Steganalysis Using Wavelet Transform


  • Waleed . A Mahmud University of Baghdad
  • Talib M Jawad University of Al-Nahrain
  • Hussam Juma'a Nayma University of Baghdad



high-resolution, IFE, decompositions exhibit


Techniques and applications for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting the presence of hidden messages has also become considerably more difficult. It is sometimes possible, nevertheless, to detect (but not necessarily decipher) the presence of embedded messages. The basic approach taken here works by finding predictable higher-order statistics of "natural" images within a multi-scale decomposition, and then showing that embedded messages alter these statistics.

The decomposition of images using basis functions that are localized in spatial position, orientation, and scale (such as wavelets) has proven extremely useful in a range of applications. One reason for this is that such decompositions exhibit statistical regularities that can be exploited.

The proposed algorithm consist of three stages: Image feature extraction (IFE) stage, training stage, and testing stage. In IFE the image decomposes to four level wavelet. Set of statistics (mean, skewness, and kurtosis for each subband) is collected from this decomposition. The

second set of statistics collected is based on the errors in an optimal linear predictor of coefficient magnitude. In this predictor, the subband coefficients are correlated to their spatial, orientation and scale neighbors.

The steganalysis technique was tested on samples of images processed with most commercial steganographic software products.


Download data is not yet available.


Francesco Q.(2000), "Steganography in Image Final Communications

Report",. aphy%20In%20Images.pdf

Silman J.(2001), "Steganography and Steganalysis: An Overview".

Niel F. Johnson, Dduric Z. and Jajodia S.(2001), "Information Hiding: steganography and Watermarking – Attack and Countermeasures", Kluwer Academic Publishers. DOI:

Jacob T. Jackson, Gregg H. Gunsch, Roger L. Claypoole, Jr., Gary B., "Blind Steganography Detection Using a Computational Immune System Approach: a proposal", Lamont Department of Electrical and Computer Engineering Graduate School of Engineering andManagement Air Force Institute of Technology.

Johnson, N.F., Jajodia, S.(1998), "Steganalysis: The Investigation of Hidden Information", IEEE Information Technology Conference,September.

Fridrich J., Goljan. M., and Du R.(2001), "Reliable Detection of LSB Steganography in Grayscale and Color Images", Proc. ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, December 5, pp. 27-30. DOI:

Fridrich J., Goljan. M., and Du R.(2001), "Detecting LSB Steganography in Color and Gray- Scale Images", Magazine of IEEE Multimedia, Special Issue on Security, December-November Issue, PP. 22-28. DOI:

Onkar D., Kenneth S., and Upamanyu M (2004), " Detection of Hiding in the Least Significant Bit", IEEE Transactions on Signal Processing, Vol. 52, No. 10. s/04SigprocKen.pdf DOI:

Mohammad Ali Bani Youns and Aman Jantan (2008), " A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6.




How to Cite

Mahmud, W. . A., Jawad, T. M., & Nayma, H. J. (2012). Steganalysis Using Wavelet Transform. Journal of Kufa for Mathematics and Computer, 1(6), 57–74.