Bio-Inspired Computational Algorithms for Improved Image Steganalysis

Acquiring the best image features that best distinguishes a stego and clean image is a challenge in image steganalysis. Though higher order models acquire all these features, they pose problems due to computational complexity in terms of time and space. This demands optimization of the feature sets. Compared to the existing statistical feature optimization techniques, genetic algorithm based optimization techniques are evolving to be more promising. The existing deterministic methods of optimization have the limitation of converging into local minima as compared to the evolutionary methods which tend to converge to the global minima. Objectives: This paper intends to review the various genetic algorithm based feature optimization techniques applicable for image steganalysis of JPEG images and identify the best algorithm that converges to global minima. Method/Analysis: The methods analysed include the stochastic (metaheuristic) algorithms that make use of the random behaviour of plants and animals. The Antlion behaviour based optimization technique (ALO) has been implemented and analysed for JPEG stego images. The movement of ants are modelled as random walk and the traps built by antlions are assumed proportional to their fitness. The antlions shoot sand outwards to pull the ants inside the pits. This causes sliding down of the ants into the pits to the most minimum position. The coding of the optimization is implemented in Matlab with images taken from the standard BOSS database. Findings: The feature set after feature extraction has a dimension of 2000 × 48600 with 1000 cover and 1000 clean images. Considering these vectors as the initial positions of the ants in the Ant Lion Optimizer, for a payload of 0.5 in embedding logic the classification accuracies are studied. The convergence of this optimizer is proved according to the convergence curve for 300 iterations. After optimization, the reduced feature set is used to classify the image as cover or stego image. SVM, MLP and the fusion classifiers - Bayes, Decision template and Dempster Schafer are used. For low levels of embedding changes, the classification by MLP and Fusion schemes is good. For medium and high levels of embedding changes, the classification by Fusion schemes alone is good. It has been identified that the proposed steganalyser gives best results for Bayes fusion classification (69%) scheme when Antlion behaviour is used as optimizer. Applications/Improvements: This research has implemented a novel method of image feature optimization that improves steganalysis. The optimized feature set is 100 times less in dimension assuring reduced computational complexity in time and space. Improved version of this research may include a different selection mechanism or using a different optimization function.

[1]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[2]  Jiwu Huang,et al.  Adaptive image watermarking scheme based on visual masking , 1998 .

[3]  Gregory W. Wornell,et al.  Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[4]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[5]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[6]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[7]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[8]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[9]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[10]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..

[11]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[12]  Ahmed Al-Ani Ant Colony Optimization for Feature Subset Selection , 2005, WEC.

[13]  Terry Windeatt,et al.  Accuracy/Diversity and Ensemble MLP Classifier Design , 2006, IEEE Transactions on Neural Networks.

[14]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[15]  Lei Guo,et al.  Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[16]  Ivanoe De Falco,et al.  Facing classification problems with Particle Swarm Optimization , 2007, Appl. Soft Comput..

[17]  Hongtao Zhang,et al.  Feature Selection for the Stored-grain Insects Based on PSO and SVM , 2009, 2009 Second International Workshop on Knowledge Discovery and Data Mining.

[18]  Aiming Wang,et al.  An Investigation of Genetic Algorithm on Steganalysis Techniques , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[19]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[20]  Tomás Pevný,et al.  Modern steganalysis can detect YASS , 2010, Electronic Imaging.

[21]  Xingyu Gong,et al.  Feature selection method for network intrusion based on GQPSO attribute reduction , 2011, 2011 International Conference on Multimedia Technology.

[22]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[23]  Jessica J. Fridrich,et al.  Steganalysis in high dimensions: fusing classifiers built on random subspaces , 2011, Electronic Imaging.

[24]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[25]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[26]  Guoming Chen,et al.  Particle Swarm Optimization Feature Selection for Image Steganalysis , 2012, 2012 Fourth International Conference on Digital Home.

[27]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[28]  Dong Zhang,et al.  On optimal feature selection using harmony search for image steganalysis , 2012, 2012 8th International Conference on Natural Computation.

[29]  Amrit Pal Singh,et al.  Evaluation performance study of Firefly algorithm, particle swarm optimization and artificial bee colony algorithm for non-linear mathematical optimization functions , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[30]  Jessica J. Fridrich,et al.  Quantitative steganalysis using rich models , 2013, Electronic Imaging.

[31]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[32]  Jessica J. Fridrich,et al.  Random projections of residuals as an alternative to co-occurrences in steganalysis , 2013, Electronic Imaging.

[33]  Hyoung Joong Kim,et al.  Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[34]  P. Monika,et al.  DI-ANN Clustering Algorithm for Pruning in MLP Neural Network , 2015 .

[35]  Seyed Mohammad Mirjalili,et al.  The Ant Lion Optimizer , 2015, Adv. Eng. Softw..