Buradasınız

A New Steganalysis Method for Steganographic Images on DWT Domain

Journal Name:

Publication Year:

Abstract (2. Language): 
In this paper, we introduce a new method for steganalysis of grey-scale images. First, we analyzed the effect of various steganographic processes on the statistical properties of the image. So we extracted the optimal features from the images, which have high ability in make differentiated between two groups of normal and stego images. In this method, high order statistics in discrete wavelet transform (DWT) coefficients are used. Then the pre-processing of principal component analysis (PCA) is done on extracted features. The support vector machines (SVM) is used to classify image segments into stego or non-stego cases. The proposed method with comprehensive look into current steganographic techniques in DWT domain is able to detect the presence of hidden messages with more than 90% accuracy in different embedded rates.
1-4

REFERENCES

References: 

[1] R. M. Haralick, K. Shanmugam, and I. Dinestein, “Textural Features of
Image Classification,” IEEE Transactions on Systems, vol. SMC-3, No.
6, Nov. 1973.
[2] L. Soh and C.Tsatsoulis, “Texture Analysis of SAR Sea Tce Imagery
Using Gray Level Co-occurrence Matrices,” IEEE Transactions on
Geoscience and Remote Sensing, vol. 37, No. 2, March 1999.
[3] D A. Clausi, “An Analysis of Co.occurrence Texture Statistics as a
Function of Gray Level Quantization,” Can. J. Remote Sensing, Vol. 28,
No. 1, pp. 45-62, 2002.
[4] J. Fridrich, M. Goljan and D. Soukal, “Higher-order statistical
steganalysis of palette images,” Proc. EISPIE Santa Clara, CA, Jan
2003, pp. 178-190.
[5] R. Popa, “An analysis of steganographic techniques,” Master Thesis,
Polytechnic University of Timisoara. Department of computer science
and software engineering, 1998, pp. 34-50.
[6] T.Pevny, J.Fridrich, “Multi-Class Detector of Current Steganographic
Methods for JPEG Format,” Department of Electrical and Computer
Engineering, Bingamton, 2008.
[7] T.pevny, J.Fridrich, “Merging Markov and DCT Features for Multi-Class JPEG Steganalysis,” In E.J. Delp and P.W. Wong. Editors, Proc,
SPIE, Electronic Imaging, Security, Steganography, and Watermarking
of Multimedia Content IX, vol. 6505, pp.03-04, January 2007.
[8] J. Fridrich, M. Goljan and R. Du, “Detecting LSB steganography in
color and gray-scale mages,” IEEE multimedia, vol. 8, no. 4, pp. 22-28,
2001.
[9] M. Abolghasemi, H. aghainia, K.faez, M.A.Mehrabi, “steganalysis of
LSB matching based on co-occurrence matrix and removing most
sighnificant planes,” International Conference on Intelligent Information
Hiding and Multimedia Signal Processing, 2008, pp. 1527-1530
[10] Jain A.K and Uludag U., “Hiding Biometric Data,” IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 25, NO. 11, pp.
1494-1498, November 2003.
[11] A. Sur, P. Goel and J. Mukhopadhyay, “A Spatial Domain
Steganographic Scheme For Reducing Embedding Noise,” 3
rd
international symposium on communications, control and signal
processing, ISCCSP March 12-14,2008, ST. Julians, Malta, on page(s):
1024-1028.
[12] U. Uludag, B. Gunsel, M. Ballan, “A Spatial Method For Watermarking
of fingerprint images,” Proceedings of the first international workshop
on pattern recognition in information systems, PRIS 2001, Sebutal,
Portugal, ICEIS Press, July 2001, pp. 26-33.
[13] A. Abu-EErrub, A. Al-Haj, “Optimized DWT Based Image
Watermarking,” IEEE, 2008
[14] R.safarbakhsh, S.zzaboli, A. Tabibiazar, “Digital Watermarking on Still
Images Using Wavelet Transform,” in Proc. International Conference
on Information Technology: Coding and Computing ITCC’04,IEEE,
2004.
[15] J. Fridrich and M.Goljan. “Digital image steganography using stochastic
modulation”. In E. J. Delp and P.W. Wang, editors, Proceeding SPIE,
Electronic Imaging, Security, steganography and Watermarking of
multimedia contents V, volume 5020, pages 191-202, Santa Clara, CA,
January 21-24, 2003.

Thank you for copying data from http://www.arastirmax.com