Comparative Analysis of Algorithms for Detecting Hidden Information in Digital Images
Abstract
The article provides an analysis of scientific research in the field of steganalysis of digital images, and considers the classification of steganalytic algorithms. Requirements for software for automating steganalysis and comparing algorithms for detecting information hidden in graphic files are formulated. Using the example of pair analysis, as well as the Chi-square and RS analysis methods, the principle of operation of steganalytic algorithms for digital images of PNG format is considered. A software package for researchment of steganalysis algorithms has been developed in the Ruby programming language. The results of computational experiments and a comparative analysis of the accuracy of the described algorithms using ROC curves are presented. The capabilities of the program are presented and the characteristics of its work with different amounts of hidden information are given. The practical application of the developed software package is the conducting laboratory work at the university to study steganalysis methods, as well as researching the properties of steganalytic algorithms.
References
2. Chowdhuri P., Pal P., Si T. A novel steganographic technique for medical image using SVM and IWT. Multimedia Tools and Applications. 2023;82(13):20497-20516. https://doi.org/10.1007/s11042-022-14301-0
3. Avsentev O.S., Tsyganov K.A. Functional model of the process of implementing the information leak threat by an insider through a hidden steganography channel. Vestnik of Voronezh Institute of the Ministry of Interior of Russia. 2024;(1):36-49. (In Russ., abstract in Eng.) EDN: YTALJK
4. Grachev Ya.L., Sidorenko V.G. Steganalysis of the methods of concealing information in graphic containers. Dependability. 2021;21(3):39-46. (In Russ., abstract in Eng.) https://doi.org/10.21683/1729-2646-2021-21-3-39-46
5. Hmood A.K., Jalab H.A., Kasirun Z.M., Zaidan B.B., Zaidan A.A. On the Capacity and Security of Steganography Approaches: An Overview. Journal of Applied Sciences. 2010;10(16):1825-1833. https://doi.org/10.3923/jas.2010.1825.1833
6. Eid W.M., Alotaibi S.S., Alqahtani H.M., Saleh S.Q. Digital Image Steganalysis: Current Methodologies and Future Challenges. IEEE Access. 2022;10:92321-92336. https://doi.org/10.1109/ACCESS.2022.3202905
7. Singh V., Sharma M., Shirode A., Mirchandani S. A Comprehensive Exploration of Data Security Techniques Using Image Steganography. In: 2024 4th International Conference on Sustainable Expert Systems (ICSES). Kaski, Nepal: IEEE Press; 2024. p. 396-401. https://doi.org/10.1109/ICSES63445.2024.10763010
8. Sizov A.S., Nikutin E.I., Kotenko S.V. Overview and trends of the analysis methods of steganographic messages development. Proceedings of the Southwest State University. Series: IT Management, Computer Science, Computer Engineering. Medical Equipment Engineering. 2013;(4):43-48. (In Russ., abstract in Eng.) EDN: RXGKFX
9. Kumar A., Jamnadas H., Sharma V., Muyeen S. M., Shawkat Ali A. B. M. A Review of Image Steganography Tools. International Journal of Computers and their Applications. 2023;30(1):75-87.
10. Hassan M., Amin M., Mahdi S. Steganalysis Techniques and Comparison of Available Softwares. In: Proceedings of the 1st International Multi-Disciplinary Conference Theme: Sustainable Development and Smart Planning, IMDC-SDSP 2020, Cyperspace, 28-30 June 2020. EAI; 2020. http://dx.doi.org/10.4108/eai.28-6-2020.2297970
11. Veena S.T., Arivazhagan S. Forensic steganalysis for identification of steganography software tools using multiple format image. International Journal of Informatics and Communication Technology. 2021;10(3):188-197. http://doi.org/10.11591/ijict.v10i3.pp188-197
12. Dhawan S., Gupta R. Analysis of various data security techniques of steganography: A survey. Information Security Journal: A Global Perspective. 2020;30(2):63-87. https://doi.org/10.1080/19393555.2020.1801911
13. Vilkhovskiy D.E. A Survey of Steganalysis Methods in the Papers of Foreign Authors. Mathematical Structures and Modeling. 2020;(4):75-102. (In Russ., abstract in Eng.) https://doi.org/10.24147/2222-8772.2020.4.75-102
14. Selvaraj A., Ezhilarasan A., Wellington S.L.J., Sam A.R. Digital image steganalysis: A survey on paradigm shift from machine learning to deep learning based techniques. IET Image Processing. 2021;15(2):504-522. https://doi.org/10.1049/ipr2.12043
15. Islam M.A., Riad M.A.-A.K., Pias T.S. Performance Analysis of Steganography Tools. In: 2020 2nd International Conference on Advanced Information and Communication Technology (ICAICT). Dhaka, Bangladesh: IEEE Press; 2020. p. 428-433. http://doi.org/10.1109/ICAICT51780.2020.9333473
16. Belim S.V., Vilkhovskiy D.E. Algorithm for detection of steganographic inserts type LSB-substitution on the basis of an analysis of the zero layer. Journal of Physics: Conference Series. 2018;944:012012. http://doi.org/10.1088/1742-6596/944/1/012012
17. Ejidokun T., Omitola O.O., Nnamah I., Adeniji K. Implementation and Comparative Analysis of Variants of LSB Steganographic Method. In: 2022 30th Southern African Universities Power Engineering Conference (SAUPEC). Durban, South Africa: IEEE Press; 2022. p. 1-4. http://doi.org/10.1109/SAUPEC55179.2022.9730643
18. Ghosh B.R.A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis. International Journal of Computer Sciences and Engineering. 2022;10(4):1-5. http://doi.org/10.26438/ijcse/v10i4.15
19. Jamatia R., Bhuyan B. Cover selection for image steganography determined by distinct characteristics. In: 2023 12th International Conference on Advanced Computing (ICoAC). Chennai, India: IEEE Press; 2023. p. 1-8. http://doi.org/10.1109/ICoAC59537.2023.10249307
20. Shumskaya O.O., Zelezny M. Adaptive algorithm of replacement-based embedding of data into compressed JPEG images. Informatsionno-upravliaiushchie sistemy = Information and Control Systems. 2018;(5):44-56. (In Russ., abstract in Eng.) http://doi.org/10.31799/1684-8853-2018-5-44-56
21. Korzhik V.I., Nguyen Z.K., Danshina A.V. Detection of stegosystem using embedding into contours of images. H&ES Reserch. 2021;13(5):75-85. (In Russ., abstract in Eng.) http://doi.org/10.36724/2409-5419-2021-13-5-75-85
22. Dumitrescu S., Wu X., Memon N. On steganalysis of random LSB embedding in continuous-tone images. In: Proceedings. International Conference on Image Processing. Vol. 3. Rochester, NY, USA: IEEE Press; 2002. p. 641-644. http://doi.org/10.1109/ICIP.2002.1039052
23. Megias D., Lerch-Hostalot D. Subsequent Embedding in Targeted Image Steganalysis: Theoretical Framework and Practical Applications. IEEE Transactions on Dependable and Secure Computing. 2023;20(02):1403-1421. http://doi.org/10.1109/TDSC.2022.3154967
24. Timofeev M.V., Dudoladova P.G. An investigation tools for Steganography. Sovremennye nauchnye issledovanija i razrabotki. 2019;(1):1016-1019. (In Russ., abstract in Eng.) EDN: VWNDMI
25. Akbar M.H., Sunardi, Riadi I. Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework. International Journal of Advanced Computer Science and Applications. 2020;11(11):315-323. http://dx.doi.org/10.14569/IJACSA.2020.0111141

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.
