A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis
Research Paper | Journal Paper
Vol.10 , Issue.4 , pp.1-5, Apr-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i4.15
Abstract
Image steganography is used as a covert communication technique which hides secret data in cover image intelligently so that it is visually imperceptible. This is often used by individual or organization with bad intent to harm people, organization or society. Steganalysis technique is used to break these systems to extract the secret information, reveal such covert communication and thwart imminent threat. Steganalytic techniques can be broadly classified as targeted or blind. In the former the knowledge of steganographic system used should be known and the latter adopts a more general approach where no knowledge of the process used to hide data is required. This paper studies some well-established statistical methods of targeted steganalysis and gray level co-occurrence matrix based blind steganalysis and compare their performances.
Key-Words / Index Term
RS, Sample pair analysis, Chi-squared, Gray level co-occurrence matrix
References
[1] R.J. Anderson, F. A Petitcolas, “On the Limits of Steganography”, IEEE Journal on Selected Areas in Communications, Vol.16, Issue.4,pp.474-481,1998.
[2] B. Li, J. He, J. Huang, Y. Q. Shi, "A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing., Vol. 2, Issue.2 ,pp.142-172, 2011.
[3] A. Nissar, A.H. Mir, “Classification of Steganalysis Techniques. A Study”, Digital Signal Processing, Vol. 20, Issue.6, pp.1758-1770, 2010.
[4] S. Pathak, R. Roy, S. Changder, “Performance Analysis of Image Steganalysis Techniques and Future Research Directives”, International Journal of Information and Computer Security. Vol.10, Issue.1, pp.1-24, 2018.
[5] A. Westfeld, A. Pfitzmann, “Attacks on Steganographic Systems”,In Lecture Notes in Computer Science, Vol.1768, Springer, Berlin, pp. 61-76, 2000.
[6] J. Fridrich ,M. Goljan, R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images”, In the Proceedings of the Workshop on Multimedia and Security: New Challenges, ACM, New York, pp. 27-30,2001.
[7] S. Dumitrescu, X. Wu, Z.Wang, “Detection of LSB Steganography via Sample Pair Analysis”, IEEE Transactions on Signal Processing, Vol.51, Issue.7, pp. 1995-2007, 2003.
[8] P. Lu, X. Luo, Q. Tang, L. Shen, “An Improved Sample Pairs Method for Detection of LSB Embedding.”, In Lecture Notes in Computer Science, Vol. 3200, Springer, Berlin, pp.116-127,2004.
[9] R. M. Haralick, K. Shanmugam, I. H. Dinstein,"Textural Features for Image Classification", IEEE Transactions On Systems, Man, and Cybernetics Vol.3, Issue. 6 , pp. 610-621, 1973.
[10] R. M. Haralick, "Statistical And Structural Approaches To Texture," Proceedings of the IEEE, vol. 67, no. 5, pp. 786-804, 1979.
[11] K. Sullivan, U. Madhow, S. Chandrasekaran , B. S. Manjunath, "Steganalysis for Markov Cover Data With Applications to Images", IEEE Transactions on Information Forensics and Security Vol.1, Issue. 2, pp. 275-287, 2006.
[12] L. Nanni, S. Brahnam, S. Ghidoni, E. Menegatti, T. Barrier, "Different Approaches for Extracting Information from the Co-Occurrence Matrix.," PloS one Vol.8, Issue. 12, pp. 1-9, 2013.
[13] A.D. Ker,”Quantitative Evaluation of Pairs and RS Steganalysis”. In the Proceddings of SPIE 5306. Security, Steganography, and Watermarking of Multimedia Contents VI, Vol. 5306,SPIE,San Jose, pp. 83-97,2004.
[14] H. Zhang, H. Tang, “A Novel Image Steganography Algorithm Against Statistical Analysis.” In the Proceedings of International Conference on Machine Learning and Cybernetics, IEEE, Hong Kong, pp. 3884-3888, 2007.
[15] X. Luo,F. Liu,P. Lu, “A LSB Steganography Approach Against Pixels Sample Pairs Steganalysis”, International Journal of Innovative Computing, Information and Control, Vol.3, Issue.3, pp. 575-588,2007.
[16] S. Manoharan, “An Empirical Analysis of RS Steganalysis” In the Proceedings of the Third International Conference on Internet Monitoring and Protection, IEEE, Bucharest, pp.172-177, 2008.
[17] T. Qian, S. Manoharan, “A Comparative Review of Steganalysis Techniques”, In the Proceedings of 2nd International Conference on Information Science and Security (ICISS), IEEE, Seoul,pp.1-4, 2015.
[18] N. Prokhozhev, , O. Mikhailichenko, , A. Sivachev, , D. Bashmakov, A. Korobeynikov, “Passive Steganalysis Evaluation: Reliabilities of Modern Quantitative Steganalysis Algorithms”, In the Proceedings of the First International Scientific Conference Intelligent Information Technologies for Industry (IITI’16). Advances in Intelligent Systems and Computing, Vol. 451. Springer, Cham, pp. 89-94, 2016.
[19] R. A. Solodukha, I. V. Atlasov, “Modification of RS-Steganalysis to Attacks Based on Known Stego-Program”, In the Proceedings of Second Russia and Pacific Conference on Computer Technology and Applications (RPC), IEEE, Vladivostok, pp. 176-179, 2017.
[20] N. Mewalal, W. S. Leung “Improving Hidden Message Extraction Using LSB Steganalysis Techniques”, In the Proceedings of International Conference on Information Science and Applications, Lecture Notes in Electrical Engineering. Vol. 514, Springer, Singapore, pp. 273-284, 2018.
[21] W. Lin, T. Lai, C. Chou “Chi-Square-based Steganalysis Method Against Modified Pixel-Value Differencing Steganography”, Arabian Journal for Science and Engineering, Vol.46, Issue.9,pp. 8525-8533,2021.
[22] H. B. Kekre, A. A. Athawale, S. A. Patki, "Improved Steganalysis of LSB Embedded Color Images Based On Stego-Sensitive Threshold Close Color Pair Signature", International Journal of Engineering Science and Technology (IJEST), Vol. 3, Issue. 2, pp. 836-842,2011.
[23] H. B. Kekre, A. A. Athawale and S. A. Patki., "Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix", International Journal of image processing (IJIP), Vol. 5, Issue. 1, pp. 36-45, 2011.
[24] Z. Xia, X. Wang, X. Sun,B. Wang, "Steganalysis of Least Significant Bit Matching using Multi?Order Difference," Security and Communication Networks, Vol. 7, Issue. 8, pp. 1283-1291, 2014.
[25] A. Anjum, S. Islam, "LSB Steganalysis Using Modified Weighted Stego-Image Method," In the Proceedings of the 3rd International Conference on Signal Processing and Integrated Networks (SPIN), IEEE,Noida, pp. 630-635,2016.
[26] O. J. Sandoval, M. C. Hernandez, G. S. Perez, K. T. Medina, H. P. Meana, M. N. Miyatake, "Compact Image Steganalysis For LSB-Matching Steganography", In the Proceedings of the 5th International Workshop on Biometrics and Forensics (IWBF), IEEE, Coventry, pp. 1-6,2017.
[27] Z. Sun, M. Hui, C. Guan, "Steganalysis Based on Co-occurrence Matrix of Differential Image", In the Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, Harbin, pp. 1097-1100, 2008.
[28] S. Ghanbari, M. Keshtegary, N. Ghanbari,, "New Steganalysis Method using GLCM and Neural Network", International Journal of Computer Applications Vol.42, Issue. 2, pp. 45-50, 2012.
[29] I. A. Khalifa, S. R. Zeebaree, M. Ata?, F. M. Khalifa, "Image Steganalysis In Frequency Domain Using Co-Occurrence Matrix and BPNN" Science Journal of University of Zakho Vol. 7, Issue. 1, pp. 27-32, 2019.
[30] J. Fridrich, M. Goljan, D. Soukal, “Higher-Order Statistical Steganalysis of Palette Images”, In the Proceedings of SPIE 5020, Security and Watermarking of Multimedia Contents V, SPIE , Santa Clara, pp. 178 - 190, 2003.
Citation
Bibek Ranjan Ghosh, "A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis," International Journal of Computer Sciences and Engineering, Vol.10, Issue.4, pp.1-5, 2022.
A Review on Comparison of Human Bite Marks in Forensic Images
Review Paper | Journal Paper
Vol.10 , Issue.4 , pp.6-10, Apr-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i4.610
Abstract
Human bite mark analysis is most demanding and complicated part of forensic dentistry, involving identification of assailant by comparing record of their dentition with record of bite mark left on a victim. Bite marks are unique to individual such as distance and angles between teeth, missing, and teeth fillings. This type of impression evidence can be left in the skin of a victim. Following the identification of an injury as a bite mark, the comparison of the pattern produced to a suspect’s dentition is very vital. This article contains the current methods of comparison of human bite marks using different methods and technologies.
Key-Words / Index Term
Bite marks, Forensic images, comparison overlays, Suspect identification, Bite mark analysis
References
[1] Van der Velden, M. Spiessens, G. Willems, "Bite mark analysis and comparison using image perception technology", The Journal of Forensic Odonto-Stomatology, Vol.24, No.1, 2006.
[2] Beatriz Ramos, Juan C. Torres, Ana Molina & Stella Martin-de-las-heras, "A new method to geometrically represent bite marks in human skin for comparison with the suspected dentition", Australian Journal of Forensic Sciences, 51:2, 220-230, 2017.
[3] Anoop K. Verma, Sachil Kumar , Sandeep Bhattacharya, “Identification of a person with the help of bite mark analysis”, journal of oral biology and craniofacial research, 3:88-91, 2013.
[4] Manas B, Nilesh P, Manika A and Betina C, "Bite Marks – Revisited", Journal of Forensic Science & Criminology, Vol.4, Issue 5, 2016.
[5] Nandita Kottieth Pallam, Karen Boaz, Srikant Natrajan, Minu Raj, Nidhi Manaktala, Amitha J. Lewis "Computer–based method of bite mark analysis: A benchmark in forensic dentistry?", Journal of Forensic Dental Sciences, Vol.8, Issue 1, 2016.
[6] Rakhee Modak, Sandhya Tamgadge, Amit Mhapuskar, Manjula Hebbale, N. Vasantha Vijayarabhavan “Bite Mark Analysis: Chasing the Bite!”, Indian Journal of Oral Health and Research, Vol.2, Issue 2. 2016.
[7] Richard Souviron and Leslie Haller, "Bite mark evidence: bite mark analysis is not the same as bite mark comparison or matching or identification", Journal of Law and the Biosciences, 617–622, 2017.
[8] Nima A. Osman, Aya Z. Omer and Amal H. Abuaffan,"Comparative Study on Two Methods for Bite Mark Analysis", ARC Journal of Forensic Science, Vol.2, Issue 1, pp.12-16, 2017.
[9] Lalitha Chintala, Marthala Manjula, Stuti Goyal, Vinil Chaitanya, Md. K. A. Hussain, Y. C. Chaitanya, "Human Bite Marks – A Computer?based Analysis Using Adobe Photoshop", Journal of Indian Academy of Oral Medicine & Radiology, Vol.30, Issue 1. 2018.
[10] B Rai, S Anand, M Madan, S Dhattarwal, "Bite Marks: A new Identification Technique", The Internet Journal of Forensic Science, Vol.2, Number 1. 2006.
[11] Dr. Shazia Shafat Shah, "Bite marks: A potent tool in forensic dentistry: A review", International Journal of Medical and Health Research, Vol.3, Issue 3, pp. 21-23. 2017,
[12] N Kaushal, “Human Bite Marks In Skin: A Review”, The Internet Journal of Biological Anthropology, Vol.4, Number 2. 2010.
[13] Sandeep Kaur, Kewal Krishan, Preetika M Chatterjee and Tanuj Kanchan, "Analysis and Identification of Bite Marks in Forensic Casework", OHDM, Vol.12, No.3. 2013.
[14] SK Padmakumar, VT Beena, N Salmanulfaris, Ashith B Acharya, G Indu, Sajai J Kumar,"Bite Mark Analysis",Oral and Maxillofacial Pathology Journal, Vol.5, Issue 2, pp.488-490. 2014.
[15] Kaur Sandeep, Kaur Kirandeep, Abhiroop Singh,"BITE MARK ANALYSIS IN FORENSIC ODONTOLOGY",International Journal of Dental and Health Sciences, Vol.3, Issue 03, pp.650-654, 2016.
[16] G.S. Golden, "STANDARDS AND PRACTICES FOR BITE MARK PHOTO GRAPHY", Journal of Forensic Odontostomatology, Vol.29, Issue 2, pp.29-37, 2011.
[17] Ramesh G, Nagarajappa R, Sreedhar G, Sumalatha G,"Forensic Photography - An Emphasis on Bite Mark Photograph",Journal of Dental Research and Review, Vol.1, Issue 1, pp.39-41, 2014.
[18] Saritha Maloth, KS Ganapathy,"Comparison between five commonly used two-dimensional methods of human bite mark overlay production from the dental study casts",Indian Journal of Dental Research, Vol.22, Issue 3, pp.499-505, 2011.
[19] Dhanya S. Rao, I. M. Ali, Rajeshwari G. Annigeri,"Bitemarks – A review", Journal of Dental Research and Review, Vol.3, Issue 1, pp.31-35. 2016.
[20] Fagr Faiz Hassan Yousif,"Human Bite Mark", Journal of Forensic Science & Criminal Investigation, Vol.4 Issue 4, 2017. id : 555647.
Citation
M. Chandramouleeswaran, N. Puviarasan, "A Review on Comparison of Human Bite Marks in Forensic Images," International Journal of Computer Sciences and Engineering, Vol.10, Issue.4, pp.6-10, 2022.
Feature Selection and Ensemble Method Analysis for Breast Cancer Datasets
Research Paper | Journal Paper
Vol.10 , Issue.4 , pp.11-15, Apr-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i4.1115
Abstract
Breast cancer has become the most common cause of death in women. Early detection of breast cancer helps out to reduce the risk factors. Three classification algorithms (NB, DT, and KNN) were used on two different Breast cancer datasets using the WEKA tool. The main purpose of this paper is to compare the results of the classification algorithms using voting and feature selection methods. The experimental result shows that voting of three classifiers gives the highest performance accuracy on the Breast cancer dataset. The ensemble method is used to increase the accuracy of the data mining algorithms. We also compare the performance accuracy of classifiers using feature selection methods (IG and PCA) on breast cancer datasets.
Key-Words / Index Term
J48,NaïveBayes,KNN,Voting classifier, feature selection
References
[1] Ahmed Iqbal Pritom, Shahed Anzarus Sabab, Md. Ahadur Rahman Munshi, Shihabuzzaman Shihab,"Predicting breast cancer recurrence using effective classification and feature selection technique", 19th International conference on computer and information technology, December 18-20, 2016.
[2] D. Lavanya,K. U. Rani, "Analysis of feature selection with classification: Breast Cancer Datasets", Indian Journal of computer science and engineering (IJCSE), Vol. 2 NO. 5 Oct-NOV 2011, ISSN: 0976-5166.
[3] G. Ravi Kumar, Dr. G. A. Ramachandra,K.Nagamani, "An Efficient Prediction of Breast Cancer Data using Data Mining Techniques", International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2 Issue 4 August 2013, ISSN: 2319-1058.
[4] Vikas Chaurasia, Saurabh Pal, "A Novel Approach for Breast Cancer Detection using Data Mining Techniques.", International Journal of Innovative Research in Computer and Communication Engineering ,Vol. 2, Issue 1, January 2014.
[5] U. Karthik Kumar, M.B. Sai Nikhil and K. Sumangali, "Prediction of Breast Cancer using Voting Classifier Technique", IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2 - 4 pp.108-114, August 2017.
[6] Subrato Bharati, Mohammad Atikur Rahman, Prajoy Podder, "Breast Cancer Prediction Applying Different Classification Algorithm with Comparative Analysis using WEKA.", 4th International conference on electrical engineering and information and communication technology, 2018.
[7] Vikas Chaurasia, Saurabh Pal and BB Tiwari, "Prediction of benign and malignant breast cancer using data mining techniques.", Journal of Algorithms & Computational Technology, Vol. 12(2) 119–126, 2018, doi:DOI: 10.1177/1748301818756225.
[8] V.Nanda Gopal, Fadi Al-Turjman, R. Kumar, L.Anand, M.Rajesh, "Feature selection and classification in breast cancer prediction usingIOTandmachine learning.", Elsevier, 18 April 2021, doi:https://doi.org/10.1016/j.measurement.2021.109442.
[9] Ghanchi, Nileshkumar Modi and Kaushar, "A Comparative Analysis of Feature Selection Methods and Associated Machine Learning Algorithms on Wisconsin Breast Cancer Dataset", Proceedings of International Conference on ICT for Sustainable Development, Advances in Intelligent Systems and Computing 408, 2016, doi:10.1007/978-981-10-0129-1_23.
[10] J. Han, M.K.,"Data Mining Concepts and Techniques", A volume of The Morgan Kaufmann Series in Data Management system, 2012.
Citation
Jyoti Negi, K.L. Bansal, "Feature Selection and Ensemble Method Analysis for Breast Cancer Datasets," International Journal of Computer Sciences and Engineering, Vol.10, Issue.4, pp.11-15, 2022.
An Online Predictive System for Mapping Visual Scenes of Fraudulent Behaviour
Research Paper | Journal Paper
Vol.10 , Issue.4 , pp.16-20, Apr-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i4.1620
Abstract
Fraudulent behaviour are suspicious activities that usually occur before a crime takes place. These suspicious activities are being carried out on a day-to-day basis in banks, supermarkets, restaurants, Bus stop, offices, residential buildings, companies e.t.c. Within the banking industry, fraudulent behaviour is when a customer or a person makes suspicious moves before committing a crime. In this paper, an online predictive system for mapping visual scene against fraudulent behaviour was developed. The dataset for this system was collected from Kaggle database. The analysis of the video clips gave a total of 427 frames, 380 was visually mapped to be of fraudulent behaviour while 47 was being mapped to be of normal behaviour. These frames were used in training a convolutional neural network for detecting fraudulent behaviour from a video clip. The proposed model was deployed to web using python and flask framework. Our result gave about 99.99%. The proposed system was compared with that of Nakib et.al. (2018). The result of Nakib et.al. (2018) gave an accuracy of about 90.2% while that of our proposed system gave 99.99%.
Key-Words / Index Term
Fraudulent Behaviour, Visual Scenes, Surveillance Camera, Deep Learning
References
[1]. S. Jatav, V. Sharma, “An algorithm for predictive data mining approach in medical diagnosis”, International Journal of Computer Science & Information Technology (IJCSIT) Vol, 10., 2018.
[2]. B. E. Aguinaldo, “21st Century Learning Skills Predictive Model Using PART Algorithm”, In Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, pp. 134-137, 2019.
[3]. T. Davenport, A. Guha, D. Grewal, T. Bressgott, “How artificial intelligence will change the future of marketing”, Journal of the Academy of Marketing Science, 48(1), 24-42, 2020.
[4]. M. Zawawi, K. Jusoff, A. Rahman, “Behavioral intention for fraudulent reporting behaviour using cognitive theory”. Asian Social Science, 4(7), 43-47, 2008
[5]. W. W. Eckerson, “Predictive analytics. Extending the Value of Your Data Warehousing Investment”, TDWI Best Practices Report, 1, 1-36, 2007.
[6]. A. Grawal, J.S. Gans, A. Goldfarb, “Exploring the impact of artificial intelligence: Prediction versus judgment”, Information Economics and Policy, 47, 1-6, 2018.
[7]. A. Sell, A, “The Same Old Story: Predictive Algorithms and the Novel”. tba: Journal of Art, Media, and Visual Culture, 2(1), 49-58.2020
[8]. W.H. Smith, M. Milford, K. D. McDonald-Maier, S. Ehsan, S., “Scene Retrieval for Contextual Visual Mapping”. arXiv preprint arXiv:2102.12728, 2021
[9]. M. Nakib, R. Khan, M. Hasan, J. Uddin, J, “Crime scene prediction by detecting threatening objects using convolutional neural network”, In International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2), pp. 1-4, 2018. IEEE.
[10]. T. Chandrakala, S. Nirmala, K. Dharmarajan, K. Selvam K, “Development Of Crime And Fraud Prediction Using Data Mining Approaches”., International Journal of Advanced Research in Engineering and Technology (IJARET) Vol.11, Issue 12, pp. 1450-1470, December 2020.
[11] P. Stalidis, T. Semertzidis, P. Daras, “Examining Deep Learning Architectures for Crime Classification and Prediction”, Forecasting. 3(4): 741-762, 2021.
https://doi.org/10.3390/forecast3040046.
[12] M. Merylin, M. Stéphanie, C. Scarpazza, G. Nicolò, “Detecting deception through facial expressions in a dataset of videotaped interviews: A comparison between human judges and machine learning models”, Computers in Human Behaviour. 127, 2022. https://doi.org/10.1016/j.chb.2021.107063.
[13] S. Aruljothi, K. Pavithradevi, “Detection Of Suspicious Activities In Public Areas Using Staged Matching Technique”, International Journal Of Advanced Information And Communication Technology. 1(1), 140-143, 2014
[14] G. Vallathan, A. John, C. Thirumalai, S. Mohan, G. Srivastava, “Suspicious activity detection using deep learning in secure assisted living IoT environments”, The Journal of Supercomputing. doi:10.1007/s11227-020-03387-8, 2020.
[15]. J. Ali, N. Shati, M.T. Gaata, “Abnormal activity detection in surveillance video scenes”. TELKOMNIKA (Telecommunication Computing Electronics and Control), 18(5), 2447. https://doi.org/10.12928/TELKOMNIKA. V18I5.16634, 2020.
[16]. K. Pawar, V. Attar, V., “Deep learning approaches for video-based anomalous activity detection”, World Wide Web. doi:10.1007/s11280-018-0582-1
Citation
C. Ubani, V.I.E. Anireh, N.D. Nwiabu, "An Online Predictive System for Mapping Visual Scenes of Fraudulent Behaviour," International Journal of Computer Sciences and Engineering, Vol.10, Issue.4, pp.16-20, 2022.