Detecting Hidden Information in Images: A Comparative Study
|
|
- Mariah Weaver
- 5 years ago
- Views:
Transcription
1 Detecting Hidden Information in Images: A Comparative Study Yanming Di, Huan Liu, Avinash Ramineni, and Arunabha Sen Department of Computer Science and Engineering Arizona State University, Tempe, AZ 8587 yanming.di, huan.liu, avinash.ramineni, Abstract During the process of information hiding in a cover image, LSB-based steganographic techniques like JSteg change the statistical properties of the cover image. Accordingly, such information hiding techniques are vulnerable to statistical attack. The understanding of steganalysis methods and their effects can help in designing methods and algorithms preserving data privacy. In this paper, we compare some steganalysis methods for attacking LSB-based steganographic techniques (logistic regression, the tree-based method C4.5, and a popular method Stegdetect). Experimental results show that the first two methods, especially the logistic regression method, are able to detect hidden information with high accuracy. We also study the relationship between the number of attributes (the frequencies of quantized DCT coefficients) and the performance of a classifier.. Introduction The last few years have seen a significant rise in interest among the computer security researchers in the science of steganography. Steganography [8, 9] is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the secret data. The term steganography in Greek means covered writing whereas cryptography means secret writing. Steganography is different from cryptography in that while the goal of a cryptographic system is to conceal the content of the messages, the goal of information hiding or steganography is to conceal their existence. Steganography in essence camouflages a message to hide its existence and make it seem invisible thus concealing the fact that a message is being carried altogether. Steganography provides a plausible deniability to the secret communication which cryptography Yanming Di can also be reached at yanming di@brown.edu. does not provide. Covert information is not necessarily secure and secure information is not necessarily covert. The goal of cryptography is the secure transfer of the secret message where as the goal of steganography is to make sure the transfer of a secret message is undetectable. The understanding of steganalysis methods and their effects can help in designing methods and algorithms preserving data privacy. With the increase of the digital content (and distribution of multimedia data) on the Internet, steganography has become a topic of growing interest. A number of programs for embedding hidden messages in images and audio files are available [8]. Most of these steganographic methods modify the redundant bits in the cover medium (carrier) to hide the secret messages. Redundant bits are those bits that can be modified without degrading the quality of the cover medium. Replacing these redundant bits with message bits creates stego medium. The modification of the redundant bits can change the statistical properties of the cover medium. As a result statistical analysis may reveal the presence of hidden content. Detecting the steganographic content is called steganalysis [7]. It is defined as the art and science of breaking the security of steganographic systems. As the goal of steganography is to conceal the existence of a secret message, a successful attack on a steganographic system consists of detecting that a certain file contains hidden information in it. Detection of steganographic modifications in an image can be made possible by testing its statistical properties. If the statistical properties deviate from a given norm it can be identified as a stego image. In this paper we present two new methods for steganalysis. We try to attack the steganographic tool JSteg and attempt to break it with higher accuracy. There have been many attempts at breaking JSteg but the accuracy is not really high. In this paper we present two novel methods of breaking JSteg which can further be extended to other tools like JPhide and Outguess [8]. The rest of the paper is organized as follows. Section introduces JSteg steganographic method, the idea of the sta-
2 & $ V > L tistical attack, and some related work. Section presents two new methods for attacking LSB-based steganographic methods. We also discuss how the knowledge of the distribution of the DCT coefficients can help in building our models. Section 4 reports results of our experiments of comparing the two new methods with the popular program Stegdetect [6]. Section 5 shows that careful model selection is needed to achieve high accuracy when using data mining and statistical methods for steganalysis. Section 6 concludes the paper.. Histogram Analysis The JPEG image format [5] uses a discrete cosine transform (DCT) to transform each block of source image pixels into DCT coefficients. The DCT coefficients of an block of image pixels are given by where and! #"%$ & ')(+*,-(!* #?A@ B C D 4 NMPOQF 8:9 /. 0- EGFH for JIKFL for RL)LRL/TSU=L ;4<7 8=9 > The coefficients are then quantized using a -element quantization table V by the following operations: XWY [Z ]\+^J" The least-significant bits (LSB) of those quantized DCT coefficients can be used to embed hidden messages. JSteg hides data in JPEG image files by changing the LSB bits of the quantized DCT coefficients. It replaces the LSB bits of the quantized DCT coefficients with secret message bits. Other similar steganography methods include JPHide and OutGuess 0.. Steganographic techniques like JSteg that modify the LSB bits can be detected by analyzing the frequencies of the quantized DCT coefficient values. Modifying the least significant bits transforms one value into another that differs only by. These pairs of values are called PoVs in [9]. They introduced a powerful statistical attack that can be applied to any steganographic technique in which a fixed set of PoVs are flipped into each other during the process of embedding message bits. The insight of their statistical attack is based on the observation that if the message bits are equally distributed, modifying the least significant bits will reduce the difference in frequency of the PoVs, which would otherwise be unequal with very high probability. This equalization can be detected by appropriate statistical tests. Based on this idea, Provos and Honeyman [6] carried out an extensive analysis of JPEG images using the steganalytic software Stegdetect. Stegdetect is based on Chi-square test. It is able to detect messages hidden in a JPEG image using steganography software such as JSteg, JPHide or Out- Guess 0.. However the Chi-square test used in [6] does not produce results with very high accuracy. In this paper, we will demonstrate that the histogram information can be used more efficiently by using logistic regression or a decision tree method, C4.5 [7]. Similar work in this area is reported by Berg et al. [], Farid [4] and Zhang and Ping []. Berg et al. [] used statistical learning methods in steganalysis. The attributes used in their learning procedure are unconditional entropy, conditional entropies and transition probabilities. Farid [4] built higher order statistical models of the images using a type of wavelet decomposition. Zhang and Ping [] proposed an attack on the JSteg method based on a different Chi-square test. [5] is a very good survey on the state of art of the steganalysis.. Classification Methods To distinguish between the images with and without hidden data can naturally be viewed as a classification problem. We refer to the classes as stego and normal. We use a set of images as the training data to construct classifiers. When a classification algorithm is run on a data set (stego and normal images), it needs to find a boundary between the two classes and create a model. Given a set of images, the model learned can be used to predict the class to which each image belongs to. Here we propose to apply two classification methods to detecting hidden messages in JPEG images, the logistic regression method and the tree-based method C4.5. We discuss next the attributes to be used in the statistical models... Predicting Variables As discussed earlier, LSB-based steganography techniques such as JSteg insert information into images by replacing the LSB of the quantized DCT coefficients with the secret text. This changes the frequency of the quantized DCT coefficient values. Therefore, the frequencies of quantized DCT coefficient values are natural candidates for predicting variables to be used in the statistical models. However, for JPEG images, the DCT coefficients can have a
3 Z Z 4 4 wide range of values. Using the frequencies of all these values to build a model is not practical. More importantly, using more variables than needed may introduce several problems. For a regression model, it may lead to ill-conditioned matrices and unstable estimate of the model parameters. In general, adding attributes that are not really important into a statistical model is like adding noise to the model, thereby degrading the performance of the model. Therefore careful model selection is very important. Research shows for normal images, the distribution of the DCT coefficients can be approximately modeled as a Laplacian or a generalized Gaussian distribution [, 4, 0]. These models on the distribution of the DCT coefficients suggest that the frequencies of DCT coefficients with small values are more unevenly distributed. For example, the difference between the frequency of value and value 4 is generally greater than that between value and value. So the DCT coefficient values with small magnitude are more sensitive to information inserted using a JSteg-like method. (See Figure in [6] for histograms of the DCT coefficients before and after messages are inserted into a JPEG image using JSteg-like method). We use to denote the frequency of the DCT coefficient with value, i.e., the number of DCT coefficients that take the value. In this study, we use the central six frequencies,,,, and to build our models. We do not use the frequencies of the values F and, since the JSteg method does not modify DCT coefficients with these values. Our experiments demonstrate (results presented in Section 5) that the use of more variables does not improve the performance of the models... Logistic Regression Logistic models are widely used in statistical applications where binary responses (two classes) occur. In our case, an image is either stego or normal. We can assume that the probability of an image being stego is a function of some image characteristics (a vector). For example, can be the frequencies of the quantized DCT coefficient values. In the case of two classes, the logistic model has a very simple form. The probability function 7 7 * is modeled by 7%.R.). 7+! where s are the components of the vector. The model parameters s are usually estimated by maximum likelihood. Note that the function ' is a monotone func- ' '%$ tion and as such its inverse function '&! #" ')$ guarantees Z #! (" that the values of are between 0 and. More details on logistic regression can be found in [6]. We use the S-PLUS [] function glm [] to estimate the probability function. As mentioned in the previ- h Figure. The frequencies of the quantized DCT coefficients having values X and. Black dots are for the normal JPEG images; Symbols, and are for stego images with 0, 00 and 00 bytes hidden messages respectively. ous subsection, we use the frequencies,,,, and * as predicting variables. Addition of more variables increases the complexity of the model but does not necessarily guarantee higher accuracy. In fact, we show in Section 5, in some instances, accuracy can actually deteriorate. We include only linear terms of the variables in the model. This is based on the following argument. Take the pair and for example. A plot of these pairs is shown in Figure. The plot suggests that in a normal JPEG image, the frequency of the DCT coefficients having a X value is almost always higher than the ones with a value. This is true because the distribution of each individual DCT coefficients tends to have a mode in the center (see [, 4, 0] for modeling of the DCT coefficients). If we have a very large image with large number of DCT coefficients, this trend should also hold for other coefficient value pairs. However, for small size images, occasionally this trend may not be seen. As the image sizes in our experiments was rather small, 4#+ 4+, we chose the frequencies,,,, and as predicting varialbes in the statistical models, because the trend seem to be correct in this case. This important piece of extra information is not utilized by any known steganalysis method. An implication of this observation is that linear logistic models should work well in detecting JSteg-like steganographic techniques. The above discussion also suggests that the methods presented in this paper should work better for larger images. Compared with a Chi-square test, logistic regression is h -
4 F more refined. Logistic regression has many advantages,. It is fast. Logistic regression is implemented efficiently in almost all the professional statistical package, such as SPLUS and SAS.. It is easy to interpret. We can actually derive a closed form expression for the probability function.. It is flexible. We can adjust one simple parameter in the model to meet different accuracy needs... Tree based Method error rates Tree based methods can also be used. We present a tree based model, C4.5 [7], to fit a tree structure to the training data. C4.5 builds classification models called decision trees from the training data. Each internal node in the tree specifies a binary test on a single attribute, using thresholds on numeric attributes. If as a result of tests conducted at internal nodes, an image ends up in a leaf node where majority of the images are stego, it is classified as a stego image; otherwise it is classified as a normal image. The tree is constructed by the following procedure:. Choose the best attribute for splitting the data into groups at the root node.. Determine a splitting point by maximizing some specified criterion (say, information gain).. Recursively carry out the first two steps until information gained by the process cannot be improved any further. Information gained by splits can be used as the criterion for determining the attributes and the splitting points. Once the tree is constructed it can be used for classifying the test data. Tree based methods can be more flexible than logistic regression. It makes less assumptions about the data, so can be generalized to other situations more easily. One disadvantage of the tree based method is that the decision regions for classifications are constrained to be hyper-rectangles with boundaries constrained to be parallel to the input variable axes. As in the case of logistic model, the training data in this case also consist of the frequencies of quantized DCT coefficient values,,,, and * of images, as attributes or predicting variables. We use the data mining tool WEKA [0] to run the C4.5 algorithm on the training data. 4. Experiments and Results We have a data set of 80 normal JPEG images. The images are downloaded from the Internet. All the images logistic tree stegdetect logistic tree stegdetect logistic tree stegdetect Figure. Boxplots of the error rates. The left three bars are error rates for experiment, the middle three are for experiment, and the right three are for experiment. Smaller values are better. have been cropped 4F to 4+ 4#+ in size. We used the JSteg method to insert bytes, F F 4 F F bytes, and bytes of text messages 4 into the images. The JPEG image sizes range from to kilobytes. According to the author of JSteg, the maximum size of the message that can be inserted in F a cover image is approximately of the size of the image file. For some image files, this limit is only 00 bytes. The secret message used in our experiments for insertion in cover images was taken from Gutenberg s Etext of Shakespeare s First Folio. We use 0-fold validation to compare the three steganalysis methods, the logistic regression, the tree-based method C4.5, and the Stegdetect method. In each of our experiments, we take the original 80 JPEG images, and one 4F F group of 80 images with embedded text messages., F=F 4 F and bytes of texts were embedded in cover images in our experiments, and respectively. The 0-fold validation results are summarized in Tables,,, and Figure. From the results, we can see that the logistic regression method performs better than the other two methods in all three experiments. The tree-based method C4.5 performs better than the Stegdetect method in experiment. The performance of the latter two methods is similar in experiment. While in experiment both methods fail to perform better than random guess. The performance of the logistic regression method is noteworthy. When 4F byte messages are embedded in the images, the mean error rate is FL for this method. This implies even when only 4F bytes of message is embedded, the logistic regression method is able to perform better than
5 Table. Error rates for the logistic regression, the tree-based method C4.5 and the Stegdetect method in experiment (in the stego images, 00 bytes of text message is embedded using JSteg). Mean and standard deviation of the error rates are shown in the bottom of the table. run logistic tree stegdetect mean stdev Table. Error rates for the logistic regression, the tree-based method C4.5 and the Stegdetect method in experiment (in the stego images, 00 bytes text message is embedded using JSteg). Mean and standard deviation of the error rates for each method are shown in the bottom of the table. run logistic tree stegdetect mean stdev Table. Error rates for the logistic regression, the tree-based method C4.5 and the Stegdetect method in experiment (in the stego images, 0 bytes text message is embedded using JSteg). Mean and standard deviation of the error rates for each method are shown in the bottom of the table. run logistic tree stegdetect mean stdev random guess whereas the other two methods perform no better than random guess. In the tree-based method the boundaries of the decision regions are constrained to be parallel to the input variable axes. However, it may be observed in Figure, the true boundary in terms of the attributes of the normal and the stego images is not parallel to the input variable axes. For this reason the performance of the treebased method is not as good as that of logistic regression. Our chosen methods do not rely on the knowledge of the locations where the information is hidden. As such they can be effectively utilized to break similar LSB-based methods that use random bit selection, e.g., OutGuess On the number of predicting variables We indicated in Section that the use of excessive variables may not lead to better results. We illustrate this phenomenon with the help of results from our experiments. In Figure, we present the results of our experiments where a varying number of predicting variables (, 4, 6,...,0) were used instead of just 6 (,,,, and * ). The estimation error rates for logistic regression method using, 4, 6,..., 0 variables (0-fold cross validation) are summarized in Figure. The figure indicates that using only the center two frequencies and, it may not be possible to capture all the information in the data. Increasing the number of variables to or improves the accuracy. However, the use of more than variables does
6 Error rates Error rates Error rates Number of variables used (a) Number of variables used (b) Number of variables used (c) Figure. Comparison of logistic models with different number of predicting variables. The sizes of hidden messages in the stego images are 0, 00 and 00 bytes in figures (a), (b) and (c) respectively. not improve the accuracy but causes slightly larger variance in the estimation error rates. We observe similar trends in the tree-based methods. In our experiments, therefore, we use a model with predicting variables. More sophisticated feature selection algorithms can be found in the literature [6,,, ]. We intend to explore if applying these feature selection algorithms can lead to further performance improvement. 6. Conclusion The tree-based method C4.5 outperforms Stegdetect in the experiment where a relatively large amount of information is hidden. However, it does not perform well when the amount of hidden information is small. We suggest that one reason for C4.5 not performing as well as the logistic regression is that it tends to produce boundaries that are parallel to the input variable axes, which in this case may not be appropriate. We also pointed out that the number of attributes used in classification can be related to a classifier s performance. Many present steganalysis methods do not consider this as a serious problem. Hence they tend to use all attributes that are related. However using more variables than needed does not necessarily lead to good performance and may even significantly degrade the performance of a statistical learning model. When selecting the predicting variables for our model, we take the distribution of the DCT coefficients into consideration. The understanding of steganalysis methods and their effects can help in designing methods and algorithms preserving data privacy. Our experiments were carried out to break methods like JSteg that are employed to hide information. Our methods do not rely on the placement of the hidden information. Therefore they can be used without any modification on LSB based steganographic techniques that use random bit selection. 7. Acknowledgements The authors would like to thank Sidi Goutam and Amit Mandvikar for their help in this project. The authors also wish to thank the reviewers for their helpful comments in the preparation of this manuscript. LSB-based steganographic techniques like JSteg change the statistical properties of the cover image when it embeds secret message in the image. Accordingly, such methods are vulnerable to statistical attack. Previous methods such as Stegdetect are based on Chi-square test. The accuracy of Stegdetect can be improved. When the size of the hidden message is small, it performs no better than random guess. In this paper we have proposed two new steganalysis methods based on the logistic regression and the tree-based method C4.5 for attacking LSB-based steganographic techniques. We conducted experiments to evaluate the performance of the two data mining techniques and compared them with the performance of the well known method Stegdetect. The experiments demonstrated that the performance of the logistic regression based technique is very impressive. When large amount of information is hidden, it can detect with very high accuracy. Even when the amount of hidden information is very small, it performs better than random guess. References [] G. Berg, I. Davidson, M.-Y. Duan, and G. Paul. Searching for hidden messages: automatic detection of steganography. In 5th AAAI Innovative Applications of Artifical Intelligence (IAAI) Conference 00, 00. [] J. M. Chambers and T. Hastie, editors. Statistical models in S. London: Chapman & Hall, 99. [] R. J. Clarke. Transform Coding of Images. London: Academic Press, 985. [4] H. Farid. Detecting hidden messages using higher-order statistical models. In International Conference on Image Processing (ICIP), Rochester, NY, 00, 00. [5] J. Fridrich and M. Goljan. Practical steganalysis of digital images - state of the art. In Proc. SPIE Photonics West, Vol. 4675, Electronic Imaging 00, Security and Watermarking of Multimedia Contents, San Jose, California, January, 00, pp. -., 00. [6] T. Hastie, R. Tibshirani, and J. H. Friedman. The elements of statistical learning: data mining, inference, and predic-
7 tion: with 00 full-color illustrations. New York: Springer- Verlag, 00. [7] N. F. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. In D. Aucsmith, editor, Information Hiding: Second International Workshop, volume 55 of Lecture Notes in Computer Science, pages Springer-Verlag, Berlin, Germany, 998. [8] D. Kahn. The Codebreakers The Story of Secret Writing. Scribner, New York, New York, U.S.A., 996. [9] D. Kahn. The history of steganography. In R. J. Anderson, editor, Information Hiding, First International Workshop, volume 74 of Lecture Notes in Computer Science, pages 5. Springer-Verlag, Berlin, Germany, 996. [0] E. Y. Lam and J. W. Goodman. A mathematical analysis of the DCT coefficient distributions for images. IEEE Transactions on Image Processing, 9(0):66 666, 000. [] H. Liu and H. Motoda. Feature Selection for Knowledge Discovery & Data Mining. Boston: Kluwer Academic Publishers, 998. [] P. McCullagh and J. A. Nelder. Generalized linear models (Second edition). London: Chapman & Hall, 989. [] A. Miller. Subset Selection in Regression. Chapman & Hall/CRC, edition, 00. [4] F. Müller. Distribution shape of two-dimensional DCT coefficients of natural images. ELECTRONICS LETTERS, 9():95 96, 99. [5] W. B. Pennebaker and J. L. Mitchell. JPEG Still Image Data Compression Standard. Van Nostrand Reinhold, New York, NY, USA, 99. [6] N. Provos and P. Honeyman. Detecting steganography content on the Internet. Technical report, CITI, 00. [7] J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann, 99. [8] Steganography software [9] A. Westfeld and A. Pfitzmann. Attacks on steganography systesms, 999. [0] I. Witten and E. Frank. Data Mining - Practical Machine Learning Tools and Techniques with JAVA Implementations. Morgan Kaufmann Publishers, 000. [] L. Yu and H. Liu. Feature selection for high-dimensional data: A fast correlation-based filter solution. In T. Fawcett and N. Mishra, editors, Proceedings of the 0th International Conference on Machine Learning (ICML-0), August -4, 00, pages , Washington, D.C., 00. Morgan Kaufmann. [] T. Zhang and X. Ping. A fast and effective steganalytic technique against JSteg-like algorithms. In ACM Symposium on Applied Computing, March 9 to, 00, Florida, USA, 00.
Breaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationEMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,
More informationAN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS
AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS Chinchu Elza Andrews 1, Iwin Thanakumar Joseph 2 1. Post Graduate Student, Department of Computer Science and Engineering, Karunya University, India 2.
More informationAlpha-trimmed Image Estimation for JPEG Steganography Detection
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,
More informationComparision in cover media under Stegnography Digital media by Hide and Seek Approach
Comparision in cover media under Stegnography Digital media by Hide and Seek Approach Shruti Deptt. Of Computer science Guru Nank Dev University Gurdaspur, India Abstract:-Although every people have secrets
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationSteganalysis Techniques: A Comparative Study
University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-18-2007 Steganalysis Techniques: A Comparative Study Swaroop Kumar Pedda Reddy University
More informationACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images
ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images Chaur-Chin Chen and Wei-Ju Lai Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan e-mail: cchen@cs.nthu.edu.tw
More informationImage Stego Detection using Higher Order Statistics
Nahrain University, College of Engineering Journal (NUCEJ) Vol.13 No., 010 pp.141-149 Image Stego Detection using Higher Order Statistics Assistant Lecturer Ammar Moufak J. Yousif Department of Electrical
More informationA Steganography method for JPEG2000 Baseline System
A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract
More informationSearching For Hidden Messages: Automatic Detection of Steganography
Searching For Hidden Messages: Automatic Detection of Steganography George Berg, Ian Davidson, Ming-Yuan Duan and Goutam Paul Computer Science Department University at Albany, SUNY 1400 Washington Ave
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationOn the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.
More informationImproving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique
Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique Sarita R. Visavalia 1, Dr. Amit Ganatra 2 1 Department of Information Technology, CHARUSAT, India 2 Dpartmentof Computer
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationDETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION
Chapter 13 DETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION Benjamin Rodriguez and Gilbert Peterson Abstract When a digital forensics investigator suspects that steganography has been used to hide
More informationBenchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi a, Husrev T. Sencar b Nasir Memon b a Department of Electrical and Computer Engineering b Department of Computer and Information Science
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationMultiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging
Multiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging Sos S. Agaian* a, Gilbert L. Peterson b and Benjamin M. Rodriguez b a Multimedia and Mobile Signal Processing Laboratory The
More informationA Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationPeak-Shaped-Based Steganographic Technique for MP3 Audio
Journal of Information Security, 3, 4, -8 doi:.436/jis.3.43 Published Online January 3 (http://www.scirp.org/journal/jis) Peak-Shaped-Based Steganographic Technique for MP3 Audio Raffaele Pinardi, Fabio
More informationA Feature Selection Methodology for Steganalysis
A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1,andPatrickBas 1,2 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O.
More informationJPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients
International Journal of Soft Computing and Engineering (IJSCE ISSN: 3-307, Volume-, Issue-6, January 0 JPEG Steganography System with inimal Changes to the Quantized DCT Coefficients Hamdy A. orsy, Zaki
More informationA General Framework for the Structural Steganalysis of LSB Replacement
A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding
More informationCyber attack detection using decision tree approach
Cyber attack detection using decision tree approach Amit Shinde Department of Industrial Engineering, Arizona State University,Tempe, AZ, USA {amit.shinde@asu.edu} In this information age, information
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationA Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture
Sacred Heart University From the SelectedWorks of Eman Abdelfattah August, 2011 A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture Eman Abdelfattah, Sacred
More informationFurther Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis
Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationSTEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION
Chapter 1 STEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION Benjamin M. Rodriguez and Gilbert L. Peterson Abstract Several steganography tools are freely available over the Internet, ranging from
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationCOMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES
COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationSTEGANALYSIS OF STEGOSTORAGE LIBRARY
t m Mathematical Publications DOI: 10.1515/tmmp-2016-0034 Tatra Mt. Math. Publ. 67 (2016), 99 116 STEGANALYSIS OF STEGOSTORAGE LIBRARY Michala Gulášová Matúš Jókay ABSTRACT. The main goal of this research
More informationBit-Plane Decomposition Steganography Using Wavelet Compressed Video
Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer
More informationPiecewise Permutation Steganography for 3D Humanoid Mesh Models
Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationSTEGANALYSIS OF STEGOSTORAGE SYSTEM
t m Mathematical Publications DOI: 10.1515/tmmp-2015-0049 Tatra Mt. Math. Publ. 64 (2015), 205 215 STEGANALYSIS OF STEGOSTORAGE SYSTEM Michala Gulášová Matúš Jókay ABSTRACT. The aim of this contribution
More informationSteganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines
Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines Siwei Lyu and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA ABSTRACT Steganographic
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationSteganalysis of Hydan
Steganalysis of Hydan Jorge Blasco 1, Julio C. Hernandez-Castro 1, Juan M.E. Tapiador 1 Arturo Ribagorda 1 and Miguel A. Orellana-Quiros 2 1 {jbalis, jcesar, jestevez, arturo}@inf.uc3m.es 2 mangel.orellana@meh.es
More informationSteganography and Steganalysis of JPEG Images
DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES AND ENGINEERING PH.D. PROPOSAL Steganography and Steganalysis of JPEG Images Supervisory Committee: Author: Mahendra Kumar makumar@cise.ufl.edu Dr. Richard
More informationLETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration
IEICE TRANS. INF. & SYST., VOL.E96 D, NO.5 MAY 2013 1233 LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration Kazumi YAMAWAKI, Member, Fumiya NAKANO, Student
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationDetection of double-compression for applications in steganography
1 Detection of double-compression for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a maximum likelihood
More informationDATA HIDING TECHNIQUES IN DIGITAL MULTIMEDIA Girish Kumar BS 1, Prof (Dr) Ajay Rana 2 1 M Tech Scholar Computer Science & Engineering,
DATA HIDING TECHNIQUES IN DIGITAL MULTIMEDIA Girish Kumar BS 1, Prof (Dr) Ajay Rana 2 1 M Tech Scholar Computer Science & Engineering, ASET, Amity University, Noida, India bsgirishkumar@gmail.com 2 Director
More informationA Review of Approaches for Steganography
International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2
More informationSteganography. Brent McClain Rob Carey
Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created
More informationGENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY
Volume 1, No. 5, December 2010 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY Samir
More informationModern Steganalysis Can Detect YASS
Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],
More informationMerging Markov and DCT Features for Multi-Class JPEG Steganalysis
Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Tomáš Pevný a, Jessica Fridrich b a Department of Computer Science, Binghamton University, State University of New York b Department of
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationDefending Against Statistical Steganalysis
Defending Against Statistical Steganalysis Niels Provos Center for Information Technology Integration University of Michigan provos@citi.umich.edu Abstract The main purpose of steganography is to hide
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationFeature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images
Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images Abstract In this paper, we present a scheme based on feature mining and neuro-fuzzy inference
More informationSteganography: Hiding Data In Plain Sight. Ryan Gibson
Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos
More informationA Hybrid Method of Hiding The Text Information Using Stegnography
A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationJ2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD
J2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD Richard E Newman, 1 Ira S Moskowitz 2 and Mahendra Kumar 1 1 CISE Department University of Florida Gainesville, FL 32611-6120 email: {nemo,makumar}@ciseufledu
More informationSECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,
More informationDetection of double-compression in JPEG images for applications in steganography
1 Detection of double-compression in JPEG images for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a
More informationSandeep Kharidhi and WenSui Liu ChoicePoint Precision Marketing
Generalized Additive Model and Applications in Direct Marketing Sandeep Kharidhi and WenSui Liu ChoicePoint Precision Marketing Abstract Logistic regression 1 has been widely used in direct marketing applications
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationAppendix A. Definition of Terms
Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted
More informationA Formula Diamond Encoding Data Hiding Scheme
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo
More informationMetamorphosis of High Capacity Steganography Schemes
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami
More informationQuality based JPEG Steganography using balanced Embedding Technique
Second International Conference on Emerging Trends in Engineering and Technology, ICETET-09 Quality based JPEG Steganography using balanced Embedding Technique Mohammed Ishaque Department of Computer Science
More informationImage Analysis for Online Dynamic Steganography Detection
Vol. 1, No. 3 Computer and Information Science Image Analysis for Online Dynamic Steganography Detection Kevin Curran & Joanne Mc Devitt Intelligent Systems Research Centre Faculty of Engineering University
More informationOptimizing Image Steganography using Genetic Algorithm
Optimizing Image Steganography using Genetic Algorithm 1 Gangeshawar, 2 James Attri 1 M.Tech(CSE),Satya College of Engg.& Tech.,Palwal, India 2 Asst. Prof (CSE), Satya College of Engg.& Tech.,Palwal, India
More informationContent-independent steganography and steganalysis of JPEG images
Content-independent steganography and steganalysis of JPEG images Mohammad Rezaei Security Analysis Laboratory Tehran, Iran rezaei@salab.ir M. Bagher Salahshoor Security Analysis Laboratory Tehran, Iran
More informationQuantitative and Binary Steganalysis in JPEG: A Comparative Study
Quantitative and Binary Steganalysis in JPEG: A Comparative Study Ahmad ZAKARIA LIRMM, Univ Montpellier, CNRS ahmad.zakaria@lirmm.fr Marc CHAUMONT LIRMM, Univ Nîmes, CNRS marc.chaumont@lirmm.fr Gérard
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationA Method for Automatic Identification of Signatures of Steganography Software
354 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 2, JUNE 2010 A Method for Automatic Identification of Signatures of Steganography Software Graeme Bell and Yeuan-Kuen Lee Abstract
More informationA Survey on Digital Image Steganography and Steganalysis
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 8, Issue 1 (Sep. - Oct. 2013), PP 56-60 A Survey on Digital Image Steganography and Steganalysis
More informationUsing Decision Boundary to Analyze Classifiers
Using Decision Boundary to Analyze Classifiers Zhiyong Yan Congfu Xu College of Computer Science, Zhejiang University, Hangzhou, China yanzhiyong@zju.edu.cn Abstract In this paper we propose to use decision
More informationBenchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon I. INTRODUCTION There have been a range of image based steganographic embedding techniques proposed
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationCANVASS - A Steganalysis Forensic Tool for JPEG Images
Annual ADFSL Conference on Digital Forensics, Security and Law 2010 May 20th, 1:00 PM CANVASS - A Steganalysis Forensic Tool for JPEG Images Jennifer L. Davidson Department of Mathematics, Iowa State University,
More informationRobust biometric image watermarking for fingerprint and face template protection
Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,
More informationSpace Filling Curves in Steganalysis
Space Filling Curves in Steganalysis Andreas Westfeld Technische Universität Dresden, 01062 Dresden, Germany ABSTRACT We introduce a new method to increase the reliability of current steganalytic techniques
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationKeywords: Steganography, Cryptography, Encryption, Data hiding
Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Stegnography with
More informationAn Improved Steganalysis Approach for Breaking the F5 Algorithm
An Improved Steganalysis Approach for Breaking the F5 Algorithm HATIM ABOALSAMH, HASSAN MATHKOUR, SAMI DOKHEEKH, MONA MURSI, GHAZYASSASSA hatim@ccis.ksu.edu.sa, mathkour@ccis.ksu.edu.sa, monmursi@yahoo.com,
More informationQR Code Watermarking Algorithm based on Wavelet Transform
2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationA Novel Information Security Scheme using Cryptic Steganography
A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in
More informationA New Statistical Restoration Method for Spatial Domain Images
A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,
More informationModel Assessment and Selection. Reference: The Elements of Statistical Learning, by T. Hastie, R. Tibshirani, J. Friedman, Springer
Model Assessment and Selection Reference: The Elements of Statistical Learning, by T. Hastie, R. Tibshirani, J. Friedman, Springer 1 Model Training data Testing data Model Testing error rate Training error
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationDATA hiding [1] and watermarking in digital images
14 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error Hussein A. Aly, Member,
More informationA Method for Automatic Identification of Signatures of Steganography Software
SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY A Method for Automatic Identification of Signatures of Steganography Software Graeme Bell* and Yeuan-Kuen Lee Abstract A fully automated,
More information