Multimedia Concealed Data Detection Using Quantitative Steganalysis

Multimedia Concealed Data Detection Using Quantitative Steganalysis

Rupa Ch., Sumaiya Shaikh, Mukesh Chinta
Copyright: © 2021 |Pages: 13
DOI: 10.4018/IJDCF.20210901.oa6
Article PDF Download
Open access articles are freely available for download

Abstract

In current days, there is a constant evolution in modern technology. The most predominant usage of technology by society is the internet. There are many ways and means on the internet through which data is transmitted. Having such rapid and fast growth of communicating media also increases the exposure to security threats, causing unintellectual information ingress. Steganography is the main aspect of communicating in an aspect that hides the extent of communication. Steganalysis is another essential concern in data concealing, which is the art of identifying the existence of steganography. A framework has been designed to identify the concealed data in the multimedia file in the proposed system. This work's main strength is analyzing concealed data images without embedding and extracting the image's payloads. A quantitative steganalysis approach was considered to accomplish the proposed objective. By using this approach, the results were achieved with 98% accuracy.
Article Preview
Top

1. Introduction

Exchanging data now-a-days is not a complex task. But exchanging the same data without the interruption of the third party is a critical task. Two most powerful and popular techniques to achieve that are introduced based on the concept of secret writing. They are Steganography and Cryptography. Mostly Steganography concepts has been used for hiding the data in text files or images or videos or audio in-short via Multimedia. Cryptographic tools are developed for exchanging concealed data without any interruption (Alazab, Shalaginoy, Mesleh, Awajan, 2020). At the same time, Steganography tools are developed to maintain the secrecy of the concealed data in Multimedia.

The main indicators of the steganographic system are Capacity, Security and Interoperability. These parameters are interdependent means that a parameter value effects the remaining values (Xintao, Daidou, Nao, Boxia, Mengxiao, Chuan, 2020)Steganography means “Covered Writing” in Greek. Steganography is the complement of Cryptography and its goal is to hide the presence of a message and to create a covert channel (Chunfang, Fenlin, Shuangkui, Jicang, Junwei, 2019). A prominent steganography instance is simmon’s prisoner’s problem (Feng, Zhang, Dawei, Zhanyang, Shaohua, Lianyong, 2019). They were considering the famous example of Bob and Alice. Depending on the model proposed in this paper, Bob is the sender and Alice is the receiver. Bob is willing to share some concealed data with Alice but not in a common way. He used this Steganography technique and hide the data in an image and transmitted to the Alice. At the receiver end Alice knowing about the technique can easily extract the data hidden in the image. Generally, any unauthorised persons (intruders) without prior knowledge of the technique used by the authorised persons can only download the image but will not be able to extract the hidden information. Attackers are using some of these techniques to add the dangerous malicious data to disrupt the target systems or individuals (Sairam, Boopathybagan, 2019).

The main goal of steganography is defeating the identification of hidden data. However, this approach became a victim of several passive and active attacks. Later, people have used this method to do illegal activities like cyberwars, cyber-attacks, etc(Rupa, Thippa, M.H, 2020). Day by day, this approach's utilization is increasing by the industry and government for sharing the sensitive data among the authorized partners. Statistical and quantitative steganalysis have often used to identify the data within the multimedia (Rupa, 2020). Generally, steganography uses to conceal the data by authorized persons and deceive the data by the intended persons only. It is a type of covert communication and also helpful to work on complex communication models. It itself has some strengths and weaknesses (Alazab, Venkataraman, Watters, Alazab, 2013).

In olden days, at the sender side a technique involving writing crypto messages on an empty paper with wax making it invisible is used. Later at receiver side, heat is applied to the paper to extract the secret message. This technique is named as Secret Writing (Silman, 2001, Neha, 2015). During Second World War, a famous king used Micro dot Technology to transfer large amount of data. The dots' spaces are considered periods, and the crypted dot is the message (Cole, 2001) (Rupa, 2017). These incidents are motivated to develop an application system that is used to scan multiple images and displays whether the images have any hidden information. This type of applications will be best suited for forensic analysis (Imam, Vassilakis, 2019) (Samiksha, Mahip, Bartere, 2015).

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing