CFP last date
20 December 2024
Reseach Article

Implementing Steganalysis using Machine Learning

by Prasanta Kumar Sahoo, Sai Manigopal Reddy, Kalyan Sai Chinthala, Badiga Srinivas, Karthik Lingala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 25
Year of Publication: 2022
Authors: Prasanta Kumar Sahoo, Sai Manigopal Reddy, Kalyan Sai Chinthala, Badiga Srinivas, Karthik Lingala
10.5120/ijca2022922303

Prasanta Kumar Sahoo, Sai Manigopal Reddy, Kalyan Sai Chinthala, Badiga Srinivas, Karthik Lingala . Implementing Steganalysis using Machine Learning. International Journal of Computer Applications. 184, 25 ( Aug 2022), 25-29. DOI=10.5120/ijca2022922303

@article{ 10.5120/ijca2022922303,
author = { Prasanta Kumar Sahoo, Sai Manigopal Reddy, Kalyan Sai Chinthala, Badiga Srinivas, Karthik Lingala },
title = { Implementing Steganalysis using Machine Learning },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2022 },
volume = { 184 },
number = { 25 },
month = { Aug },
year = { 2022 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number25/32468-2022922303/ },
doi = { 10.5120/ijca2022922303 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:22:22.512946+05:30
%A Prasanta Kumar Sahoo
%A Sai Manigopal Reddy
%A Kalyan Sai Chinthala
%A Badiga Srinivas
%A Karthik Lingala
%T Implementing Steganalysis using Machine Learning
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 25
%P 25-29
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays hackers are using many novel techniques to hide malicious files inside an image and later sent these images to target users. These malicious image files allow the hackers to get access to the system and control the victim system from their remote location. In order to prevent this, a Django interface is proposed in this research work to verify whether the file is malicious or not? The interface allows the user to choose an image after downloading from an email or any other sources. The image is then sent to the back end server to verify if there is any malicious file hidden inside the image or not? If there is any hidden file then it is extracted from the image using steganalysis, which is a technique used to extract a hidden file. This classification is done by using machine learning technique where the machine is trained using the dataset containing features of malicious and non-malicious files. Random Forest algorithm is used for classification purpose to classify the file is malicious or not. So when an executable file is hidden inside an image, the file is extracted and the features of that executable file are then sent to the already trained machine learning model. If it is malicious then a message will appear displaying that the file is malicious and if not, a message will appear, displaying that the file is safe to use. This research work is implemented and is then deployed in IIS web server in windows server 2019, so that any user can access the website and can upload single image or multiple images. The website can be accessed through mobile phones or laptops.

References
  1. An Emerging Solution for Detection of Phishing Attacks” in the book "Cyber security Threats with New Perspectives" ISBN 978-1-83968-853-9, December 2021.
  2. Prasanta kumar sahoo and Cheguri Rajitha, “Detecting Forged E-Mail using Data Mining Techniques”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-1, pp 4017-4023, October 2019.
  3. Sven Krasser, Brett Meyer, Patrick Crenshaw, “VALKYRIE: BEHAVIORAL MALWARE DETECTION USING GLOBAL KERNEL-LEVEL TELEMETRY DATA”, 2015 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING, SEPT. 17–20, 2015, BOSTON, USA.
  4. SUN Ming, “Computer Network Security Evaluation Based on Intelligent Algorithm”, Sixth International Conference on Future Generation Communication Technologies (FGCT 2017), 978-1- 5090-6745-9/17/$31.00 ©2017 IEEE
  5. Prasanta kumar sahoo, “Data mining a way to solve Phishing Attacks”, Proceeding of 2018 IEEE International Conference on Current Trends toward Converging Technologies, Coimbatore, India, pp 1-5, 2018.
  6. Tanmoy Sarkar, Sugata Sanyal, “Steganalysis: Detecting LSB Steganographic Techniques”, ResearchGate August 2014.
  7. Tanmoy Sarkar, Sugata Sanyal, "Reversible and Irreversible Data Hiding Techniques” in arxiv.org, arXiv: 1045.2684, 2014.
  8. Khan, A., Siddiqa, A., Munib, S., and Malik, S. A. 2014. A recent survey of reversible watermarking techniques, Information Sciences 279,pp 251-272, 2014.
  9. Subhedar, M. S. and Mankar, V.H. 2014. Current status and key issues in image steganography: a survey, Computer Science Review 13, pp 95-113, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Malicious image stenography Machine learning