Steganalysis Using Wavelet Transform

Authors

  • Waleed . A Mahmud University of Baghdad
  • Talib M Jawad University of Al-Nahrain
  • Hussam Juma'a Nayma University of Baghdad

DOI:

https://doi.org/10.31642/JoKMC/2018/010607

Keywords:

high-resolution, IFE, decompositions exhibit

Abstract

Techniques and applications for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting the presence of hidden messages has also become considerably more difficult. It is sometimes possible, nevertheless, to detect (but not necessarily decipher) the presence of embedded messages. The basic approach taken here works by finding predictable higher-order statistics of "natural" images within a multi-scale decomposition, and then showing that embedded messages alter these statistics.

The decomposition of images using basis functions that are localized in spatial position, orientation, and scale (such as wavelets) has proven extremely useful in a range of applications. One reason for this is that such decompositions exhibit statistical regularities that can be exploited.

The proposed algorithm consist of three stages: Image feature extraction (IFE) stage, training stage, and testing stage. In IFE the image decomposes to four level wavelet. Set of statistics (mean, skewness, and kurtosis for each subband) is collected from this decomposition. The

second set of statistics collected is based on the errors in an optimal linear predictor of coefficient magnitude. In this predictor, the subband coefficients are correlated to their spatial, orientation and scale neighbors.

The steganalysis technique was tested on samples of images processed with most commercial steganographic software products.

Downloads

Download data is not yet available.

References

Francesco Q.(2000), "Steganography in Image Final Communications

Report",. eric.purpletree.org/file/Steganogr aphy%20In%20Images.pdf

Silman J.(2001), "Steganography and Steganalysis: An Overview".

Niel F. Johnson, Dduric Z. and Jajodia S.(2001), "Information Hiding: steganography and Watermarking – Attack and Countermeasures", Kluwer Academic Publishers. DOI: https://doi.org/10.1007/978-1-4615-4375-6

Jacob T. Jackson, Gregg H. Gunsch, Roger L. Claypoole, Jr., Gary B., "Blind Steganography Detection Using a Computational Immune System Approach: a proposal", Lamont Department of Electrical and Computer Engineering Graduate School of Engineering andManagement Air Force Institute of Technology.

Johnson, N.F., Jajodia, S.(1998), "Steganalysis: The Investigation of Hidden Information", IEEE Information Technology Conference,September.

Fridrich J., Goljan. M., and Du R.(2001), "Reliable Detection of LSB Steganography in Grayscale and Color Images", Proc. ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, December 5, pp. 27-30. DOI: https://doi.org/10.1145/1232454.1232466

Fridrich J., Goljan. M., and Du R.(2001), "Detecting LSB Steganography in Color and Gray- Scale Images", Magazine of IEEE Multimedia, Special Issue on Security, December-November Issue, PP. 22-28. DOI: https://doi.org/10.1109/93.959097

Onkar D., Kenneth S., and Upamanyu M (2004), " Detection of Hiding in the Least Significant Bit", IEEE Transactions on Signal Processing, Vol. 52, No. 10. vision.ece.ucsb.edu/publication s/04SigprocKen.pdf DOI: https://doi.org/10.1109/TSP.2004.833869

Mohammad Ali Bani Youns and Aman Jantan (2008), " A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6.

Downloads

Published

2012-12-30

How to Cite

Mahmud, W. . A., Jawad, T. M., & Nayma, H. J. (2012). Steganalysis Using Wavelet Transform. Journal of Kufa for Mathematics and Computer, 1(6), 57–74. https://doi.org/10.31642/JoKMC/2018/010607

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.