Feature Selection Based Universal Image Steganalysis: A Survey

Steganography is the technique of hiding communication into multimedia objects such as image, video, audio, and text. On the other hand, steganalysis is the art and science of detecting the existence of an embedded message. Steganalysis can be classified into targeted\specific steganalysis and universal\blind steganalysis. Targeted steganalysis is designed for specific steganography techniques. Whereas, in universal steganography techniques are not familiar to the user. Moreover, the convectional universal steganalysis consists of two main phases: the extraction of features as well as classifying images into stego or clean. Images containing hidden messages are called Stego images. Feature selection is the technique used to decrease feature dimensionality. This literature review provides an overview of universal image steganalysis based on feature selection.

[1]  Jiucheng Xu,et al.  Feature selection method for color image steganalysis based on fuzzy neighborhood conditional entropy , 2022, Appl. Intell..

[2]  Arivazhagan Selvaraj,et al.  Digital image steganalysis: A survey on paradigm shift from machine learning to deep learning based techniques , 2020, IET Image Process..

[3]  T. Rabie,et al.  A Review of Color Image Steganalysis in the Transform Domain , 2020, 2020 14th International Conference on Innovations in Information Technology (IIT).

[4]  Mamta Juneja,et al.  Steganography and Steganalysis (in digital forensics): a Cybersecurity guide , 2020, Multimedia Tools and Applications.

[5]  Deepa D. Shankar,et al.  Minor blind feature based Steganalysis for calibrated JPEG images with cross validation and classification using SVM and SVM-PSO , 2020, Multimedia Tools and Applications.

[6]  Rajeev Kumar,et al.  MI-LFGOA: multi-island levy-flight based grasshopper optimization for spatial image steganalysis , 2020, Multimedia Tools and Applications.

[7]  Diyar Qader Zeebaree,et al.  A Comprehensive Review of Dimensionality Reduction Techniques for Feature Selection and Feature Extraction , 2020, Journal of Applied Science and Technology Trends.

[8]  Shunquan Tan,et al.  A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis , 2020, KSII Trans. Internet Inf. Syst..

[9]  Feng Ruan,et al.  Deep learning for real-time image steganalysis: a survey , 2019, Journal of Real-Time Image Processing.

[10]  A. Goyal,et al.  A review of forensic approaches to digital image Steganalysis , 2019, Multimedia tools and applications.

[11]  Tabares-Soto Reinel,et al.  Deep Learning Applied to Steganalysis of Digital Images: A Systematic Review , 2019, IEEE Access.

[12]  Marc Chaumont,et al.  Deep Learning in steganography and steganalysis from 2015 to 2018 , 2019, Digital Media Steganography.

[13]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  K. V. Arya,et al.  Feature selection for image steganalysis using levy flight-based grey wolf optimization , 2018, Multimedia Tools and Applications.

[15]  George Papadourakis,et al.  A review of image steganalysis techniques for digital forensics , 2018, J. Inf. Secur. Appl..

[16]  Anita Christaline Johnvictor,et al.  Nature inspired metaheuristics for improved JPEG steganalysis , 2018, Multimedia Tools and Applications.

[17]  Latika Singh,et al.  An improved dynamic discrete firefly algorithm for blind image steganalysis , 2018, Int. J. Mach. Learn. Cybern..

[18]  Wojciech Mazurczyk,et al.  Information hiding , 2017, Commun. ACM.

[19]  John Babu,et al.  A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis , 2017 .

[20]  Latika Singh,et al.  A hybrid feature selection approach based on improved PSO and filter approaches for image steganalysis , 2016, Int. J. Mach. Learn. Cybern..

[21]  D. Lakshmi Padmaja,et al.  Comparative Study of Feature Subset Selection Methods for Dimensionality Reduction on Scientific Data , 2016, 2016 IEEE 6th International Conference on Advanced Computing (IACC).

[22]  Swaminathan Ramakrishnan,et al.  Discrete Wavelet Transform and Singular Value Decomposition Based ECG Steganography for Secured Patient Information Transmission , 2014, Journal of Medical Systems.

[23]  Monisha Sharma,et al.  A REVIEW ON BLIND STILL IMAGE STEGANALYSIS TECHNIQUES USING FEATURES EXTRACTION AND PATTERN CLASSIFICATION METHOD , 2012 .

[24]  Hongtao Zhang,et al.  Feature Selection for the Stored-grain Insects Based on PSO and SVM , 2009, 2009 Second International Workshop on Knowledge Discovery and Data Mining.

[25]  Ioannis Pitas,et al.  Demonstrating the stability of support vector machines for classification , 2006, Signal Process..

[26]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[27]  T.A. Hawi,et al.  Steganalysis attacks on stego-images using stego-signatures and statistical image properties , 2004, 2004 IEEE Region 10 Conference TENCON 2004..

[28]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.

[29]  Nasir D. Memon,et al.  Steganalysis based on image quality metrics , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[30]  Kuo-Liang Chung,et al.  A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..

[31]  Yuliang Lu,et al.  Feature Selection for Image Steganalysis Using Binary Bat Algorithm , 2020, IEEE Access.

[32]  Shahrokh Ghaemmaghami,et al.  Towards blind detection of low-rate spatial embedding in image steganalysis , 2015, IET Image Process..

[33]  R. Chhikara,et al.  A Review on Digital Image Steganalysis Techniques Categorised by Features Extracted , 2013 .

[34]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[35]  K B Raja,et al.  HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING DISCRETE WAVELET TRANSFORM , 2009 .

[36]  Robert J. Bagnall,et al.  Reversing the Steganography Myth in Terrorist Operations: The Asymmetrical Threat of Simple Intelligence Dissemination Techniques Using Common Tools , 2002 .

[37]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego , Jsteg , Steganos , and STools — and Some Lessons Learned , 2000 .

[38]  J. van Leeuwen,et al.  Information Hiding , 1999, Lecture Notes in Computer Science.