Symmetry (Jan 2022)

A Steganalysis Classification Algorithm Based on Distinctive Texture Features

  • Baraa Tareq Hammad,
  • Ismail Taha Ahmed,
  • Norziana Jamil

DOI
https://doi.org/10.3390/sym14020236
Journal volume & issue
Vol. 14, no. 2
p. 236

Abstract

Read online

Steganography is the technique for secretly hiding messages in media such as text, audio, image, and video without being discovered. Image is one of the most essential media for concealing data, making it hard to identify hidden data not visible to the human eye. In general, the cover image and the encrypted image are symmetrical in terms of dimension size, resolution, and qualities. This makes the difference difficult to perceive with the human eye. As a result, distinguishing between the two symmetric images required the development of methods. Steganalysis is a technique for identifying hidden messages embedded in digital material without having to know the embedding algorithm or the “non-stego” image. Due to their enormous feature vector dimension, which requires more time to calculate, the performance of most existing image steganalysis classification (ISC) techniques is still restricted. Therefore, in this research, we present a steganalysis classification method based on one of the texture features chosen, such as segmentation-based fractal texture analysis (SFTA), local binary pattern (LBP), and gray-level co-occurrence matrix (GLCM). The classifiers employed include Gaussian discriminant analysis (GDA) and naïve Bayes (NB). We used a public database in our proposed method and applied it to IStego100K datasets to be able to assess its performance. The experimental results reveal that in all classifiers, the SFTA feature surpassed all of the texture features, making it a great texture feature for image steganalysis classification. In terms of feature dimension and classification accuracy (CA), a comparison was made between the suggested SFTA-based GDA approach and various current ISC methods. The outcomes of the comparison are obvious show that the proposed method surpasses current methods.

Keywords