estimating Hidden Message Length in Binary Image Embedded By Using Boundary Pixels Steganography”.Intl. Conf. On Availability Reliability and Security,(2010) 683-688.

B.Yamini, Dr R.Sabitha “Blind Steganalytic Attack As Pattern Recognition, Using Receiver Operating Characteristics For Distance Calculation In k-Nearest Neighbor Classification Technique”. Fifth International Conference on Advanced Computing - 2013.

B.Yamini, Dr R.Sabitha “Steganalytic attack for an adaptive steganography using support vector machine”.Emerging Trends in Robotics and Communication Technologies (INTERACT), 2010 International Conference.PP.No : 56 – 58.

B.Yamini, Dr R.Sabitha “Blind Steganalysis : To Analyse the Detection Rate of Stego Images using Different Steganalytic Techniques with Support Vector Machine Classifier”.IJCA Proceedings on National Conference on Future Computing 2014 NCFC 2014(2):22-25, January 2014. Published by Foundation of Computer Science, New York, USA.


Refbacks

  • There are currently no refbacks.