Steganalysis on character substitution using support vector machine

  • Zhao Xinxin*
  • , Huang Liusheng
  • , Li Lingjun
  • , Yang Wei
  • , Chen Zhili
  • , Yu Zhenshan
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

A new steganalysis method is proposed to detect the exists of hidden information using character substitution in texts. This is done by utilizing Support Vector Machine (SVM) as a classifier to classify the characteristic vector input into SVM. The most important step of this detection algorithm is the construction of a proper characteristic vector. Under the prerequisite that the secret bits to be embedded are uniformly distributed, the distribution of the characters used for hiding data has altered after steganographic process, thus the ratio of abnormal characters to normal characters is different in cover texts and stego texts. Experimental results demonstrate that this method can reliably detect whether there is hidden information in texts. The detection accuracy in experiment reaches as high as 96% while the embedding data rate is merely 20%.

Original languageEnglish
Title of host publication2009 2nd International Workshop on Knowledge Discovery and Data Mining, WKKD 2009
Pages84-88
Number of pages5
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 2nd International Workshop on Knowledge Discovery and Data Mining, WKKD 2009 - Moscow, Russian Federation
Duration: 23 Jan 200925 Jan 2009

Publication series

NameProceedings - 2009 2nd International Workshop on Knowledge Discovery and Data Mining, WKKD 2009

Conference

Conference2009 2nd International Workshop on Knowledge Discovery and Data Mining, WKKD 2009
Country/TerritoryRussian Federation
CityMoscow
Period23/01/0925/01/09

Keywords

  • Character substitution
  • Characteristic vector
  • SVM
  • Steganalysis

Fingerprint

Dive into the research topics of 'Steganalysis on character substitution using support vector machine'. Together they form a unique fingerprint.

Cite this