Open Access   Article

Steganalysis -Iterative Rule Learning to Discover Patterns

Megala G1 , Maya Mohan2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-06 , Page no. 43-47, Jul-2018


Online published on Jul 31, 2018

Copyright © Megala G, Maya Mohan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library


IEEE Style Citation: Megala G, Maya Mohan, “Steganalysis -Iterative Rule Learning to Discover Patterns”, International Journal of Computer Sciences and Engineering, Vol.06, Issue.06, pp.43-47, 2018.

MLA Style Citation: Megala G, Maya Mohan "Steganalysis -Iterative Rule Learning to Discover Patterns." International Journal of Computer Sciences and Engineering 06.06 (2018): 43-47.

APA Style Citation: Megala G, Maya Mohan, (2018). Steganalysis -Iterative Rule Learning to Discover Patterns. International Journal of Computer Sciences and Engineering, 06(06), 43-47.



In these years, everything is leading to new development and digitization. With these developments in technology, main challenge which exists is the threat of security. Steganography method usually embeds the sensitive messages in visually innocent cover images. The target of steganalysis is to determine the stego images from that of empty images. Every method depending on its hiding capacity of secret data in images place a unique markings or signature in stego images. To find this kind of markings in the images leads us to encorporate a classifier to be made for the purpose of finding the stego images which are usually the outcome of such steganography algorithm. In this, approach involves an evolutionary fuzzy rules to take out the markings of stego images in contrast to those empty images. Thus by using knowledge discovered, appropriate models for steganalysis can be involved and stego images can be found out and evolutionary algorithm can be optimized well. Thus the particular signature of steganographic method can be taken out well and also the kind of method used to produce stego image can be predicted.

Key-Words / Index Term

Steganalysis, Fuzzy rules, Evolutionary Genetic Algorithm, Iterative Rule Learning


[1].HediehSajedi, “Steganalysis based on steganography pattern discovery”, journal of information security and applications, Vol. 30, pp. 3-14, 2016.
[2].David Garcia, Antonio Gonzalez, Raul Perz, “A feature Construction approach for Genetic Iterative Rule learning Algorithm”, Journal of Computer and System Science, Vol. 80, pp. 101-117, 2014.
[3].Archana O. Vyas, Dr. Sanjay V. Dudul, “Study of Image Steganalysis Techniques”, International Journal of Advanced Research in Computer Science, Vol.6, pp.7-11, 2015.
[4].Xiangwei Kong, Chaouy Feng, Ming Li, Yanqing Guo, “Iterative multi-order feature Alignment for JPEG mismatched Steganalysis”, Neuro computing, Vol. 6, pp. 1 - 13, 2016.
[5].Daniel-Lerch Hostalot, David Magias, “Unsupervised Steganalysis based on Artificial Training sets”, Engineering Applications of Artificial Intelligence, Vol. 50, pp. 45-59, 2016.
[6].Kaushal Solankitt, Anindya Sarkart, B.S.Manjunath, “YASS: Yet Another Steganographic Scheme that Resists Blind Steganalysis”, 2017.
[7].Phill Salee, “Model Based Steganography”, Proc. Conference on Computer Science, 2016.
[8].Jessica Fridrich, Miroslav Goljan, David Soukal, “Perturbed Quantization Steganography with Wet Paper Codes”, Conference on ACM, 2004.
[9].Huai-xiang Zhang, Bo Zhang, Feng Wang, “Automatic Fuzzy Rules Generation Using Fuzzy Genetic Algorithm”, Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009.
[10].Shyi-Ming Chen, Fu-Ming Tsai, “Generating Fuzzy Rules from training instances for fuzzy classification systems”, Expert Systems with Applications, Vol. 35, Issue. 7, pp. 971–987, 2002.
[12].Der-Chyuan Lou, Chao-Lung Chou, Hao-Kuan Tso, Chung-Cheng Chiu, “Active steganalysis for histogramshifting based reversible data hiding”, Optics Communications, Vol. 285, pp. 2510-2518, 2012.
[13].R.Chandramouli, “A mathematical framework for active steganalysis”, Multimedia systems, Vol. 9, pp. 303-311, 2003.