Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection | Multimedia Tools and Applications Skip to main content
Log in

Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper intents to solve the challenging problem of steganographer detection in the real world from a new perspective: side channel attack. We propose utilizing the behavior of actors in the social network to identify the steganographer. While there are many behavior information may expose the steganographer, we just consider the correlation between images sequence as an example in this paper. Base on the assumption that the steganographer choosing images for communication randomly, we design the feature of subtractive images adjacent model (SIAM) to represent the correlations between images sequence of each actor. And then a binary classifier is used to identify the steganographer. To simulate the real world, the images in the experiment are all crawled from twitter. The experimental result shows good performance of our method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Chen M, Sedighi V, Boroumand M (2017) JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images

  2. Cogranne R, Sedighi V, Fridrich J (2017) Practical strategies for content-adaptive batch steganography and pooled steganalysis. Paper presented at the Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE International Conference on

  3. Denemark T, Sedighi V, Holub V (2014) Selection-channel-aware rich model for steganalysis of digital images. Paper presented at the Information Forensics and Security (WIFS), 2014 IEEE International Workshop on

  4. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7:868–882

  5. Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. Paper presented at the Proceedings of the 9th workshop on Multimedia & security

  6. Ker AD (2006) Batch steganography and pooled steganalysis. Paper presented at the Information Hiding

  7. Ker AD, Pevný T (2011) A new paradigm for steganalysis via clustering. Paper presented at the Media Forensics and Security

  8. Ker AD, Pevný T (2014) The steganographer is the outlier: realistic large-scale steganalysis. IEEE Trans Inf Forensics Secur 9(9):1424−1435

  9. Ker AD, Pevny T (2012) Batch steganography in the real world. Paper presented at the Proceedings of the on Multimedia and security

  10. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444

  11. Li F, Wen M, Lei J (2017) Efficient steganographer detection over social networks with sampling reconstruction. Peer-to-Peer Networking and Applications, 1-16

  12. Li F, Wu K, Lei J, Wen M, Bi Z, Gu C (2016) Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans Inf Forensic Secur 11(2):344–357

  13. Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. SPIE Media Watermarking, Security, and Forensics, vol 9409. https://doi.org/10.1117/12.2083479

  14. Russell MA (2013) Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, GitHub, and More: " O'Reilly Media, Inc."

  15. Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. Paper presented at the Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)

  16. Xu G, Wu H, Shi YQ (2016a) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712

  17. Zhao Z, Guan Q, Zhao X (2016) Embedding Strategy for Batch Adaptive Steganography. Paper presented at the International Workshop on Digital Watermarking

  18. Zheng, M., Zhang, S.-h., & Wu, S. (2017). Steganographer detection via deep residual network. Paper presented at the Multimedia and Expo (ICME), 2017 IEEE International Conference on.

Download references

Acknowledgments

This work was supported in part by the Natural Science Foundation of China under Grant U1636201, 6157245.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiming Zhang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, L., Zhang, W., Chen, K. et al. Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection. Multimed Tools Appl 78, 8041–8055 (2019). https://doi.org/10.1007/s11042-018-6582-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6582-4

Keywords

Navigation