TY - GEN
T1 - Universal steganography detector based on an artificial immune system for JPEG images
AU - Pérez, José De Jesús Serrano
AU - Rosales, Moises Salinas
AU - Cruz-Cortés, Nareli
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016
Y1 - 2016
N2 - Steganography is a hiding information technique heavily used nowadays. Though initially it was used to establish hidden communication channels, modern steganography has been found useful to hide code inside multimedia objects, mostly images. Its goal is to infiltrate malware into organizations or personal devices. This kind of malware is called stegomalware. As countermeasure, modern steganalysis methods employing different Computational Intelligence techniques such as Support Vector Machine, Machine Learning, Fisher Linear Discriminant, and others have been utilized. In this work we present a new stegananalysis method based on an Artificial Immune System (AIS), to detect JPEG images modified with three well known steganographic tools: F5, Outguess, or Steghide. It is also proposed the usage of Haar Wavelets to extract a feature vector that best describes the analyzed image, this is due the Haar Wavelets fast calculation and information synthesis. Our experimentation results are competitive against techniques representative of the state of the art.
AB - Steganography is a hiding information technique heavily used nowadays. Though initially it was used to establish hidden communication channels, modern steganography has been found useful to hide code inside multimedia objects, mostly images. Its goal is to infiltrate malware into organizations or personal devices. This kind of malware is called stegomalware. As countermeasure, modern steganalysis methods employing different Computational Intelligence techniques such as Support Vector Machine, Machine Learning, Fisher Linear Discriminant, and others have been utilized. In this work we present a new stegananalysis method based on an Artificial Immune System (AIS), to detect JPEG images modified with three well known steganographic tools: F5, Outguess, or Steghide. It is also proposed the usage of Haar Wavelets to extract a feature vector that best describes the analyzed image, this is due the Haar Wavelets fast calculation and information synthesis. Our experimentation results are competitive against techniques representative of the state of the art.
KW - Artificial immune systems
KW - Haar wavelets
KW - Image analysis
KW - Steganalysis
KW - Steganography
UR - http://www.scopus.com/inward/record.url?scp=85015212756&partnerID=8YFLogxK
U2 - 10.1109/TrustCom.2016.0290
DO - 10.1109/TrustCom.2016.0290
M3 - Contribución a la conferencia
AN - SCOPUS:85015212756
T3 - Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
SP - 1896
EP - 1903
BT - Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
Y2 - 23 August 2016 through 26 August 2016
ER -