Abstract
This paper intents to solve the challenging problem of steganographer detection in the real world from a new perspective: side channel attack. We propose utilizing the behavior of actors in the social network to identify the steganographer. While there are many behavior information may expose the steganographer, we just consider the correlation between images sequence as an example in this paper. Base on the assumption that the steganographer choosing images for communication randomly, we design the feature of subtractive images adjacent model (SIAM) to represent the correlations between images sequence of each actor. And then a binary classifier is used to identify the steganographer. To simulate the real world, the images in the experiment are all crawled from twitter. The experimental result shows good performance of our method.
Similar content being viewed by others
References
Chen M, Sedighi V, Boroumand M (2017) JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images
Cogranne R, Sedighi V, Fridrich J (2017) Practical strategies for content-adaptive batch steganography and pooled steganalysis. Paper presented at the Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE International Conference on
Denemark T, Sedighi V, Holub V (2014) Selection-channel-aware rich model for steganalysis of digital images. Paper presented at the Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7:868–882
Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. Paper presented at the Proceedings of the 9th workshop on Multimedia & security
Ker AD (2006) Batch steganography and pooled steganalysis. Paper presented at the Information Hiding
Ker AD, Pevný T (2011) A new paradigm for steganalysis via clustering. Paper presented at the Media Forensics and Security
Ker AD, Pevný T (2014) The steganographer is the outlier: realistic large-scale steganalysis. IEEE Trans Inf Forensics Secur 9(9):1424−1435
Ker AD, Pevny T (2012) Batch steganography in the real world. Paper presented at the Proceedings of the on Multimedia and security
Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444
Li F, Wen M, Lei J (2017) Efficient steganographer detection over social networks with sampling reconstruction. Peer-to-Peer Networking and Applications, 1-16
Li F, Wu K, Lei J, Wen M, Bi Z, Gu C (2016) Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans Inf Forensic Secur 11(2):344–357
Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. SPIE Media Watermarking, Security, and Forensics, vol 9409. https://doi.org/10.1117/12.2083479
Russell MA (2013) Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, GitHub, and More: " O'Reilly Media, Inc."
Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. Paper presented at the Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
Xu G, Wu H, Shi YQ (2016a) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712
Zhao Z, Guan Q, Zhao X (2016) Embedding Strategy for Batch Adaptive Steganography. Paper presented at the International Workshop on Digital Watermarking
Zheng, M., Zhang, S.-h., & Wu, S. (2017). Steganographer detection via deep residual network. Paper presented at the Multimedia and Expo (ICME), 2017 IEEE International Conference on.
Acknowledgments
This work was supported in part by the Natural Science Foundation of China under Grant U1636201, 6157245.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, L., Zhang, W., Chen, K. et al. Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection. Multimed Tools Appl 78, 8041–8055 (2019). https://doi.org/10.1007/s11042-018-6582-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6582-4