Steganalysis Using Wavelet Transform
DOI:
https://doi.org/10.31642/JoKMC/2018/010607Keywords:
high-resolution, IFE, decompositions exhibitAbstract
Techniques and applications for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting the presence of hidden messages has also become considerably more difficult. It is sometimes possible, nevertheless, to detect (but not necessarily decipher) the presence of embedded messages. The basic approach taken here works by finding predictable higher-order statistics of "natural" images within a multi-scale decomposition, and then showing that embedded messages alter these statistics.
The decomposition of images using basis functions that are localized in spatial position, orientation, and scale (such as wavelets) has proven extremely useful in a range of applications. One reason for this is that such decompositions exhibit statistical regularities that can be exploited.
The proposed algorithm consist of three stages: Image feature extraction (IFE) stage, training stage, and testing stage. In IFE the image decomposes to four level wavelet. Set of statistics (mean, skewness, and kurtosis for each subband) is collected from this decomposition. The
second set of statistics collected is based on the errors in an optimal linear predictor of coefficient magnitude. In this predictor, the subband coefficients are correlated to their spatial, orientation and scale neighbors.
The steganalysis technique was tested on samples of images processed with most commercial steganographic software products.
Downloads
References
Francesco Q.(2000), "Steganography in Image Final Communications
Report",. eric.purpletree.org/file/Steganogr aphy%20In%20Images.pdf
Silman J.(2001), "Steganography and Steganalysis: An Overview".
Niel F. Johnson, Dduric Z. and Jajodia S.(2001), "Information Hiding: steganography and Watermarking – Attack and Countermeasures", Kluwer Academic Publishers. DOI: https://doi.org/10.1007/978-1-4615-4375-6
Jacob T. Jackson, Gregg H. Gunsch, Roger L. Claypoole, Jr., Gary B., "Blind Steganography Detection Using a Computational Immune System Approach: a proposal", Lamont Department of Electrical and Computer Engineering Graduate School of Engineering andManagement Air Force Institute of Technology.
Johnson, N.F., Jajodia, S.(1998), "Steganalysis: The Investigation of Hidden Information", IEEE Information Technology Conference,September.
Fridrich J., Goljan. M., and Du R.(2001), "Reliable Detection of LSB Steganography in Grayscale and Color Images", Proc. ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, December 5, pp. 27-30. DOI: https://doi.org/10.1145/1232454.1232466
Fridrich J., Goljan. M., and Du R.(2001), "Detecting LSB Steganography in Color and Gray- Scale Images", Magazine of IEEE Multimedia, Special Issue on Security, December-November Issue, PP. 22-28. DOI: https://doi.org/10.1109/93.959097
Onkar D., Kenneth S., and Upamanyu M (2004), " Detection of Hiding in the Least Significant Bit", IEEE Transactions on Signal Processing, Vol. 52, No. 10. vision.ece.ucsb.edu/publication s/04SigprocKen.pdf DOI: https://doi.org/10.1109/TSP.2004.833869
Mohammad Ali Bani Youns and Aman Jantan (2008), " A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 Waleed . A Mahmud, Talib M Jawad, Hussam Juma'a Nayma
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.