Symmetry 14 00117
Symmetry 14 00117
Review
Comprehensive Survey of Multimedia Steganalysis:
Techniques, Evaluations, and Trends in Future Research
Doaa A. Shehab * and Mohmmed J. Alhaddad
                                          Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia;
                                          malhaddad@kau.edu.sa
                                          * Correspondence: dshehab@stu.kau.edu.sa
                                          Abstract: During recent years, emerging multimedia processing techniques with information security
                                          services have received a lot of attention. Among those trends are steganography and steganalysis.
                                          Steganography techniques aim to hide the existence of secret messages in an innocent-looking
                                          medium, where the medium before and after embedding looks symmetric. Steganalysis techniques
                                          aim to breach steganography techniques and detect the presence of invisible messages. In the modern
                                          world, digital multimedia such as audio, images, and video became popular and widespread, which
                                          makes them perfect candidates for steganography. Monitoring this huge multimedia while the user
                                          communicates with the outside world is very important for detecting whether there is a hidden
                                          message in any suspicious communication. However, steganalysis has a significant role in many
                                          fields, such as to extract the stego-message, to detect suspicious hidden messages and to evaluate
                                          the robustness of existing steganography techniques. This survey provides the general principles of
                                          hiding secret messages using digital multimedia as well as reviewing the background of steganalysis.
                                          In this survey, the steganalysis is classified based on many points of view for better understanding. In
                                          addition, it provides a deep review and summarizes recent steganalysis approaches and techniques
                                          for audio, images, and video. Finally, the existing shortcomings and future recommendations in this
         
                                   field are discussed to present a useful resource for future research.
Citation: Shehab, D.A.; Alhaddad,
M.J. Comprehensive Survey of              Keywords: steganalysis; steganography; data hiding; information security
Multimedia Steganalysis: Techniques,
Evaluations, and Trends in Future
Research. Symmetry 2022, 14, 117.
https://doi.org/10.3390/sym14010117       1. Introduction
Academic Editor: Mihai Postolache               Digital communication has revolutionized our everyday lives. Robust and secure
                                          communication is in demand to preserve information security. Many existing secure
Received: 8 October 2021
                                          methods have been proposed and applied, but they are still being developed, to make
Accepted: 3 December 2021
                                          these methods more effective in terms of security and performance [1].
Published: 10 January 2022
                                                In general, information security systems are divided into two main categories, which
Publisher’s Note: MDPI stays neutral      are cryptography and data hiding. Both categories aim to secure data whilst the difference
with regard to jurisdictional claims in   is implied in their techniques. Cryptography uses various data encryption techniques and
published maps and institutional affil-   converts secret data into a hash encrypted package, while steganography does not modify
iations.                                  the format of data but depends on hiding the secret data in innocuous-looking data [2].
                                                Despite the popularity of cryptography techniques, as long as a third party knows
                                          about the presence of a secret message, the attacks will continue. Steganography is a new
                                          step in the encryption world due to fast implementation and no need for large software,
Copyright: © 2022 by the authors.         besides the complexity of the composition and decomposition process which makes it
Licensee MDPI, Basel, Switzerland.        difficult to crack. Hence, cryptography approaches could be more secure by combining
This article is an open access article    them with steganography techniques.
distributed under the terms and                 Steganography is one of the oldest security techniques, going back to the Greek age.
conditions of the Creative Commons
                                          The word ‘Steganography’ is made of two old Greek words, “Stegano” and “Graphy”,
Attribution (CC BY) license (https://
                                          which means “Cover Writing”. Over thousands of years, it was used in different forms such
creativecommons.org/licenses/by/
                                          as wax tables, human skin, astragali, parchment, linguistic syntax, and newspapers [1].
4.0/).
                         During the first world war, microdot technology, using waste materials from magazines
                         was used by the Germans [3]. In World War II, there were many mechanisms utilized to
                         write secret messages, such as writing open-coded messages, Enigma machines, and using
                         invisible ink [4]. In Saudi Arabia, a project for secret writing was started at the Abdu-
                         laziz City of Science and Technology. The project was about translating some old Arabic
                         manuscripts on secret writing into English. These manuscripts were written 1200 years
                         ago. Some of them were collected from Germany and Turkey [1,5].
                               However, the concept of digital steganography is recently emerging in the past two
                         decades. The evolution of wireless systems and digital multimedia moved steganography
                         to digital processing. In this regard, many contributions in this field have been proposed
                         to ensure the security of sensitive information during transmission [6–8]. Despite the
                         advantages of steganography, unfortunately, most uses of steganography are regarding
                         illegitimate objectives involving three major areas, which are terrorism, pornography, and
                         stolen data [9].
                               The past years have seen many illegitimate uses for steganography, such as in Berlin in
                         May of 2011, a suspected al-Qaeda member was arrested with a memory card. The German
                         Federal Criminal Police claimed that the memory card contained more than 100 text files
                         about the future operations of al-Qaeda. These files were hidden in a pornographic
                         video [10]. In the same year, Microsoft researchers discovered a new form of the ‘Alureon’
                         trojan that exploits steganography to be indomitable [11]. In Japan in October 2018, a
                         spam campaign targeted users to deliver a banking trojan using steganography. The
                         malicious code was hidden in a normal looking medium to be undetected by signature-
                         based detection [12].
                               Given the illegitimate and dangerous usage of steganography in the past, the re-
                         searchers start investing many efforts in steganalysis to detect and prevent malicious
                         usage [13–15]. Steganalysis is the art of extracting hidden messages from a stego-file. These
                         days, steganalysis has become a complex procedure, especially when it deals with an en-
                         crypted embedded message [16]. Steganalysis plays a significant role in many applications
                         such as law enforcement, digital forensics, and national security. In the academic and
                         research field, steganalysis could also be used to evaluate the strength of the proposed
                         steganography techniques. Figure 1 illustrates the applications of steganalysis techniques.
 [18]     2018             IET Signal Processing       Audio         - Provide a comprehensive review of audio steganalysis.
                                                                     - Classify the literature into different categories.
                                                                     - Conduct comparison between different works.
Table 1. Cont.
 [26]     2020             Journal of Real-Time       Image     - Discuss the impacts of the real-time Image Steganalysis (IS).
                           Image Processing                     - Provide a brief overview of the IS based on deep NNs.
                                                                - Analyze a practical real-time IS application and prospect
                                                                the future issues of real-time IS.
                                                                - Present different NNs structures of the existing literature
 [27]     2020             book(Digital media         Image
                                                                from the period 2015–2018
                           steganography) in                    - Discussed the memory and time complexity, and practical
                           Elsevier                             problems for efficiency.
                                                                - Explored the link between some past approaches sharing
                           (ScienceDirect)
                                                                similarities.
                                                                - Discuss steganography by deep learning.
 [28]     2020             IEEE International         Image
                           Conference on Visual
                                                                - Review the preprocessing modules associated with CNN
                           Communications and
                                                                models.
                           Image Processing
                           KSII Transactions on
                                                                - Analyze current research states from the latest image
 [29]     2020             Internet and Information   Image
                                                                steganography and steganalysis techniques based on DL.
                           and Systems
                                                                - Highlights the strengths and weakness of existing
                                                                up-to-date techniques.
                                                                - Discuss the challenges and future recommendations.
Table 2. The difference between our survey and other steganalysis surveys.
                              2. Steganography: An Overview
                                    Assuring the confidentiality of the transferred information is a crucial element. In this
                              regard, a few techniques have been established to ensure message confidentiality. However,
                              sometimes, keeping the existence of the message secret is demanded. This shows the
                              importance of steganography usage.
                                    The common concept of steganography is to hide the communication between two
                              sides from the eyes of attackers. Hence, concealed communication can be embedded
                              in an innocuous medium such as computer code, video film, or audio recording. After
                              exchanging the data, both parties should destroy the cover message to prevent accidental
                              reuse [32].
                                    To hide data in any medium, embedding and extracting algorithms are required. The
                              task of the embedding algorithm is to hide secret information within a cover medium. In
                              this step, a secret key is applied to protect the process of embedding; hence, ensuring that
                              only those with the secret keyword can access the hidden information. In contrast, the
                              extracting algorithm is used on a feasibly modified medium and returns the hidden secret
                              information [32].
                             One of the oldest and most used steganography techniques is Least Significant Bits
                         (LSB), which was used as an example to explain the general steganography scheme [24] in
                         Figure 5.
Symmetry 2022, 14, 117                                                                                           8 of 26
Figure 5. Steganography scheme. Example of embedding a data in LSB. Taken from [24].
                         the difference is that the first one extracts deep features while the last extracts hand-crafted
                         features, respectively. However, this method is still recent and needs more investigation.
                         3.2. Classification
                               After feature extraction, the classification step is performed which generally includes
                         three methods, statistical strategy method, machine learning method, deep learning
                         method. The steganalysis techniques start detecting the stego-medium by comparing
                         the features of the cover and stego mediums in the case of the targeted techniques. The other
                         way was to use a statistical strategy such as a threshold, so the stego medium is detected
                         if the extracted features exceed or are below it. Emerging of Artificial Intelligence (AI)
                         including pattern recognition, machine learning, deep learning, etc., opened the door for
                         researchers to exploit their advantages in steganalysis. There are many existing techniques
                         based on machine learning, while deep learning is still a new area in this field. [25]. The
                         steganalysis techniques based on the classification method would be classified as presented
                         in the following subsections.
                         4. Literature Review
                               Digital image steganalysis algorithms focus on the dependencies of inter-pixels, which
                         is the foundation of natural images. While digital audio steganalysis algorithms are based
                         on the file’s characteristic aspects such as the audio signal’s distortion measure and its
                         high-order statistics. Steganalysis algorithms for digital video target the “spatial and
                         temporal redundancies in the video signals within the individual frames and at inter-frame
                         level” [45]. In this section, the recent state-of-the-art regarding the steganalysis techniques
                         for digital video, image, and audio are reviewed. At the end of each section a summary is
                         provided in Table 3 for audio steganalysis, Table 4 for image steganalysis, and Table 5 for
                         video steganalysis.
Symmetry 2022, 14, 117                                                                                                                                                                   12 of 26
 Ref.         Year       Type of Features            Detection Method          Database                       Steganography Technique        Advantage                  Limitation
                                                                                                                                             Detecting low              Time consumption for
                         Hand crafted Statistical                              Unknown dataset consists of
 [46]         2017                                   Machine learning SVM                                     MP3Stego steganography.        embedding-rate in the      the feature
                         (Markov features)                                     1000 stereo WAV audios
                                                                                                                                             MP3 audios                 construction phase.
                                                                                                                                             good performance in
                         Hand crafted Statistical                                                                                            several MP3
                                                                               General dataset consists of    Different steganography
                         (Multi-scale correlations   Machine learning                                                                        steganography
 [47]         2020                                                             10,000 mp3 files with 10 s     techniques includes HCM,                                  High dimensionality
                         measure for QMDCT           (ensemble classifier)                                                                   algorithms, bitrates,
                                                                               duration.                      MP3Stego, and EECS
                         coefficients)                                                                                                       duration, and relative
                                                                                                                                             payloads.
                                                                                                                                                                        The detection accuracy
                                                                               Two datasets consist of 4169   Different steganography        High accuracy detection    decreases in the low
                         Hand crafted Statistical
 [48]         2017                                   Machine learning SVM      wave music clips and 1029      techniques includes LSB, SS,   against target and         embedding rate for
                         (Markov features)
                                                                               speech wave files.             DCT, and others                universal techniques       speech datasets in most
                                                                                                                                                                        of the cases.
                                                                                                                                                                        The accuracy detection
                                                                                                              Different steganography
                                                                               General datasets consist of                                                              for low embedding
                         Hand crafted Statistical                                                             techniques includes            High accuracy detection
 [49]         2018                                   Machine learning SVM      2000 WAV files with rate of                                                              ratio not sufficient
                         (LP features)                                                                        Hide4PGP,S-Tools,              for high embedding ratio
                                                                               44.1 kHz.                                                                                comparing with high
                                                                                                              StegoMagic, and Xiao
                                                                                                                                                                        embedding
                                                                                                                                             Improving the
                                                                               A dataset cotains 6300 mono                                                              Moderate detection
                         Deep features using         Fully connected Layer                                    LSB matching and STC           architecture of CNN to
 [50]         2019                                                             WAV files with rate of                                                                   accuracy for low
                         CNN                         (softmax)                                                steganography techniques       enhance the detection
                                                                               16 kHz.                                                                                  embedding rate
                                                                                                                                             performance.
                                                                               Two datasets cotain 10,000
                                                                               with 16-kHz rate and (2 s)     Different steganography
                         Deep features using
 [51]         2019                                   Machine learning SVM      duration in AAC format, and    techniques includes LSB,       High detection accuracy    High dimensionality
                         (S-ResNet)
                                                                               9000 with 44.1 kHz rate and    MIN, SIGN, and MP3Stego
                                                                               (5 s) duration in mp3 format
Symmetry 2022, 14, 117                                                                                                                                                                     13 of 26
 Ref.         Year       Type of Features             Detection Method           Database                      Steganography Technique      Advantage                    Limitation
                         Hand crafted Statistical                                                                                           High efficiency with         Low detection accuracy
                                                                                 UW image database             LSB flipping image
 [52]         2018       feature (color               Machine learning SVM                                                                  single dimension             in case the low
                                                                                 consisting of 1333 images     steganography.
                         correlativity)                                                                                                     analysis                     embedding rates
                                                                                                                                                                         The extraction
                                                                                                                                            Fast and low
                         Statistical feature          Hand crafted Statistical                                                                                           performance decrease
 [53]         2017                                                               BossBase image database       SS steganography.            computation complexity
                         (variance)                   strategy                                                                                                           with high embedding
                                                                                                                                            comparing with [54]
                                                                                                                                                                         distortion.
                                                                                                               Different steganography                                   Not taking in to
                         Hand crafted Statistical
                                                                                                               techniques including         Simple and high              account the frequencies
 [55]         2019       feature (histograms of       Machine learning SVM       DBLST and BIVC database
                                                                                                               distortion-based,            performance                  of different SEs
                         SE)
                                                                                                               pattern-based, and others.                                patterns.
                                                                                                                                            Adapting new and             The pre-processing
                                                                                                               Different steganography
                         Hand crafted Statistical                                                                                           effective statistical law    steps before features
                                                                                                               techniques including
 [56]         2018       feature (Zipf’s law in the   Machine learning RF        UCID database                                              for extracting features in   extraction may
                                                                                                               spatial-based,
                         wavelet transform)                                                                                                 the wavelet transform        produced high
                                                                                                               transform-based.
                                                                                                                                            domain                       execution time.
                                                                                                               Different steganography      Low computation
                         Hand crafted Statistical
                                                      Machine learning           BSD300 dataset contains 150   techniques including         complexity, low time
 [57]         2019       features from transform                                                                                                                         Small dataset
                                                      CIML                       JPEG images                   distortion-based,            consumption, and high
                         and spatial domains)
                                                                                                               spatial-based, and others.   performance
                                                                                                               Spatial UNIversal WAvelet
                         Deep features from
                                                      Fully connected layer      BOSSbase dataset contains     Relative Distortion                                       High computation
 [58]         2018       spatial domain using                                                                                               High detection accuracy
                                                      (softmax classifier)       10,000 images                 (S-UNIWARD)                                               complexity
                         DRN
                                                                                                               steganography.
                                                                                                               Spatial UNIversal WAvelet
                                                                                                                                                                         An ordinary accuracy
                         Deep features from                                                                    Relative Distortion          Considering the spatial
                                                      Fully connected layer      BOSSbase dataset contains                                                               although the high
 [59]         2020       spatial and transform                                                                 (S-UNIWARD) and Wavelet      and transform domains
                                                      (softmax classifier)       10,000 images                                                                           computational
                         domains using CNN                                                                     Obtained Weights             to increase the accuracy
                                                                                                                                                                         complexity
                                                                                                               steganography.
Symmetry 2022, 14, 117                                                                                                                                                                   14 of 26
 Ref.         Year       Type of Features             Detection Method          Database                        Steganography Technique   Advantage                    Limitation
                                                                                Contains 100 YUV sequences
                         Hand crafted features                                                                                            Takes into account the
                                                     Machine learning           (H.264/AVC standard), each
 [60]         2017       NPELO (36-dimensional)                                                                 MV steganography          motion characteristic of     Uses small datasets
                                                     (SVM)                      sequence has 150 to
                         + MVRBR                                                                                                          video content.
                                                                                300 frames
                                                                                                                                                                       Their experiment
                         Hand crafted features                                  284 uncompressed video                                    The detection accuracy       limited and can not
                                                     Machine learning
 [61]         2018       (entropy,motion, and                                   (H.264/AVC standard) from       MV steganography          does not affect by the bit   detect the currently
                                                     (SVM)
                         statistic features)                                    internet                                                  rate variations              best steganography
                                                                                                                                                                       methods
                                                                                Contains 14 YUV sequences                                 Exploit the videos spatial
                         Hand crafted features
                                                     Machine learning           (H.264/AVC standard), only                                and temporal
 [62]         2017       (motion intensity and                                                                  SS steganography                                       Uses small datasets
                                                     (SVM)                      the first 90 frames from each                             redundancies
                         texture histograms)
                                                                                sequences                                                 simultaneously
                                                                                33 videos each contains
                                                                                80 frames in 720P and
                                                                                                                                          Exploit the videos spatial
                         Hand crafted features                                  30 videos each contains                                                                Considering as a
                                                     Machine learning                                           PU partition modes        and temporal
 [63]         2019       (statistic change in                                   50 frames in 1080P (HEVC                                                               targeted steganalysis
                                                     (SVM)                                                      steganography             redundancies
                         distribution of the PU)                                standard), only the first                                                              technique
                                                                                                                                          simultaneously
                                                                                90 frames from each
                                                                                sequences
                         Hand crafted features                                                                                            Blind steganalysis           computational
                         (statistical features of    mMchine learning           22 PAL QCIf video dataset                                 technique and can be         complexity due to the
 [64]         2020                                                                                              MV steganography
                         inter-frame and             (SVM)                      (H.264/AVC standard)                                      adjusted to various video    high dimensionality of
                         intra-frame)                                                                                                     codec standards.             features
                         Deep features
                                                      Fully connected           Unknown dataset contains                                                               Did not taking into
                         (steganographic noise                                                                  MV and Intra Prediction   Universal steganalysis
 [65]         2020                                    Layer(softmax             (200,000 frames for training                                                           account the temporal
                         residual features) using                                                               Mode steganography        technique
                                                      classifier)               and testing                                                                            domain.
                         CNN
                         Deep features                                                                                                    Extract deep features        Extract the features
                                                     Fully connected Layer      Xiph Video Test Media
 [66]         2020       (512-dimensional) using                                                                MV steganography          and estimates the            from fixed-size block
                                                     (softmax classifier)       database(HEVC standard)
                         CNN                                                                                                              embedding rate               motion estimation
Symmetry 2022, 14, 117                                                                                            15 of 26
                         to extract the residual signal from the input audio. Then the hierarchical representations of
                         the input are obtained using six various sets of layers, where the first set contains only the
                         activation of the first convolutional layer and the remaining sets contain a convolutional
                         layer and a pooling layer. After each convolution operation, the non-linear activation
                         is applied. By the end of these layers, the audio signal is transformed into 215-features.
                         To detect the steganography, the extracted features are fed into the binary classifier that
                         contains a softmax layer and a fully connected layer. This approach proved its effectiveness
                         at detecting different embedding rates.
                               Ren et al. [51] proposed a universal steganalysis technique where a ResNet is applied
                         for the features extraction. The spectrogram of the audio signal was used as input for
                         the neural network, called the Spectrogram Deep Residual Network (S-ResNet). Figure 9
                         illustrates how the spectrogram can represent the energy information of various frequency
                         bands over time as well as consisting of valuable time-frequency information in the audio
                         signal. For this reason, the authors attempted to use it for capturing relative features
                         produced by the audio steganography technique. The architecture of S-ResNet contains
                         31 convolutional layers between the batch normalization and ReLU layers, for accelerating
                         the learning process and learning more complex patterns, respectively. After each group
                         of convolutional layers, there is a residual unit to compute a residual function. Two
                         average pooling layers are applied to decrease the data size after every five residual blocks.
                         Finally, a global average pooling layer is applied to produce the feature vector. After the
                         S-ResNe trained an efficient model, this model is fed to an SVM for final training and
                         binary classification. The experiment’s results show superior detection, where the average
                         accuracy is 94.98% and 99.93% for both AAC and MP3 formats, respectively.
                               In the beginning, the researchers tried to find a signature or pattern to detect specific
                         well-known steganographic techniques [68]; however, this type has only limited applica-
                         tions. With the evolution and variety of steganography techniques, robust steganalysis
                         techniques became more necessary. Many steganalysis techniques started to extract sta-
                         tistical features that can reflect invisible changes in the digital medium. As an example,
                         Chaeikar et al. [52] proposed a blind statistical steganalysis technique for detecting the
                         Least Significant Bit (LSB) flipping image steganography. The authors found that the
                         natural color harmony of the pixel is affected when embedding the data. Hence, a statistical
                         feature that analyses the color correlativity is extracted from the image pixels to detect the
                         existence of the secret message. At first, the pixels were classified into three classes depend-
                         ing on the color similarity with the neighboring pixels, and the level of suspiciousness of
                         pixels was identified according to the mean and standard deviation. That leads to a dataset
                         used to train SVM for detecting and estimating the embedded message length.
                               Another blind image steganalysis is proposed by Soltanian and Ghaemmaghami [53]
                         to detect the spread spectrum steganography. The core of their method is to discover
                         the carrier and stego message matrices using a well-known least-squares method. The
                         carrier matrix is randomly initialized, then the carrier and message matrices are updated
                         based on a univariate gradient descent method. Their technique is based on the work of
                         Li et al. [54], where the aim is to reduce the computation complexity and to rely on no
                         prior knowledge about the number of spread spectrum carriers. Therefore, the proposed
                         technique consecutively extracts the data bits of each carrier by extracting the variance to
                         reduce the computational cost. To detect and estimate the number of embedded messages
                         without prior knowledge, the proposed technique intends to reach the disturbance of the
                         residual stego-image to a minimum by reducing the variance of the residual stego-image.
                               A statistical model based on a histogram of pixel structuring elements is proposed
                         by Lu et al. [55]. This model is developed to extract the steganography in binary images,
                         where the image contains only two values (0 and 1) unlike color and grayscale images. The
                         histograms are computed for all structure elements (SE) in the image; Figure 10 represents
                         how large SE can contain several neighboring small SEs. Then, only the bins of SEs that
                         have a high probability of flippable pixels are selected as a feature set using an empirical
                         threshold. The SVM classifier is used to detect the stego-image. In addition, the authors
                         create available datasets for binary images called DBLST. The DBLST and the open BIVC
                         dataset are used for experiments which show that the proposed technique outperforms the
                         state-of-the-art techniques in detecting different types of stego images.
Figure 10. A large SE can be considered a union of various neighboring small SEs [55].
                              Laimeche et al. [56] proposed a universal steganalysis technique, where Zipf’s law [70]
                         is exploited to extract the features in the wavelet transform. The basic idea of Zipf’s law in
                         image representation includes three phases. The first phase is a mask size for counting the
                         frequency of patterns appearance. The second phase is to minimize the number of patterns
                         by identifying significant wavelet coefficients, this leads to a more significant distribution
                         for pattern frequency. In the third phase, the Zipf curve, is produced, which represents
                         the pattern frequency and the number of pattern axes. Finally, Area under the Curve of
Symmetry 2022, 14, 117                                                                                           18 of 26
                         Zipf, Inflection Point, and Subband Auto-Similarity Metric) features are extracted from the
                         produced Zipf curve. To detect the stego images, the random forest classifier is trained
                         using the UCID dataset.
                              A novel steganalysis technique that aims to reduce the computation and time con-
                         sumption along with high performance is proposed by Guttikonda and Sridevi [57]. Each
                         Coefficient based Walsh Hadamard Transform and Gray Level Co-occurrence Matrix is
                         used to extract the features from the transform and spatial domains, respectively. To
                         reduce the feature dimensionality and select the most relevant features, the Pine Growth
                         Optimization algorithm was applied. Finally, the selected features are used to train the
                         Cross Integrated Machine Learning classifier to distinguish the cover- and stego-images.
                         The experiment’s results showed the effectiveness of the proposed technique in terms
                         of detection accuracy and the execution time, where it reduced the time by about 0.66
                         compared with the existing Multi-SVM technique.
                              Very deep learning and automatic feature extraction are applied in the work of
                         Wu et al. [58]. Specifically, a novel CNN model called Deep Residual learning Network
                         (DRN) is proposed for image steganalysis. The authors have proved that the very deep
                         neural network that contains many layers can reflect complex statistical properties, which
                         leads to more effective distinguishing the stego-images. The main idea of their technique is
                         to feed the network with noise components of the image, instead of the original image to
                         force the network to consider the weak signal produced by data embedding. Thereafter,
                         DRN is trained to learn the effective features of cover- and stego-images. For the binary
                         classification, a fully connected layer with a softmax classifier was performed. The ex-
                         perimental results conducted using the BOSSbase dataset showed the superiority of the
                         proposed technique compared with other deep neural networks-based techniques.
                              Another deep neural network-based technique that extracts features from multi-
                         domains is proposed by Wang et al. [59]. Firstly, two famous steganalysis methods are
                         simulated which are spatial rich model SRM and DCT residual for detecting the steganog-
                         raphy features in both spatial and transform domains. In the next step, the previous linear
                         features with nonlinear SRM features are fed to the CNN layer to extract general fea-
                         tures. Finally, the fully connected layer is applied for stego- and cover-image classification.
                         Through the experiments, the authors proved the effectiveness of considering the nonlinear
                         features extraction as well as extracting features from multi-domains, where the detection
                         accuracy is increased by 0.3~6% and 2~3%, respectively.
                         30 fps in CIF format. The database was addressed in the H.264/AVC standard by the
                         ×264 tool.
                               Another steganalytical technique based on MV is proposed by Sadat et al. [61], where
                         the entropy and motion estimation field is utilized for selecting the features. After dividing
                         the frame into blocks, local optimization of the cost function is used to extract intrinsic and
                         statistical features include the sum of absolute differences (SAD) and the sum of absolute
                         transformed differences (SATD). Then all blocks have given weight depending on the
                         amount of texture, where high textures gave a high weighted value in decision making
                         during training of the SVM classifier. For evaluation, 284 video sequences have been used
                         which were downloaded from the Internet. Their technique obtained high accuracy up
                         to 99.9%.
                               Spatial and temporal motion features are considered simultaneously in the tech-
                         nique of Tasdemir et al. [62]. The frames are first divided into three-dimensional blocks
                         (8 × 8 × temporal axis). Then, from each block, three histograms are computed for the
                         three dimensions, then the motion and texture features are extracted. After calculating
                         these features, the blocks are categorized into three classes, where the first-class contains
                         the blocks in which its features remained unchanged; the second-class contains the blocks
                         with slight changes, and the third-class includes the blocks containing a large change. Each
                         class is given a weight value that is identified empirically. For the classification task, the
                         comprehensive presentation of the spatiotemporal features and the weighted modulation
                         are fed to the SVM for training. The used database contains 14 YUV sequences; only the
                         first 90 frames of each sequence are used for the experiments. The database was addressed
                         in the MPEG2 and H.264 formats standard. The authors have proved that using spatial
                         and temporal simultaneously can increase detection accuracy by 20 % and 5% in low and
                         high payloads, respectively, compared with seven different steganalysis techniques.
                               Recently, Li et al. [63] proposed a steganalytical technique for HEVC video steganogra-
                         phy. The frame in the HEVC standard can divide into the same size code tree unit (CTU). In
                         the addition, CTU can divide into smaller code units (CU), each CU can further divide into
                         a transform unit (TU) and prediction unit (PU) as illustrated in Figure 11. Their technique
                         is based on the fact the PU partition modes would be changed after embedding the data.
                         Hence, they selected the rate of change of PU partition modes in the cover- and stego-video
                         as features. These features are the input for the SVM classifier. According to the experiment,
                         the detection accuracy reaches approximately 93%.
                               the technique does not have any information regarding the steganography techniques and
                               the embedding rate. The experiment result on the 22 PAL QCIf video dataset showed the
                               stability and high detection accuracy reach 95% in a real-world situation.
                                     The first universal steganalysis technique based on deep learning was proposed
                               by Liu and Li [65]. The proposed noise residual feature has arisen from the fact of the
                               intra-prediction mode and motion vector steganography techniques affect the pixel values
                               of the decoded frames. Therefore, the authors developed an NR-CNN framework to
                               extract features from noise residuals and learn the steganographic noise residual features
                               that are independent of the content of the frame. The fully connected layer and softmax
                               classifier are used for binary classification. The experimental dataset was contained 200,000
                               frames for training, 20,000 for verification, and 200,000 frames for testing. The experiments
                               demonstrated satisfying results regarding low embedding rate, and high performance in
                               the case of a high embedding rate with 59.82% and 99.74% detection accuracy for intra
                               prediction, respectively, and 62.53% and 95.39% detection accuracy for MV, respectively.
                                     Huang et al. [66] proposed the first deep learning-based video quantitative steganaly-
                               sis technique. The features are extracted from 4 × 4 PU of each frame since it is the most
                               basic unit in the HEVC video standard. To ensure the robustness of the neural network
                               against low and high bitrates that exist in the same video, each of the motion vectors and
                               the prediction matrices has been calculated, respectively, for each 4 × 4 PU. These matrices
                               are fed to CNN, which is consequently, extracts a 512-dimensional feature vector and
                               submits it to the last fully connected layer. The softmax classifier is used to detect the stego-
                               video and estimate the bitrate. The experimental results on the Xiph Video Test Media
                               database demonstrated that the proposed techniques can estimate different embedding
                               rates with low mean absolute error MAE.
                               5. Databases
                                    A standard database is necessary to evaluate and compare the results of the existing
                               techniques. In this section, we review the existing datasets used for evaluation. Table 6
                               provides a minor description for the existing global trusted datasets. It is clear that there are
                               few public datasets for audio steganalysis, while most are for image steganalysis. However,
                               the ASD and ASDIIE datasets are provided recently which will inspire many researchers in
                               audio steganalysis. On the other hand, currently there is no available standard dataset for
                               video steganalysis. As in the audio steganalysis field, the researchers in video steganalysis
                               use their own datasets to evaluate, which leads to unfair comparisons.
                                   11 October 2021.
Symmetry 2022, 14, 117                                                                                              21 of 26
                               6. Evaluation metrics
                                    The steganalysis approach always produces binary classification classes (cover and
                               stego), so the accuracy, detection rate, and error rate metrics are enough to evaluate the
                               steganalysis techniques. Given the following:
                               •    tp: stego-media classified as stego-media
                               •    tn: cover-media classified as cover-media
                               •    fp: stego-media classified as cover-media
                               •    fn: cover-media classified as stego-media
                                    Then:
                                                            Accuracy = (tp + tn)/all
                                                            DetectionRate (TRP) = tp/(tp + fn)
                                                            ErrorRate (FPR) = fp/(fp + tp)
                                    In addition, the ROC curve is mostly used to evaluate and compare the classification
                               task of many steganalysis techniques. It presents the True Positive Rate with respect to the
                               False Positive Rate, where FPR = 0 and TPR = 1 indicates a perfect detector.
                                  Figure 12. Frequency of published steganography and steganalysis research articles throughout the
                                  years. Where St : steganography and Sa: steganalysis. Taken from [25].
                                  9. Conclusions
                                       This survey provided an overview of the basic concepts of steganography and ste-
                                  ganalysis and their classification. In addition, a comprehensive review of the recent research
                                  on steganalysis techniques for audio, image, and video mediums was provided in detail. The
                                  applications, datasets, and popular tools available for steganalysis were mentioned. In
                                  the end, this survey discussed the main shortcomings in this domain and suggested some
                                  future recommendations.
References
1.    Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B. Comprehensive survey of image steganography: Techniques, Evaluations, and
      trends in future research. Neurocomputing 2019, 335, 299–326. [CrossRef]
2.    Abikoye, O.C.; Ojo, U.A.; Awotunde, J.B.; Ogundokun, R.O. A safe and secured iris template using steganography and
      cryptography. Multimed. Tools Appl. 2020, 79, 23483–23506. [CrossRef]
3.    Petitcolas, F.A.; Katzenbeisser, S. Information Hiding Techniques for Steganography and Digital Watermarking (Artech House Computer
      Security Series); Artech House: Norwood, MA, USA, 2000.
4.    Kahn, D. The history of steganography. In International Workshop on Information Hiding; Springer: Berlin/Heidelberg, Germany,
      1996; pp. 1–5.
5.    Cheddad, A.; Condell, J.; Curran, K.; Mc Kevitt, P. Digital image steganography: Survey and analysis of current methods. Signal
      Process. 2010, 90, 727–752. [CrossRef]
6.    Liao, X.; Yu, Y.; Li, B.; Li, Z.; Qin, Z. A new payload partition strategy in color image steganography. IEEE Trans. Circuits Syst.
      Video Technol. 2019, 30, 685–696. [CrossRef]
7.    Saravanan, M.; Priya, A. An Algorithm for Security Enhancement in Image Transmission Using Steganography. J. Inst. Electron.
      Comput. 2019, 1, 1–8. [CrossRef]
8.    Yi, X.; Yang, K.; Zhao, X.; Wang, Y.; Yu, H. AHCM: Adaptive Huffman code mapping for audio steganography based on
      psychoacoustic model. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2217–2231. [CrossRef]
9.    Rout, H.; Mishra, B.K. Pros and cons of cryptography, steganography and perturbation techniques. IOSR J. Electron. Commun.
      Eng. 2014, 76–81.
10.   CNN. Documents Reveal al Qaeda’s Plans for Seizing Cruise Ships, Carnage in Europe. 2012. Available online: https:
      //edition.cnn.com/2012/04/30/world/al-qaeda-documents-future/index.html (accessed on 5 October 2021).
11.   Zielińska, E.; Mazurczyk, W.; Szczypiorski, K. Trends in steganography. Commun. ACM 2014, 57, 86–95. [CrossRef]
Symmetry 2022, 14, 117                                                                                                                 24 of 26
12.   Trend Micro. Spam Campaign Targets Japan, Uses Steganography to Deliver the BEBLOH Banking Trojan. 2018. Available
      online: https://www.trendmicro.com/vinfo/nz/security/news/cybercrime-and-digital-threats/spam-campaign-targets-japan-
      uses-steganography-to-deliver-the-bebloh-banking-trojan (accessed on 5 October 2021).
13.   Xiang, L.; Guo, G.; Yu, J.; Sheng, V.S.; Yang, P. A convolutional neural network-based linguistic steganalysis for synonym
      substitution steganography. Math. Biosci. Eng. 2020, 17, 1041–1058. [CrossRef] [PubMed]
14.   Yousfi, Y.; Butora, J.; Fridrich, J.; Giboulot, Q. Breaking ALASKA: Color separation for steganalysis in JPEG domain. In
      Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Paris, France, 3–5 July 2019; pp. 138–149.
15.   Yang, Z.; Yang, H.; Hu, Y.; Huang, Y.; Zhang, Y.J. Real-time steganalysis for stream media based on multi-channel convolutional
      sliding windows. arXiv 2019, arXiv:1902.01286.
16.   Karampidis, K.; Kavallieratou, E.; Papadourakis, G. A review of image steganalysis techniques for digital forensics. J. Inf. Secur.
      Appl. 2018, 40, 217–235. [CrossRef]
17.   Banerjee, P. ALASKA2: Image Steganalysis—All You Need to Know. 2020. Available online: https://www.kaggle.com/prashant1
      11/alaska2-image-steganalysis-all-you-need-to-know (accessed on 5 October 2021).
18.   Ghasemzadeh, H.; Kayvanrad, M.H. Comprehensive review of audio steganalysis methods. IET Signal Process. 2018, 12, 673–687.
      [CrossRef]
19.   Paulin, C.; Selouani, S.A.; Hervet, E. Audio steganalysis using deep belief networks. Int. J. Speech Technol. 2016, 19, 585–591.
      [CrossRef]
20.   Amsaveni, A.; Vanathi, P. A comprehensive study on image steganography and steganalysis techniques. Int. J. Inf. Commun.
      Technol. 2015, 7, 406–424. [CrossRef]
21.   Dalal, M.; Juneja, M. Video steganalysis to obstruct criminal activities for digital forensics: A survey. Int. J. Electron. Secur. Digit.
      Forensics 2018, 10, 338–355. [CrossRef]
22.   Reinel, T.S.; Raul, R.P.; Gustavo, I. Deep learning applied to steganalysis of digital images: A systematic review. IEEE Access 2019,
      7, 68970–68990. [CrossRef]
23.   Chutani, S.; Goyal, A. A review of forensic approaches to digital image Steganalysis. Multimed. Tools Appl. 2019, 78, 18169–18204.
      [CrossRef]
24.   Tabares-Soto, R.; Ramos-Pollán, R.; Isaza, G.; Orozco-Arias, S.; Ortíz, M.A.B.; Arteaga, H.B.A.; Rubio, A.M.; Grisales, J.A.A.
      Digital media steganalysis. In Digital Media Steganography; Elsevier: Amsterdam, The Netherlands, 2020; pp. 259–293.
25.   Dalal, M.; Juneja, M. Steganography and Steganalysis (in digital forensics): A Cybersecurity guide. Multimed. Tools Appl. 2020, 80,
      5723–5771. [CrossRef]
26.   Ruan, F.; Zhang, X.; Zhu, D.; Xu, Z.; Wan, S.; Qi, L. Deep learning for real-time image steganalysis: A survey. J. Real-Time Image
      Process. 2020, 17, 149–160. [CrossRef]
27.   Chaumont, M. Deep learning in steganography and steganalysis. In Digital Media Steganography; Elsevier: Amsterdam,
      The Netherlands, 2020; pp. 321–349.
28.   Berthet, A.; Dugelay, J.L. A review of data preprocessing modules in digital image forensics methods using deep learning. In
      Proceedings of the 2020 IEEE International Conference on Visual Communications and Image Processing (VCIP), Macau, China,
      1–4 December 2020; pp. 281–284.
29.   Hussain, I.; Zeng, J.; Xinhong, X.; Tan, S. A survey on deep convolutional neural networks for image steganography and
      steganalysis. KSII Trans. Internet Inf. Syst. (TIIS) 2020, 14, 1228–1248.
30.   Gokhale, A.; Mulay, P.; Pramod, D.; Kulkarni, R. A bibliometric analysis of digital image forensics. Sci. Technol. Libr. 2020,
      39, 96–113. [CrossRef]
31.   Selvaraj, A.; Ezhilarasan, A.; Wellington, S.L.J.; Sam, A.R. Digital image steganalysis: A survey on paradigm shift from machine
      learning to deep learning based techniques. IET Image Process. 2021, 15, 504–522. [CrossRef]
32.   Alarood, A.A.S. Improved Steganalysis Technique Based on Least Significant BIT Using Artificial Neural Network for Mp3 Files.
      Ph.D. Thesis, Universiti Teknologi Malaysia, Skudai, Malaysia, 2017.
33.   Alyousuf, F.Q.A.; Din, R.; Qasim, A.J. Analysis review on spatial and transform domain technique in digital steganography. Bull.
      Electr. Eng. Inform. 2020, 9, 573–581.
34.   Tasdemir, K.; Kurugollu, F.; Sezer, S. Spatio-temporal rich model-based video steganalysis on cross sections of motion vector
      planes. IEEE Trans. Image Process. 2016, 25, 3316–3328. [CrossRef] [PubMed]
35.   Sadek, M.M.; Khalifa, A.S.; Mostafa, M.G. Video steganography: A comprehensive review. Multimed. Tools Appl. 2015,
      74, 7063–7094. [CrossRef]
36.   Sumathi, C.; Santanam, T.; Umamaheswari, G. A study of various steganographic techniques used for information hiding. arXiv
      2014, arXiv:1401.5561.
37.   Khan, S.; Bianchi, T. Ant colony optimization (aco) based data hiding in image complex region. Int. J. Electr. Comput. Eng. 2018,
      8, 379–389. [CrossRef]
38.   Filler, T.; Judas, J.; Fridrich, J. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf.
      Forensics Secur. 2011, 6, 920–935. [CrossRef]
39.   Fridrich, J.; Goljan, M.; Lisonek, P.; Soukal, D. Writing on wet paper. IEEE Trans. Signal Process. 2005, 53, 3923–3935. [CrossRef]
40.   AlSabhany, A.A.; Ali, A.H.; Ridzuan, F.; Azni, A.; Mokhtar, M.R. Digital audio steganography: Systematic review, classification,
      and analysis of the current state of the art. Comput. Sci. Rev. 2020, 38, 100316. [CrossRef]
Symmetry 2022, 14, 117                                                                                                             25 of 26
41.   Nissar, A.; Mir, A.H. Classification of steganalysis techniques: A study. Digit. Signal Process. 2010, 20, 1758–1770. [CrossRef]
42.   Fridrich, J.; Long, M. Steganalysis of LSB encoding in color images. In Proceedings of the 2000 IEEE International Conference on
      Multimedia and Expo, ICME2000, Latest Advances in the Fast Changing World of Multimedia (Cat. No. 00TH8532), New York,
      NY, USA, 30 July–2 August 2000; Volume 3, pp. 1279–1282.
43.   Dittmann, J.; Hesse, D. Network based intrusion detection to detect steganographic communication channels: On the example of
      audio data. In Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, Siena, Italy, 29 September–1 October
      2004; pp. 343–346.
44.   Qian, Y.; Dong, J.; Wang, W.; Tan, T. Feature learning for steganalysis using convolutional neural networks. Multimed. Tools Appl.
      2018, 77, 19633–19657. [CrossRef]
45.   Serrano, J. Steganalysis: A Study on the Effectiveness of Steganalysis Tools. Ph.D. Thesis, Utica College, Utica, NY, USA, 2019.
46.   Ghasemzadeh, H.; Arjmandi, M.K. Universal audio steganalysis based on calibration and reversed frequency resolution of
      human auditory system. IET Signal Process. 2017, 11, 916–922. [CrossRef]
47.   Wang, Y.; Yi, X.; Zhao, X. MP3 steganalysis based on joint point-wise and block-wise correlations. Inf. Sci. 2020, 512, 1118–1133.
      [CrossRef]
48.   Jin, C.; Wang, R.; Yan, D. Steganalysis of MP3Stego with low embedding-rate using Markov feature. Multimed. Tools Appl. 2017,
      76, 6143–6158. [CrossRef]
49.   Han, C.; Xue, R.; Zhang, R.; Wang, X. A new audio steganalysis method based on linear prediction. Multimed. Tools Appl. 2018,
      77, 15431–15455. [CrossRef]
50.   Lin, Y.; Wang, R.; Yan, D.; Dong, L.; Zhang, X. Audio steganalysis with improved convolutional neural network. In Proceedings
      of the ACM Workshop on Information Hiding and Multimedia Security, Paris, France, 3–5 July 2019; pp. 210–215.
51.   Ren, Y.; Liu, D.; Xiong, Q.; Fu, J.; Wang, L. Spec-resnet: A general audio steganalysis scheme based on deep residual network of
      spectrogram. arXiv 2019, arXiv:1901.06838
52.   Chaeikar, S.S.; Zamani, M.; Manaf, A.B.A.; Zeki, A.M. PSW statistical LSB image steganalysis. Multimed. Tools Appl. 2018,
      77, 805–835. [CrossRef]
53.   Soltanian, M.; Ghaemmaghami, S. Blind consecutive extraction of multi-carrier spread spectrum data from digital images. In
      Proceedings of the 2017 Iranian Conference on Electrical Engineering (ICEE), Tehran, Iran, 2–4 May 2017; pp. 1835–1839.
54.   Li, M.; Kulhandjian, M.K.; Pados, D.A.; Batalama, S.N.; Medley, M.J. Extracting spread-spectrum hidden data from digital media.
      IEEE Trans. Inf. Forensics Secur. 2013, 8, 1201–1210.
55.   Lu, W.; Li, R.; Zeng, L.; Chen, J.; Huang, J.; Shi, Y.Q. Binary image steganalysis based on histogram of structuring elements. IEEE
      Trans. Circuits Syst. Video Technol. 2019, 30, 3081–3094. [CrossRef]
56.   Laimeche, L.; Merouani, H.F.; Mazouzi, S. A new feature extraction scheme in wavelet transform for stego image classification.
      Evol. Syst. 2018, 9, 181–194. [CrossRef]
57.   Guttikonda, J.B.; Sridevi, R. A new steganalysis approach with an efficient feature selection and classification algorithms for
      identifying the stego images. Multimed. Tools Appl. 2019, 78, 21113–21131. [CrossRef]
58.   Wu, S.; Zhong, S.; Liu, Y. Deep residual learning for image steganalysis. Multimed. Tools Appl. 2018, 77, 10437–10453. [CrossRef]
59.   Wang, Z.; Chen, M.; Yang, Y.; Lei, M.; Dong, Z. Joint multi-domain feature learning for image steganalysis based on CNN.
      EURASIP J. Image Video Process. 2020, 2020, 1–12. [CrossRef]
60.   Wang, P.; Cao, Y.; Zhao, X. Segmentation based video steganalysis to detect motion vector modification. Secur. Commun. Netw.
      2017, 2017, 8051389. [CrossRef]
61.   Sadat, E.S.; Faez, K.; Saffari Pour, M. Entropy-based video steganalysis of motion vectors. Entropy 2018, 20, 244. [CrossRef]
      [PubMed]
62.   Su, Y.; Yu, F.; Zhang, C. Digital Video Steganalysis Based on a Spatial Temporal Detector. TIIS 2017, 11, 360–373.
63.   Li, Z.; Meng, L.; Xu, S.; Shi, Y. A HEVC video steganalysis algorithm based on pu partition modes. Comput. Mater. Contin. 2019,
      59, 607–624. [CrossRef]
64.   Ghamsarian, N.; Schoeffmann, K.; Khademi, M. Blind MV-based video steganalysis based on joint inter-frame and intra-frame
      statistics. Multimed. Tools Appl. 2020, 80, 9137–9159. [CrossRef]
65.   Liu, P.; Li, S. Steganalysis of Intra Prediction Mode and Motion Vector-based Steganography by Noise Residual Convolutional
      Neural Network. In IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2020; Volume 719,
      p. 012068.
66.   Huang, X.; Hu, Y.; Wang, Y.; Liu, B.; Liu, S. Deep Learning-based Quantitative Steganalysis to Detect Motion Vector Embedding of
      HEVC Videos. In Proceedings of the 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC), Hong Kong,
      China, 27–30 July 2020; pp. 150–155.
67.   Kodovsky, J.; Fridrich, J.; Holub, V. Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 2011,
      7, 432–444. [CrossRef]
68.   Johnson, N.F.; Jajodia, S. Steganalysis of images created using current steganography software. In International Workshop on
      Information Hiding; Springer: Berlin/Heidelberg, Germany, 1998; pp. 273–289.
69.   Chandramouli, R.; Li, G.; Memon, N.D. Adaptive steganography. In Security and Watermarking of Multimedia Contents IV;
      International Society for Optics and Photonics: Bellingham, WA, USA, 2002; Volume 4675, pp. 69–78.
70.   Wilson, L. Zipf, George K: Human Behavior and the Principle of Least Effort; Addison Wesley: New York, NY, USA, 1949.
Symmetry 2022, 14, 117                                                                                                              26 of 26
71.   Zhang, H.; Cao, Y.; Zhao, X. A steganalytic approach to detect motion vector modification using near-perfect estimation for local
      optimality. IEEE Trans. Inf. Forensics Secur. 2016, 12, 465–478. [CrossRef]
72.   Wang, P.; Cao, Y.; Zhao, X.; Wu, B. Motion vector reversion-based steganalysis revisited. In Proceedings of the 2015 IEEE
      China Summit and International Conference on Signal and Information Processing (ChinaSIP), Chengdu, China, 12–15 July 2015;
      pp. 463–467.
73.   BOSS Web Page. Retrieved: 2020. Available online: http://agents.fel.cvut.cz/boss/index.php?mode=VIEW&tmpl=materials
      (accessed on 5 October 2021).
74.   BOWS2 Web Page. Retrieved: 2020. Available online: http://bows2.ec-lille.fr/index.php?mode=VIEW&tmpl=index1 (accessed
      on 5 October 2021).
75.   ImageNet Web Page, Retrieved: 2020. Available online: http://www.image-net.org (accessed on 5 October 2021).
76.   Center for Statistics and Applications in Forensic Evidence. Stegoappdb Homepage. Retrieved: 2020. Available online:
      https://forensicstats.org/stegoappdb/ (accessed on 5 October 2021).
77.   Coral. Corel Image Database. Retrieved: 2020. Available online: http://www.corel.com (accessed on 5 October 2021).
78.   University of Southern California. The USC-SIPI Image Database. Retrieved: 2020. Available online: http://sipi.usc.edu/
      database/ (accessed on 5 October 2021).
79.   Wang, K.Y.; Yang, Y.J.X. Audio Steganalysis Dataset. 2019. Available online: https://ieee-dataport.org/documents/audio-
      steganalysis-dataset (accessed on 5 October 2021).
80.   Lin, Z.; Huang, Y.; Wang, J. RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network. IEEE Trans. Inf.
      Forensics Secur. 2018, 13, 1854–1868. [CrossRef]
81.   Meghanathan, N.; Nayak, L. Steganalysis algorithms for detecting the hidden information in image, audio and video cover
      media. Int. J. Netw. Secur. Its Appl. (IJNSA) 2010, 2, 43–55.
82.   spyhunter. StegSpy. 2004. Available online: http://www.spy-hunter.com/stegspy (accessed on 5 October 2021).
83.   Provos, N. stegdetect. 2002. Available online: https://github.com/abeluck/stegdetect (accessed on 5 October 2021).
84.   Muñoz, A. stegsecret. 2007. Available online: http://stegsecret.sourceforge.net (accessed on 5 October 2021).
85.   WetStone Technologies.         StegoHunt. 2019.        Available online: https://www.wetstonetech.com/products/stegohunt-
      steganography-detection/ (accessed on 5 October 2021).
86.   Boehm, B. StegExpose. 2014. Available online: https://github.com/b3dk7/StegExpose (accessed on 5 October 2021).
87.   Backbone Security. StegAlyzerAS. Retrieved: 2020. Available online: https://www.backbonesecurity.com (accessed on 5 October
      2021).
88.   Backbone Security. StegAlyzerSS. Retrieved: 2020. Available online: https://www.backbonesecurity.com (accessed on 5 October
      2021).
89.   Backbone Security. StegAlyzerFS. Retrieved: 2020. Available online: https://www.backbonesecurity.com (accessed on 5 October
      2021).
90.   SourceForge. Virtual Steganographic Laboratory. Retrieved: 2020. Available online: https://sourceforge.net/projects/vsl/
      (accessed on 5 October 2021).
91.   Lerch-Hostalot, D.; Megías, D. Unsupervised steganalysis based on artificial training sets. Eng. Appl. Artif. Intell. 2016, 50, 45–59.
      [CrossRef]
92.   Kakde, Y.; Gonnade, P.; Dahiwale, P. Audio-video steganography. In Proceedings of the 2015 International Conference on
      Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, 19–20 March 2015; pp. 1–6.
93.   Lalwani, D.; Sawant, M.; Rane, M.; Jogdande, V.; Ware, S. Secure Data Hiding in Audio-Video Steganalysis by Anti-Forensic
      Technique. Int. J. Eng. Comput. Sci. 2016, 5, 15996–16000. [CrossRef]
94.   Mudusu, R.; Nagesh, A.; Sdanandam, M. Enhancing Data Security Using Audio-Video Steganography. Int. J. Eng. Technol. 2018,
      7, 276–279. [CrossRef]