Showing posts with label Steganography. Show all posts
Showing posts with label Steganography. Show all posts

Wednesday, 25 September 2013

General Categorization of data mining techniques on Steganalysis

The aim of this section is to present an immediate wide spread picture of the importance of mixing data mining techniques. By using data mining algorithms we detect secret and hidden concealed message through steganalysis. We have several kinds of data types assigned as Domain that should be considered such as: Image, Audio, Text, Video and Protocol. This classification is based on data mining techniques extended on steganalysis in this domain which are used to detect the presence of embedded messages in stego images by steganography techniques. Under each of them, the domains are further sub-divided into data mining techniques. The whole hierarchy of the categorization is shown in fig 1:

image

Fig. 1. The hierarchy of the General Categorization of Data Mining techniques on steganalysis.

These sub-domains (data mining techniques) are sub-divided into approaches which are applied in:

  • Classification, which has been divided into neural network (NN), k-nearest neighbour (KNN), Support Vector Machine (SVM), Decision Tree (DT), Naive Bayes (NB) approaches. This category has itself a hierarchy which is shown in Fig. 2.
  • Clustering, which has been divided into K-means, agglomeration and random algorithms.
  • Other data mining tasks, such as regression approaches and etc.

image

Fig. 2. The hierarchy of the category classification approach.

 

Source : ISBN 978-953-51-0840-5

Introduction Steganalysis

The skill of observing the invisible embedded messages in images, audio, video, text as multimedia and protocols called Steganalysis. An efficient steganalysis method should determine the existence of implanted messages and stego digital image and present some results about the used steganographic algorithm. The challenging problem of this study is a massive quantity of stego hosts to learn valuable knowledge. In this paper, we propose to study several current data mining approaches on steganalysis of images, audio, video, text and protocol. The main aim of this survey is to present the efficiency of using data mining techniques in steganalysis in comparison to the model based steganalysis approaches.

The skill and knowledge of identifying secret message concealed by steganography approach is called Steganalysis. Steganalysis is the skill of detecting the existence of the concealed data in digital images, texts, audios, videos, protocols (Nissar & Mir, 2010). Steganalysis can be categorized into two groups: (a) static and (b) dynamic. Guesstimate some parameter(s) of the embedded algorithm or the secret message is the target of dynamic steganalysis, identifies the existence/non-existence of a secret message is the aim of static steganalysis; in other word these two groups have additional definitions as below:

Static steganalysis: discovering the existence/non-existence of a concealed message in a stego file and recognizing the stego embedded algorithm.

Dynamic steganalysis: guesstimating the implanted message length, position(s) of the concealed message, the secret key used in implanting, some parameters of the stego implanting algorithm and take out the concealed message.

An operation that takes out a number of novel nontrivial patterns included in huge records or databases is called Data Mining. Data Mining includes the utilization of complicated data analysis, which means to find out earlier unidentified, forensic patterns and associations in myriad data set. Therefore, data mining involves analysis, forecast, gathering and organizing data. The aim of data mining is to realize hidden models, unforeseen styles or data, exploiting a mixture of methods from machine learning to bio-inspired meta-heuristic algorithms. Multiple main phases of data mining operation consist of (1) Scope perceptive; (2) Data choice; (3) Data pre-processing, clear out and training; (4) Realizing patterns; (5) Explanation; and (6) Exposure and utilizing revealed facts (Bhatt & Kankanhalli, 2011).

In this study, we will present the survey of using data mining techniques on steganalysis, with intention to establish the significant data mining methods such as classification, clustering and other data mining methods that have been applied for steganalysis purposes. We will review numerous classification methods containing Decision Tree (DT), Support Vector Machines (SVM), Naive Bayes (NB), K-nearest neighbour (KNN), Neural Network (NN) and also a major variety of clustering methods contain K-means, agglomeration and random algorithms.

The rest of this book chapter is organized as follows: In Section 2, we will review the general classification of data mining techniques on steganalysis. Section 3 discusses about applied data mining techniques in brief. In Section 4, we will discuss the applied data mining techniques for image steganalysis. We will study data mining techniques for steganalysis over audio, video, text and protocol domains in section 5. In section 6, we will summarize several previous investigations about the application of data mining techniques for steganalysis using several well-presented figures and tables. Section 7 concludes this book chapter.

 

Source : ISBN 978-953-51-0840-5