Detecting Stego-Contents in Corporate E-Mails Using Back Propogation Neural Network Algorithm

Anitha Shyam


Information Security and integrity are becoming more important as we use email for personal communication and business. Steganography is used to hide the occurrence of communication. Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. Email is insecure. This proposed will develop a steganalysis framework that will check the Email content of corporate mails by improving the S-DES algorithm with the help of neural network approach. A new filtering algorithm is also developed which will used to extract only the JPG images from the corporate emails. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

In this paper we propose a new method based on neural network to get statistics features of images to identify the underlying hidden data. We first extract features of image embedded information, then input them into neural network to get output. And experiment results indicate this method is valid in steganalysis. This method will be used for Internet/network security, watermarking and so on.

Full Text:



Ahmed Ibrahim. (2007). Steganalysis in Computer Forensics, Security Research Centre Conferences, Australian Digital Forensics Conference, Edith Cowan University.

Avcibaş, İ., Memon, N., & Sankur, B. (2003). Steganalysis using image quality metrics. Image Processing, IEEE Transactions on, 12(2), 221-229.

Chandramouli, R. (2002, April). Mathematical approach to steganalysis. InElectronic Imaging 2002 (pp. 14-25). International Society for Optics and Photonics.

Geetha, S., Sindhu, S. S., & Kamaraj, N. (2009). Detection of Stego Anomalies in Images Exploiting the Content Independent Statistical Footprints of the Steganograms. Informatica, 33(1).

Goth, G. (2005). Steganalysis gets past the hype. IEEE Distributed Systems Online, (4), 2.

Guillermito (2007), “Steganography: a few tools to discover hidden data” Retrieved from

Kelley, J. (2001). Terrorist instructions hidden online. Usa Today, 19.

Shaohui, L., Hongxun, Y., & Wen, G. (2003, July). Neural network based steganalysis in still images. In Multimedia and Expo, 2003. ICME'03. Proceedings. 2003 International Conference on (Vol. 2, pp. II-509). IEEE.

Niels Provos, Peter Honeyman, Hide and Seek (2003), “Introduction to Steganography”, University of Michigan, Published by the IEEE Computer Society.

Provos, N., & Honeyman, P. (2001). Detecting steganographic content on the internet. Center for Information Technology Integration.

Bandyopadhyay, S. K., Bhattacharyya, D., Ganguly, D., Mukherjee, S., & Das, P. (2008, August). A tutorial review on steganography. In International conference on contemporary computing (Vol. 101).

Vajiheh Sabeti; Shadrokh Samavi, Mojtaba Mahdavi and Shahram Shirani (2009), “Steganalysis of Embedding in Difference of Image Pixel Pairs by Neural Network”, Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan, Iran McMaster University, Hamilton, Canada, 1(1), 17-26.



  • There are currently no refbacks.

Copyright (c) 2016 International Journal Series in Engineering Science (IJSES)

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.