Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach

In this paper, a critical view of the utilization ofcomputational intelligence approach from the text steganalysisperspective is presented. This paper proposes a formalization ofgenetic algorithm method in order to detect hidden message on ananalyzed text. Five metric parameters such as running time, fitnessvalue, average mean probability, variance probability, and standarddeviation probability were used to measure the detection performancebetween statistical methods and genetic algorithm methods.Experiments conducted using both methods showed that geneticalgorithm method performs much better than statistical method,especially in detecting short analyzed texts. Thus, the findings showedthat the genetic algorithm method on analyzed stego text is verypromising. For future work, several significant factors such as datasetenvironment, searching process and types of fitness values throughother intelligent methods of computational intelligence should beinvestigated.

[1]  Edward J. Delp,et al.  Attacks on lexical natural language steganography systems , 2006, Electronic Imaging.

[2]  Jean-Luc Gauvain,et al.  Training Neural Network Language Models on Very Large Corpora , 2005, HLT.

[3]  Kaustubh Choudhary Image Steganography and Global Terrorism , 2012 .

[4]  Huaiqing Wang,et al.  Computing with words via Turing machines: a formal approach , 2003, IEEE Trans. Fuzzy Syst..

[5]  Arputharaj Kannan,et al.  An Active Rule Based Approach to Audio Steganalysis with a Genetic Algorithm , 2007, 2006 1st International Conference on Digital Information Management.

[6]  Alisha Arora,et al.  IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW , 2014 .

[7]  João Gama A Linear-Bayes Classifier , 2000, IBERAMIA-SBIA.

[8]  Lotfi A. Zadeh,et al.  Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..

[9]  Gregg H. Gunsch,et al.  Blind Stenanography Detection Using a Computational Immune System: A Work in Progress , 2003, Int. J. Digit. EVid..

[10]  L.A. Zadeh The concept of a generalized constraint - a bridge from natural languages to mathematics , 2005, NAFIPS 2005 - 2005 Annual Meeting of the North American Fuzzy Information Processing Society.

[11]  Jiangqun Ni,et al.  An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  Azman Samsudin,et al.  Digital steganalysis: Computational intelligence approach , 2009 .

[13]  Lingyun Xiang,et al.  Research on Steganalysis for Text Steganography Based on Font Format , 2007 .

[14]  Shang Gao,et al.  An algorithm of echo steganalysis based on Bayes classifier , 2008, 2008 International Conference on Information and Automation.

[15]  Senén Barro,et al.  A framework for fuzzy quantification models analysis , 2003, IEEE Trans. Fuzzy Syst..

[16]  Yoshimi Suzuki,et al.  Extracting Key Paragraph based on Topic and Event Detection Towards Multi-Document Summarization , 2000 .

[17]  Malcolm I. Heywood,et al.  Use of a genetic algorithm in brill's transformation-based part-of-speech tagger , 2005, GECCO '05.

[18]  M.-R. Akbarzadeh-T,et al.  A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[19]  Qingzhong Liu,et al.  Detect Information-Hiding Type and Length in JPEG Images by Using Neuro-fuzzy Inference Systems , 2008, 2008 Congress on Image and Signal Processing.

[20]  V. Fay-Wolfe,et al.  Video steganalysis for digital forensics investigation , 2013 .

[21]  Andrei Fionov,et al.  Applying statistical methods to text steganography , 2011, ArXiv.

[22]  Ping Wang,et al.  Inter-frame Correlation Based Compressed Video Steganalysis , 2008, 2008 Congress on Image and Signal Processing.

[23]  Hui-Feng Shi,et al.  Documents Categorization Based on Bayesian Spanning Tree , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[24]  Dhananjay Kulkarni,et al.  A Steganography-based framework to prevent active attacks during user authentication , 2013, 2013 8th International Conference on Computer Science & Education.

[25]  J. M. Barone,et al.  Looking for fuzziness in natural language , 2003, 22nd International Conference of the North American Fuzzy Information Processing Society, NAFIPS 2003.

[26]  P. R. Deshmukh,et al.  Hash Based Least Significant Bit Technique For Video Steganography , 2014 .

[27]  Justo Carracedo Gallardo,et al.  Measuring the Security of Linguistic Steganography in Spanish based on Synonymous Paraphrasing with WSD , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[28]  Asif Perwej,et al.  An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection , 2012, ArXiv.

[29]  Gongzhu Hu,et al.  Identification of deliberately doctored text documents using frequent keyword chain (FKC) model , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[30]  Xiaolin Gui,et al.  A Hybrid Natural Language Information Hiding System , 2012 .

[31]  K. P. Adhiya,et al.  Hiding Text in Audio Using LSB Based Steganography , 2012 .

[32]  M.A.K. Halliday Fuzzy grammatics: a systemic functional approach to fuzziness in natural language , 1995, Proceedings of 1995 IEEE International Conference on Fuzzy Systems..

[33]  N. D. Memon,et al.  Steganography capacity: a steganalysis perspective , 2003, IS&T/SPIE Electronic Imaging.

[34]  Frank Y. Shih,et al.  Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[35]  Huang Hou-Kuan,et al.  Text classification based on the TAN model , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..

[36]  Chang-Tsun Li,et al.  Maintaining Information Security in E-Government through Steganology , 2008 .

[37]  Rajarathnam Chandramouli,et al.  A Bayesian image steganalysis approach to estimate the embedded secret message , 2005, MM&Sec '05.