A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture
|
|
- Ethelbert Casey
- 5 years ago
- Views:
Transcription
1 Sacred Heart University From the SelectedWorks of Eman Abdelfattah August, 2011 A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture Eman Abdelfattah, Sacred Heart University Available at:
2 A MULTI-ALGORITHM, HIGH RELIABILITY, EXTENSIBLE STEGANALYZER USING SERVICES ORIENTED ARCHITECTURE Eman Abdelfattah Under the Supervision of Dr. Ausif Mahmood DISSERTATION SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIRMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOHPY IN COMPUTER SCIENCE AND ENGINEERING THE SCHOOL OF ENGINEERING UNIVERSITY OF BRIDGEPORT CONNECTICUT December, 2011
3 UMI Number: All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent on the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI Copyright 2012 by ProQuest LLC. All rights reserved. This edition of the work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI
4
5 A MULTI-ALGORITHM, HIGH RELIABILITY, EXTENSIBLE STEGANALYZER USING SERVICES ORIENTED ARCHITECTURE Copyright by Eman Abdelfattah 2011 iii
6 A MULTI-ALGORITHM, HIGH RELIABILITY, EXTENSIBLE STEGANALYZER USING SERVICES ORIENTED ARCHITECTURE ABSTRACT Network security has received increased attention in the last decades. Encryption has laid itself as the traditional method to transmit information in secrecy. Although strong encryption is a very secure approach for transmitting information, it can be easily identified that transmitted information is encrypted. Once the information is identified as encrypted, an intruder can block the encrypted transmission. In contrast, Steganography is a viable option to hide information in transmission without being identified. It provides a blanket that hides encrypted information. Thus, it becomes essential to develop mechanisms that reveal if the communicated information has any embedded data. Steganalysis is the art of detecting invisible communication and is a very challenging field due to different types of media and embedding techniques involved. Existing research in Steganalysis has focused on developing individual stego detection algorithms for a particular media type or for a particular embedding technique. In this dissertation we are proposing to develop a unified Steganalyzer that can not only work with different media types such as images and audio, but further is capable of providing iv
7 improved accuracy in stego detection through the use of multiple algorithms. Our proposed system integrates different steganalysis techniques in a reliable Steganalyzer by using a Services Oriented Architecture (SOA). The SOA architecture not only allows for concurrent processing to speed up the system, but also provides higher reliability than those reported in the existing literature because multiple stego detection algorithms are incorporated simultaneously. Furthermore, the extendable nature of the SOA implementation allows for easy addition of new Steganalysis algorithms to the system in terms of services. The universal steganalysis technique proposed in this dissertation involves two processes; feature extraction and feature classification. An improved 2D Mel-Cepstrum implementation is used for wav files feature extraction. Intra-blocks technique is used for jpeg images feature extraction. The feature classification process is implemented using three different classifiers; neural network classifier, Support Vector Machines classifier, and AdaBoost classifier. The unified steganalyzer is tested for jpeg images and wav audio files. The accuracy of classification ranges from 90.0% to 99.9% depending on the object type and the feature extraction method. In particular, an enhancement of 2D Mel-Cepstrum implementation is introduced that achieves an accuracy of 99.9%. This is significantly better result than the average detection accuracy of 89.9% to 96.7% reported by Liu [1]. Finally, an extensible classifier is introduced that allows adding detection of new embedding techniques to the currently supported embedding techniques, so that the framework will maintain its reliability even if new embedding techniques are introduced. v
8 ACKNOWLEDGEMENTS My thanks are wholly devoted to God who has helped me all the way to complete this work successfully. I owe a debt of gratitude to my family for their understanding and encouragement. I am honored that my work was supervised by Dr. Ausif Mahmood. Dr. Mahmood has provided unparalleled advice throughout the course of this dissertation. His countless hours of work have helped me to shape this dissertation in its final format. His support and encouragement was a major element to finish this dissertation. Also, I would like to thank the committee members for their valuable comments and ideas that helped me to improve the quality of work in this dissertation. Last but not least, I would like to acknowledge the support of the department of Computer Science and Engineering and its faculty for providing all the necessary help and support. vi
9 TABLE OF CONTENTS ABSTRACT... iv ACKNOWLEDGEMENTS... vi TABLE OF CONTENTS... vii LIST OF TABLES... ix LIST OF FIGURES... x CHAPTER 1: INTRODUCTION... 1 CHAPTER 2: LITERATURE SURVEY... 5 CHAPTER 3: A NEW FRAMEWORK FOR STEGANALYSIS Initial Framework Components Extension service Complexity service Mel-Cepstrum service Markov Service Intra-Blocks Service CHAPTER 4: IMPROVED MEL-CEPSTRUM BASED-STEGANALYSIS Test Methodology Support Vector Machines AdaBoost Neural Networks Testing Environment vii
10 CHAPTER 5: RESULTS AND ANALYSIS Intra-Blocks Technique Markov Technique Improved 2D Mel-Cepstrum Implementation Experimentation with Initial data set Experimentation with large data set Extensible classifier to add new embedding techniques Enhancements to the initial framework for SOA based Steganalyzer CHAPTER 6: CONCLUSIONS Future work REFERENCES APPENDIX A: SAMPLES OF CONFUSION MATRICES APPENDIX B: SAMPLES OF IMPLEMENTATION CODE B.1 Matlab Code B.2 Implementation Details of Services Oriented Architecture viii
11 LIST OF TABLES Table 5.1 Testing Accuracy for Markov Technique 39 Table 5.2 Table 5.3 Testing Accuracy for Improved 2D Mel-Cepstrum implementation using Initial Data Set Testing Accuracy for Improved 2D Mel-Cepstrum implementation using Large Data Set ix
12 LIST OF FIGURES Figure 2.1 A general model for steganography 5 Figure 2.2 The effect of F5 embedding on the histogram of the DCT coefficient (2,1) 14 Figure 2.3 LSB Analysis option in StegAlyzerSS tool 15 Figure 3.1 SOA Layers 17 Figure 3.2 Figure 3.3 An Overview of the Initial Services Oriented Architecture Steganalyzer Magnitude distribution versus sample number for two distinct signals with different approximate complexities Figure 4.1 Four hidden layers network for the classification of 169 features 32 Figure 4.2 Overview of training and testing processes 34 Figure 4.3 Overview of a dynamic link library (dll) generation 34 Figure 5.1 Markov transition probability of the second order derivative (Cover 38 Figure 5.2 wave) Markov transition probability of the second order derivative (Stego wave by Steghide) Figure 5.3 The difference between Markov transition probability between the cover and the stego 39 Figure 5.4 The overall structure of the extensible classifier 48 Figure 5.5 A modified architecture with the extensible classifier 51 x
13 CHAPTER 1: INTRODUCTION 1.1 Research Problem and Scope Steganography is the art of invisible communication. [2] while Steganalysis is the art of discovering hidden data in cover objects. [2] The cover object is an object of any type that contains no hidden information. However, the stego object is obtained by modifying the cover object using an embedding algorithm. Both an embedding algorithm and an extraction algorithm are to be conducted in each steganographic system. There are three kinds of steganography; pure steganography, private key steganography and public key steganography. The technique for embedding the message in pure steganography is unknown to warden and shared as a secret between sender and receiver. Thus, this technique relies on the secrecy of the algorithm itself which is not a good practice because once the algorithm is known to warden, this king of steganography is no more secure. In private key steganography both the sender and the receiver share a secret key which is used to embed the message. The warden has no knowledge about the secret key. However, the warden is aware of the algorithm that they could be employing for embedding messages. This kind of steganography depends on the secrecy of the key. The key is chosen to be hard to break. Thus, private key steganography is more secure compared to pure steganography. In public key steganography, both the sender and the receiver have private-public key pairs and know each other s public key. The sender 1
14 encrypts the message using the receiver s public key. Thus, only the intended receiver can decrypt the message using his/her private key. The field of steganalysis has received increased attention in the recent years. The main focus in steganalysis is only to detect the presence of a hidden message in a stego object. A stego object is obtained by modifying the cover object using an embedding technique. The object might be an image, text, audio or video. However, most of the reported techniques in literature deal with images. The steganalysis techniques are classified under two categories; specific and universal steganalysis. The specific steganalysis techniques are designed for a targeted embedding technique. Thus, they yield very accurate decisions when they are used against a particular steganographic technique. In universal techniques, dependency on the behavior of the individual embedding techniques is removed by determining and collecting a set of distinguishing statistics that are sensitive to a wide variety of embedding operations. As an example, universal steganalyzers dealing with images are composed of two important components; feature extraction and feature classification. In feature extraction, a set of distinguishing statistics are obtained from a data set of images by observing general image features that exhibit a strong variation under embedding. However, feature classification uses distinguishing statistics from both cover and stego images to train a classifier. Then, the trained classifier is used to classify an input image as either cover or stego. The purpose of steganalysis is to identify if a carrier (image, text, audio or video) has been manipulated by embedding a secret message using different embedding 2
15 techniques. These two factors; different carrier types and different embedding techniques, introduce a great complexity in designing a reliable steganalyzer. 1.2 Motivation behind the Research Most of the reported steganalysis techniques in literature handle specific embedding techniques. Other techniques that deal with several embedding techniques are designed to handle a specific data type. Our research focuses on developing a reliable, extensible and unified steganalyzer that can handle multiple data types. In this dissertation, we introduce a framework for a reliable steganalyzer using a Services Oriented Architecture that integrates multiple algorithms and can handle different data types. 1.3 Contributions of the Research In this dissertation we introduce a steganalyzer using a Services Oriented Architecture (SOA). In our SOA design the system is broken down into independent services. SOA provides several advantages such as high flexibility, simplicity, outsourcing, maintainability and reusability. Furthermore, it provides platform independency and distributing the overall load of the process [3]. Communication among services is achieved through common standards. Extensible Marked up Language (XML) is used to communicate all the requests/responses. The proposed architecture includes different services as follows: (1) An extension service that can identify different types of carriers such as: a. Images b. Audios 3
16 (2) Services that handle different steganalysis techniques. The advantages of such an architecture are: a. A reliable implementation of the steganalysis complex problem. b. Extensibility of the system where more services for new steganalysis techniques can be added later. c. Flexibility where a better service can replace an existing service when an improved steganalysis technique is developed for this specific service. 4
17 CHAPTER 2: LITERATURE SURVEY Steganalysis is the art of discovering hidden data in cover objects [2]. The main focus in steganalysis is only to detect the presence of a hidden message. In contrast, steganography is the art of invisible communication. Figure 2.1 shows a general model for steganography [4]. Figure 2.1. A general model for steganography [4] Each steganographic system has embedding and extraction algorithms. We consider steganography to be secure, if the set of stego-objects should have the same statistical properties as the set of cover-objects. Thus, we can t distinguish between cover-objects and stego-objects although we might have unlimited computing power. Meghanathan et. al. review some of the existing steganalysis algorithms [5]. The three commonly used domains of steganography are image, audio and video. Image steganography algorithms, audio steganography algorithms and Video steganography algorithms are analyzed for better understanding and developing steganalysis algorithms. 5
18 Different steganalysis algorithms have been developed because of the diversity in the cover media. In this chapter we divide the steganography and steganalysis techniques into three main categories depending upon the carrier being used. These include techniques based on images, based on multimedia (e.g., audio), and using other carriers such as HTML files or torrent files. We present the existing state of research in these categories in the following sections. 2.1 Image Steganography and Steganalysis With the wide availability of digital images, and the high degree of redundancy present in them despite compression, there has been an increased interest in using digital images as cover-objects for the purpose of steganography [6]. Martín et. al. investigated the effect of embedding a secret message into a natural image on the statistics of the image to examine the possibility of the detection of the presence of this secret message [7]. The three different stego algorithms that are used in the experiments are: Jsteg [8], MHPDM [9], and one of the algorithms in S-Tools [10]. The following five different statistical models of natural images are used: Areas of Connected Components Model [11, 12] Adjacent Pixel Values Model [13, 14, 15] Laplacian Distribution Model [16], Wavelet Coefficients Model and DCT Coefficients Model. Martín et. al concluded that the effect of the embedding operations is insignificant to the natural images when the analysis is independent of the steganograhy algorithms. However, if a prior knowledge of the embedding algorithm is known, a better classification can be obtained. 6
19 Avcibas et. al. used binary Similarity Measures (BSMs) to calculate three types of features; computed similarity differences, histogram and entropy related features, and a set of measures based on a neighborhood-weighting mask by looking at the seventh and the eighth bit planes of an image [17, 18]. The images are decompressed before being fed into the steganalyzer because this technique operates on spatial domain. The authors conclude that their technique demonstrates comparable results to the results obtained by Farid s scheme which uses a wavelet based decomposition to build higher-order statistical models [19]. Lyu et. al. use Wavelet-Based Steganalysis (WBS) to build a model for natural images by using higher order statistics and then show that images with messages embedded in them deviate from this model [20, 21]. Quadratic mirror filters (QMFs) are used to decompose the image into the wavelet domain, after which statistics such as mean, variance, skewness, and kurtosis are calculated for each sub-band. Additionally, the same statistics are calculated for the error obtained from a linear predictor of the coefficient magnitudes of each sub-band, as the second part of the feature set. The images are decompressed before being fed into the steganalyzer because this technique operates on spatial domain. Lyu et. al. conclude that their approach scores reasonable accuracy results. However, if a small message is embedded, this leads to poor performance detection. Kharrazi et. al. study the performance of three distinct blind steganalysis techniques against four different steganographic embedding techniques: Outguess [22], F5 [23], Model-Based [24] and perturbed quantization PQ [25]. The used cover media is jpeg images. The collected data set is categorized with respect to size, quality, and texture 7
20 to find out their impact on steganalysis performance. Blind steganalysis is composed of two components: feature extraction and feature classification. The three techniques used for feature extraction are binary similarity measures (BSMs), wavelet-based steganalysis (WBS) and feature-based steganalysis (FBS). A linear support vector machine (SVM) is employed to avoid high computational power if nonlinear kernel SVM is employed. Kharrazi et. al. conclude that FBS achieves superior performance because the used data set is compressed jpeg images. Moreover, PQ steganography embedding technique is the best one because it is the least detectable technique. As the quality factor of images increases, the distinguishability between the cover and stego images decreases. Recompression of jpeg images makes the distinguishability between the cover and stego images harder where the recompressed cover images are obtained by recompressing the original images using their estimated quality factor [26]. Ella conducted a survey of the methodology of information hiding and describes some techniques used in steganography and steganalysis [27]. An experiment is conducted on a set of images from Wikipedia by downloading them using the program Wikix. The program StegAlyzerSS [28] is used to scan the images. The results show that some images were found to have appended information. But, this result is not enough evidence for the existence of stego images because this appended information can be a result of manipulating images by some programs or information left from cameras. However, the author concludes that there were no confirmed instances of steganography found in the scans which makes blind steganalysis difficult problem. Goljan et. al. present a method that calculates the features in the wavelet domain as higher-order absolute moments of the noise residual [29]. The advantage of calculating 8
21 the features from the noise residual is that it increases the features sensitivity to embedding. Therefore, this method outperforms a previously proposed method by Holotyak et. al. [30]. A classifier using Fisher Linear Discriminant (FLD) is constructed and which is called WAM classifier. Also, WAM classifier is used to examine the security of three steganographic schemes: pseudo-random ±1 embedding using ternary matrix embedding, adaptive ternary ±1 embedding, and perturbed quantization. The authors conclude that perturbed quantization steganography technique is the most secure because it is the least detectable approach. Moreover, the adaptive ternary ±1 embedding scheme is more secure compared to pseudo-random ±1 embedding scheme. Fridrich discusses Feature-Based Steganalysis (FBS) where jpeg images are decompressed, and then crops its spatial representation by four lines of pixels in both horizontal and vertical directions to estimate statistics of the original image, before embedding [2]. Then, the jpeg image is recompressed with the original quantization table. The difference between statistics obtained from the given jpeg image and its original estimated version are obtained through a set of functions that operate on both spatial and DCT domains. According to Fridrich techniques (such as FBS) that rely on DCT based statistical features are expected to perform better than BSM and WBS. 2.2 Audio Steganography and Steganalysis Tian et. al. propose an m-sequence based Steganography technique for Voice over IP [31]. The technique succeeds to achieve good security, sufficient capacity and low latency by using least-significant-bits (LSB) substitution method. Moreover, m-sequence encryption approach is used to eliminate the correlation among secret messages so that the statistical steganalysis algorithm can hardly detect stego-speech. Also, a 9
22 synchronization mechanism is suggested to guarantee the accurate restoration of secret messages at the receiver side. A technique for the transmission of synchronization patterns (SPs) is proposed that allows online distribution of some important parameters by distributing the SPs among some fields in the IP header that are available for steganography. Thus, it is possible to construct the covert communication in real time. Tian et. al. introduce an adaptive Steganography scheme for Voice over IP (VoIP) [32]. An evaluation for the proposed method is conducted. The evaluation is based on designing five different steganography modes. Two modes are based on the traditional LSBs substitution method and the other three modes are based on the suggested adaptive Steganography scheme. They conclude that the adaptive Steganography approach outperforms the traditional LSBs substitution method since it enhances the embedding transparency by taking into account the similarity between Least Significant Bits (LSBs) and the embedded messages. Liu et. al. present two methods. In the first method, the statistics of the highfrequency spectrum and the Mel-Cepstrum coefficients of the second-order derivative are extracted for audio steganalysis. In the second method, a wavelet-based spectrum and Mel-Cepstrum coefficients are extracted for audio steganalysis [33]. A support vector machine is applied to the extracted features in both cases. A comparison among these two methods and the signal-based Mel-Cepstrum audio steganalysis method is conducted. Liu et. al. conclude that the proposed methods outperform the signal-based Mel-Cepstrum approach. Moreover, the derivative-bases approach outperforms the wavelet-based approach. 10
23 Liu et. al. suggest a stream data mining approach for audio steganalysis based on second order derivative of audio streams by extracting Mel-Cepstrum coefficients and Markov transition features on the second order derivative [34]. Signal complexity has been taken into consideration as an important parameter for evaluating the performance of audio steganalysis. A support vector machine is applied to the extracted features. Both techniques that apply second order derivative improve the detection performance compared to signal based Mel-Cepstrum audio steganalysis. Moreover, Markov approach based on second order derivative outperforms Mel-Cepstrum approach based on second order derivative in high signal complexity as reported by the authors. Qiao et. al. present an approach of detecting the hidden information in MP3 audio streams [35]. The moment statistical features of Generalized Gaussian Distribution (GGD) shape parameters of the Modified Discrete Cosine Transform (MDCT) sub-band coefficients, as well as the moment statistical features, neighboring joint densities, and Markov transition features of the second order derivatives are merged. Support Vector Machines (SVMs) are applied to the extracted features for detection. A detection accuracy of 94.1% is achieved when the modification density is 16%. Moreover, the percentage detection accuracy is increased to 95.6% when the modification density is increased to 20%. 2.3 Other Steganography and Steganalysis used Media In addition to the previously discussed carriers such as images and audios, some other digital entities can be used as cover media. For example, HTML files (hypertext markup language) have appropriate potentials for information hiding. While processing HTML files, the browser ignores spaces, tabs, certain characters and extra line breaks 11
24 which could be used as locations for hiding information. Another example, unused or reserved space on a disk is a second type of media that can be used to hide information. Also, data can be hidden in unused space in file headers. Last but not least, network protocols such as TCP, UDP, and/or IP can be used for hiding the messages and transmit them through the network [36]. Li et. al. suggest using torrent files, a crucial part of the BitTorrent P2P network, as host carriers for secret messages [37]. The authors used both Letter Case Change (LCC) and Field Reusage (FR) techniques to produce the stego-torrent files. Letter Case Change (LCC) was suggested based on the knowledge that some fields such as announce and announce-list fields in torrent files are case insensitive. This technique has the advantage of maintaining the size of the stego-torrent file as the original torrent file which provides a high level of transparency and security. Field Reusage method is suggested because of the redundancy of some other fields such as comment and publisher. The advantage of this method is the ability to embed data with huge capacity without rising suspicion. Moreover, FR method guarantees security by encrypting the stego-message with Data Encryption Standard (DES) technique. The detector will have no suspicion because a large portion of the torrent file already contains Secure Hash Algorithm 1 (SHA1) hashed pieces. Both an embedding algorithm and an extraction algorithm are presented to embed and extract secret messages. 2.4 Existing Tools There are many steganography tools reported in literature. In this sub-section we present some steganography tools such as Outguess, F5, Data Stash, S-tools and wbstego4. Moreover, there are few tools reported in literature that are used by 12
25 steganalysists. These tools are limited in their capabilities and target one or few specific cover objects. In this sub-section we present some steganalysis tools such as Stegdetect and StegAlyzerSS. (1) Outguess [22]: it identifies the redundant DCT coefficients that have minimal effect on the cover image, and based on this information it chooses bits in which it would embed the message. Outguess program recompresses the image with a quality factor defined by the user, and then it uses the obtained DCT coefficient to embed the message. The estimated quality factor of the image is communicated to the Outguess program in order to minimize recompression artifacts. When embedding messages in a clean image, noise is introduced in the DCT coefficient, therefore increasing the spatial discontinuities along the 8x8 jpeg blocks. Given a stego image, if a message is embedded in the image again there is partial cancellation of changes made to the LSB of DCT coefficients, thus the increase in discontinuities will be smaller. This increase or lack of increase in the discontinuities is used to estimate the message size which is being carried by a stego image. (2) F5 [23]: It embeds messages by modifying the DCT coefficients. The main operation done by F5 is matrix embedding with the goal of minimizing the amount of changes made to the DCT coefficients. The method takes n DCT coefficients and hashes them to k bits, where k and n are computed based on the original images as well as the secret message length. If the hash value equals to the message bits, then the next n coefficients are chosen, and so on. Otherwise, one of the n coefficients is modified and the hash is recalculated. The modifications are constrained by the fact that the resulting n DCT coefficients should not have a hamming distance of more than dmax from the 13
Benchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi a, Husrev T. Sencar b Nasir Memon b a Department of Electrical and Computer Engineering b Department of Computer and Information Science
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More informationBenchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon I. INTRODUCTION There have been a range of image based steganographic embedding techniques proposed
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationEMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,
More informationOn the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationAlpha-trimmed Image Estimation for JPEG Steganography Detection
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,
More informationSteganalysis Techniques: A Comparative Study
University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-18-2007 Steganalysis Techniques: A Comparative Study Swaroop Kumar Pedda Reddy University
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationPerformance study of common image steganography and steganalysis techniques
Journal of Electronic Imaging 15(4), 041104 (Oct Dec 2006) Performance study of common image steganography and steganalysis techniques Mehdi Kharrazi Polytechnic University Department of Electrical and
More informationImproving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique
Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique Sarita R. Visavalia 1, Dr. Amit Ganatra 2 1 Department of Information Technology, CHARUSAT, India 2 Dpartmentof Computer
More informationModern Steganalysis Can Detect YASS
Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationSteganography and Steganalysis of JPEG Images
DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES AND ENGINEERING PH.D. PROPOSAL Steganography and Steganalysis of JPEG Images Supervisory Committee: Author: Mahendra Kumar makumar@cise.ufl.edu Dr. Richard
More informationDETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION
Chapter 13 DETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION Benjamin Rodriguez and Gilbert Peterson Abstract When a digital forensics investigator suspects that steganography has been used to hide
More informationAudio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review
Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationA Steganography method for JPEG2000 Baseline System
A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract
More informationSECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,
More informationMerging Markov and DCT Features for Multi-Class JPEG Steganalysis
Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Tomáš Pevný a, Jessica Fridrich b a Department of Computer Science, Binghamton University, State University of New York b Department of
More informationOptimizing Pixel Predictors for Steganalysis
Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA Steganography
More informationSTEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION
Chapter 1 STEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION Benjamin M. Rodriguez and Gilbert L. Peterson Abstract Several steganography tools are freely available over the Internet, ranging from
More informationMetamorphosis of High Capacity Steganography Schemes
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami
More informationImage Stego Detection using Higher Order Statistics
Nahrain University, College of Engineering Journal (NUCEJ) Vol.13 No., 010 pp.141-149 Image Stego Detection using Higher Order Statistics Assistant Lecturer Ammar Moufak J. Yousif Department of Electrical
More informationA Survey on Digital Image Steganography and Steganalysis
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 8, Issue 1 (Sep. - Oct. 2013), PP 56-60 A Survey on Digital Image Steganography and Steganalysis
More informationDietrich Paulus Joachim Hornegger. Pattern Recognition of Images and Speech in C++
Dietrich Paulus Joachim Hornegger Pattern Recognition of Images and Speech in C++ To Dorothea, Belinda, and Dominik In the text we use the following names which are protected, trademarks owned by a company
More informationDouble-Compressed JPEG Detection in a Steganalysis System
Annual ADFSL Conference on Digital Forensics, Security and Law 2012 May 30th, 10:30 AM Double-Compressed JPEG Detection in a Steganalysis System Jennifer L. Davidson Department of Mathematics, Iowa State
More information2. LITERATURE REVIEW
2. LITERATURE REVIEW CBIR has come long way before 1990 and very little papers have been published at that time, however the number of papers published since 1997 is increasing. There are many CBIR algorithms
More informationMultiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging
Multiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging Sos S. Agaian* a, Gilbert L. Peterson b and Benjamin M. Rodriguez b a Multimedia and Mobile Signal Processing Laboratory The
More informationA Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationFundamentals of Digital Image Processing
\L\.6 Gw.i Fundamentals of Digital Image Processing A Practical Approach with Examples in Matlab Chris Solomon School of Physical Sciences, University of Kent, Canterbury, UK Toby Breckon School of Engineering,
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationReview and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.
Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationImplementation of Random Byte Hiding algorithm in Video Steganography
Implementation of Random Byte Hiding algorithm in Video Steganography S.Aswath 1, K.Akshara 2, P.Pavithra 2, D.S.Abinaya 2 Asssisant Professor 1, Student 2 (IV Year) Department of Electronics and Communication
More informationAN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS
AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS Chinchu Elza Andrews 1, Iwin Thanakumar Joseph 2 1. Post Graduate Student, Department of Computer Science and Engineering, Karunya University, India 2.
More informationMulti-Class Detector of Current Steganographic Methods for JPEG Format
1 Multi-Class Detector of Current Steganographic Methods for JPEG Format Tomáš Pevný and Jessica Fridrich, IEEE member Abstract The aim of this paper is to construct a practical forensic steganalysis tool
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationDETECTION OF MANIPULATED IMAGES
DETECTION OF MANIPULATED IMAGES A Thesis by Santoshi Senapathi Bachelor of Technology, JUNTU, India, 2006 Submitted to the Department of Electrical Engineering and the faculty of the Graduate School of
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationFurther Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis
Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationCHAPTER 3. Digital Carriers of Steganography
CHAPTER 3 Digital Carriers of Steganography 3.1 Introduction It has been observed that all digital file formats can be used as digital carrier for steganography, but the formats those are with a high degree
More informationCompression-Compatible Fragile and Semi-Fragile Tamper Detection
Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko Motivation Direct Applications Establishing credibility
More informationThe Steganography In Inactive Frames Of Voip
The Steganography In Inactive Frames Of Voip This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationA General Framework for the Structural Steganalysis of LSB Replacement
A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding
More informationFast Real-Time Hardware Engine for Multipoint Text Steganography
Fast Real-Time Hardware Engine for Multipoint Text Steganography Ammar Odeh, Khaled Elleithy, and Miad Faezipour Dept. of Computer Science and Engineering University Of Bridgeport Bridgeport, CT 06604,
More informationSteganalysis versus Splicing Detection
Steganalysis versus Splicing Detection Yun Q. Shi 1, Chunhua Chen 1, Guorong Xuan 2, and Wei Su 1 1 New Jersey Institute of Technology, University Heights, Newark, NJ, USA 07102 2 Tongji University, Shanghai,
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationNathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers
Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Introduction to steganography org.steganography library principles Hide & Reveal screenshots 14/05/2010 Steganography made
More informationDetection of double-compression for applications in steganography
1 Detection of double-compression for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a maximum likelihood
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationAUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES
AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017 AUTOMATED STUDENT S
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images
ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images Chaur-Chin Chen and Wei-Ju Lai Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan e-mail: cchen@cs.nthu.edu.tw
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationSecret Communication through Audio for Defense Application
Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in
More informationFeature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images
Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images Abstract In this paper, we present a scheme based on feature mining and neuro-fuzzy inference
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationSteganography. Brent McClain Rob Carey
Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationDetecting Hidden Information in Images: A Comparative Study
Detecting Hidden Information in Images: A Comparative Study Yanming Di, Huan Liu, Avinash Ramineni, and Arunabha Sen Department of Computer Science and Engineering Arizona State University, Tempe, AZ 8587
More informationOutline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami
to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline
More informationA new robust watermarking scheme based on PDE decomposition *
A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid
More informationA Novel Information Security Scheme using Cryptic Steganography
A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in
More informationReceiver Operating Characteristic (ROC) Graph to Determine the Most Suitable Pairs Analysis Threshold Value
Advances in Electrical and Electronics Engineering - IAENG Special Edition of the World Congress on Engineering and Computer Science 2008 Receiver Operating Characteristic (ROC) Graph to Determine the
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationA Review of Approaches for Steganography
International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2
More informationEfficient Image Steganography Using Integer Wavelet Transform
Efficient Image Steganography Using Integer Wavelet Transform DHIVYA DHARSHINI. K 1, Dr. K. ANUSDHA 2 1 M.Tech, Department of Electronics Engineering, Pondicherry University, Puducherry, India. 2 Assistant
More informationA DWT Based Steganography Approach
A DWT Based Steganography Approach EE604 Term Paper Instructor: Prof. Sumana Gupta Group No. 1 Group Members Anirudh Kumar Agrawal, 11907098 Pratik Likhar, 11531 Radhika Ravi, 11553 Introduction Image
More informationImage Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi
Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi 1. Introduction The choice of a particular transform in a given application depends on the amount of
More informationCHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT
CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT 2.1 BRIEF OUTLINE The classification of digital imagery is to extract useful thematic information which is one
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationA Robust Watermarking Algorithm For JPEG Images
nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation
More informationSteganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines
Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines Siwei Lyu and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA ABSTRACT Steganographic
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationKeywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information
More informationAppendix A. Definition of Terms
Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted
More informationCANVASS - A Steganalysis Forensic Tool for JPEG Images
Annual ADFSL Conference on Digital Forensics, Security and Law 2010 May 20th, 1:00 PM CANVASS - A Steganalysis Forensic Tool for JPEG Images Jennifer L. Davidson Department of Mathematics, Iowa State University,
More informationLETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration
IEICE TRANS. INF. & SYST., VOL.E96 D, NO.5 MAY 2013 1233 LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration Kazumi YAMAWAKI, Member, Fumiya NAKANO, Student
More informationAPPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING
APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING 1 NADIA IDRISSI, 2 AHMED ROUKHE 1,2 Faculty of Sciences Moulay Ismail Univerity Meknes, LAMPE Laboratory, Department
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationSmart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program
Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5
More informationCopyright Warning & Restrictions
Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions
More informationIvans Lubenko & Andrew Ker
Ivans Lubenko & Andrew Ker lubenko@ comlab.ox.ac.uk adk@comlab.ox.ac.uk Oxford University Computing Laboratory SPIE/IS&T Electronic Imaging, San Francisco 25 January 2011 Classification in steganalysis
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More informationCalibration Revisited
Jan Kodovský, Jessica Fridrich September 7, 2009 / ACM MM&Sec 09 1 / 16 What is Calibration? 2002 - Calibration introduced (attack on F5) Part of feature extraction procedure for blind steganalysis Idea:
More informationA secure steganographic algorithm based on Cellular Automata using Fibonacci representation
A secure steganographic algorithm based on Cellular Automata using Fibonacci representation Tuan Duc Nguyen Department of Computer Science Faculty of Science, Khon Kaen University Khon Kaen, Thailand nguyenductuan1982@gmail.com
More informationREAL-TIME DIGITAL SIGNAL PROCESSING
REAL-TIME DIGITAL SIGNAL PROCESSING FUNDAMENTALS, IMPLEMENTATIONS AND APPLICATIONS Third Edition Sen M. Kuo Northern Illinois University, USA Bob H. Lee Ittiam Systems, Inc., USA Wenshun Tian Sonus Networks,
More informationarxiv: v1 [cs.mm] 2 Mar 2017
This is a preprint of the paper: arxiv:1703.00817v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, LSB matching steganalysis based on patterns of pixel differences and random embedding, Computers
More informationWebpage: Volume 4, Issue V, May 2016 ISSN
EMBEDDING & EXTRACTION OF POWER DATA INTO A AUDIO FILE USING MODIFIED DIRECT SEQUENCE SPREAD SPECTRUM TECHNIQUE Vijeta Pandey 1, Vikas Verma 2, Gourav Sharma 3 1,M.Tech Student, Electrical Engineering
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More information