Modern techniques for discovering digital steganography

Michael T. Hegarty, Anthony J. Keane

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Digital steganography can be difficult to detect and as such is an ideal way of engaging in covert communications across the Internet. This research paper is a work-in-progress report on instances of steganography that were identified on websites on the Internet including some from the DarkWeb using the application of new methods of deep learning algorithms. This approach to the identification of Least Significant Bit (LSB) Steganography using Convolutional Neural Networks (CNN) has demonstrated some efficiency for image classification. The CNN algorithm was trained using datasets of images with known steganography and then applied to datasets with images to identify concealed data. The algorithm was trained using 5000 clean images and 5000 Steganography images. With the correct configurations made to the deep learning algorithms, positive results were obtained demonstrating a greater speed, accuracy and fewer false positives than the current steganalysis tools.

Original languageEnglish
Title of host publicationProceedings of the 19th European Conference on Cyber Warfare and Security, ECCWS 2020
EditorsThaddeus Eze, Lee Speakman, Cyril Onwubiko
PublisherCurran Associates Inc.
Pages609-613
Number of pages5
ISBN (Electronic)9781912764617
DOIs
Publication statusPublished - 2020
Event19th European Conference on Cyber Warfare and Security, ECCWS 2020 - Virtual, Online
Duration: 25 Jun 202026 Jun 2020

Publication series

NameEuropean Conference on Information Warfare and Security, ECCWS
Volume2020-June
ISSN (Print)2048-8602
ISSN (Electronic)2048-8610

Conference

Conference19th European Conference on Cyber Warfare and Security, ECCWS 2020
CityVirtual, Online
Period25/06/2026/06/20

Keywords

  • Darknet
  • Deep Learning
  • JPEG
  • LSB
  • Openpuff
  • Steganography

Fingerprint

Dive into the research topics of 'Modern techniques for discovering digital steganography'. Together they form a unique fingerprint.

Cite this