Multi-Domain Steganalysis Preprocessing to Fusion Feature for Optimal Stack Ensemble Model
DOI:
https://doi.org/10.52783/jns.v14.2893Keywords:
multi-domain steganalysis, fusion feature extraction, hybrid optimization search-classifier, optimal stacking ensemble modelAbstract
The field of image-based steganography has been widely used, because of the advancement of steganography methods and their applications. In today's world, image-based exploits are used by the steganography approaches in the publicly available dataset. This dataset is used for data modeling to tune the model for high accuracy, robustness, and other best-fit parameters. So, this paper aims to introduce a novel way of approaching hybrid-based steganalysis, including two algorithm blocks. The first block consists of JPEG-based pre-processing as an initial-level stego cross-verification match using multi-domain steganalysis such as statistical, structural, and frequency. The second block consists of a custom-based fusion feature extraction and meta-feature analysis stage based on the statistical measure evaluation with the machine-level models and their stacked ensemble classification, which improved the analysis of the stego and cover images. As a result, our approach would be lightweight for integration modules for different areas like the initial level for data security to minimize individual and organizational hardware-level stego JPEG-image-based exploits with exception flow management, our model will enhance computational efficiency and higher performance scores of steganalysis.
Downloads
Metrics
References
Y. Ma, X. Yu, X. Luo, D. Liu, and Y. Zhang, “Adaptive feature selection for image steganalysis based on classification metrics,” Information Sciences, vol. 644, p. 118973, Apr. 2023, doi: 10.1016/j.ins.2023.118973.
I. S. Bajwa and R. Riasat, "A new perfect hashing based approach for secure stegnograph," 2011 Sixth International Conference on Digital Information Management, Melbourne, VIC, Australia, 2011, pp. 174-178, doi: 10.1109/ICDIM.2011.6093325.
T. Bhuiyan, A. H. Sarower, R. Karim, and M. Hassan, “An Image Steganography Algorithm using LSB Replacement through XOR Substitution,” 2018 International Conference on Information and Communications Technology (ICOIACT), pp. 44–49, Jul. 2019, doi: 10.1109/icoiact46704.2019.8938486.
L. Wang, Y. Xu, L. Zhai, Y. Ren, and B. Du, “A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability,” Pattern Recognition, vol. 87, pp. 106–117, Oct. 2018, doi: 10.1016/j.patcog.2018.10.003.
A. Zanke, T. Weber, P. Dornheim, and M. Engel, “Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments,” Computers & Security, vol. 144, p. 103938, Jun. 2024, doi: 10.1016/j.cose.2024.103938.
M. El-Hady, M. H. Abbas, F. A. Khanday, L. A. Said, and A. G. Radwan, “DISH: Digital image steganography using stochastic-computing with high-capacity,” Multimedia Tools and Applications, vol. 83, no. 25, pp. 66033–66048, Jan. 2024, doi: 10.1007/s11042-023-17998-9.
Kodati, S., Reddy, K.P., Ravi, G., Sreekanth, N. (2022). IoT-based System for Health Monitoring of Arrhythmia Patients Using Machine Learning Classification Techniques. In: Reddy, V.S., Prasad, V.K., Wang, J., Reddy, K. (eds) Soft Computing and Signal Processing. ICSCSP 2021. Advances in Intelligent Systems and Computing, vol 1413. Springer, Singapore. https://doi.org/10.1007/978-981-16-7088-6_25
S. Huang, M. Zhang, Y. Kong, Y. Ke, and F. Di, “FACSNet: Forensics aided content selection network for heterogeneous image steganalysis,” Scientific Reports, vol. 14, no. 1, Nov. 2024, doi: 10.1038/s41598-024-77552-x.
Q. Liu, A. H. Sung, Z. Chen, and J. Xu, “Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images,” Pattern Recognition, vol. 41, no. 1, pp. 56–66, Jun. 2007, doi: 10.1016/j.patcog.2007.06.005.
J. Li, X. Wang, Y. Song, and P. Wang, “FPFnet: Image steganalysis model based on adaptive residual extraction and feature pyramid fusion,” Multimedia Tools and Applications, vol. 83, no. 16, pp. 48539–48561, Nov. 2023, doi: 10.1007/s11042-023-17592-z.
R. Zhang, S. Dong, and J. Liu, “Invisible steganography via generative adversarial networks,” Multimedia Tools and Applications, vol. 78, no. 7, pp. 8559–8575, Dec. 2018, doi: 10.1007/s11042-018-6951-z.
A. Aljarf, H. Zamzami, and A. Gutub, “Is blind image steganalysis practical using feature-based classification?,” Multimedia Tools and Applications, vol. 83, no. 2, pp. 4579–4612, May 2023, doi: 10.1007/s11042-023-15682-6.
L. Fan, J. Qiu, Z. Wang, and H. Wang, “Maximizing steganalysis performance using siamese networks for image,” Multimedia Tools and Applications, vol. 83, no. 31, pp. 76953–76962, Feb. 2024, doi: 10.1007/s11042-024-18572-7.
Xiaozhong Pan, BoTao Yan and Ke Niu, "Multiclass detect of current steganographic methods for JPEG format based re-stegnography," 2010 2nd International Conference on Advanced Computer Control, Shenyang, 2010, pp. 79-82, doi: 10.1109/ICACC.2010.5486869.
R. Böhme, “Principles of Modern Steganography and Steganalysis,” in Information security and cryptography, 2010, pp. 11–77. doi: 10.1007/978-3-642-14313-7_2.
H. -t. Wu and J. Huang, "Secure JPEG steganography by LSB+ matching and multi-band embedding," 2011 18th IEEE International Conference on Image Processing, Brussels, Belgium, 2011, pp. 2737-2740, doi: 10.1109/ICIP.2011.6116235.
V. Saravanan and A. Neeraja, "Security issues in computer networks and stegnography," 2013 7th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 2013, pp. 363-366, doi: 10.1109/ISCO.2013.6481180
J. Reeds, “SOLVED: THE CIPHERS IN BOOK III OF TRITHEMIUS’S STEGANOGRAPHIA,” Cryptologia, vol. 22, no. 4, pp. 291–317, Oct. 1998, doi: 10.1080/0161-119891886948.
S. Hemalatha, U. D. Acharya, and A. Renuka, “Wavelet transform based steganography technique to hide audio signals in image,” Procedia Computer Science, vol. 47, pp. 272–281, Jan. 2015, doi: 10.1016/j.procs.2015.03.207.
Dineshkumar, R., Siddhanti, P., Kodati, S., Shnain, A. H., & Malathy, V. (2024). Misbehavior detection for position falsification attacks in VANETs using ensemble machine learning. In IEEE (pp. 1–5). https://doi.org/10.1109/icdsis61070.2024.10594423.
Kalpana, P., Kodati, S., Sreekanth, N., Ali, H. M., & C, R. A. (2024, August 23). Predictive Analytics for crime prevention in smart cities using Machine Learning. In IEEE. https://doi.org/10.1109/iacis61494.2024.10721948.
Jayasingh, B. B., Kumar, B. S., & Mallareddy, A. (2024, October 24). Predictive Analytics Model for Heart Disease: Leveraging Machine Learning Techniques. https://doi.org/10.1109/icicec62498.2024.10808569.
Reddy, K. P., Ramakrishna, C., Reddy, V. S., Veeranna, T., Kodati, S., & Benarji, T. (2025). Implementation of predicting diabetes disease using machine learning based unified framework. In Cognitive science and technology (pp. 15–24). https://doi.org/10.1007/978-981-97-8533-9_2.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.

