A Novel Steganalysis Method Based on Histogram Analysis

被引:0
作者
Choudhury, Bismita [1 ]
Das, Rig [2 ]
Baruah, Arup [1 ]
机构
[1] Don Bosco Coll Engn & Technol, Dept Comp Sci & Engn & Informat Technol, Gauhati 781017, Assam, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela 769008, Orissa, India
来源
ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY | 2015年 / 315卷
关键词
Steganalysis; Steganography; Histogram; PSNR;
D O I
10.1007/978-3-319-07674-4_73
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganalysis is the art of detecting hidden messages embedded inside Steganographic Images. Steganalysis involves detection of steganography, estimation of message length and its extraction. Recently Steganalysis receives great deal of attention from the researchers due to the evolution of new, advanced and much secured steganographic methods for communicating secret information. This paper presents a universal steganalysis method for blocking recent steganographic techniques in spatial domain. The novel method analyses histograms of both the cover and suspicious image and based on the histogram difference it gives decision on the suspicious image of being stego or normal image. This method for steganalysis extracts a special pattern from the histogram difference of the cover and. By finding that specific pattern from the histogram difference of the suspicious and cover image it detects the presence of hidden message. The proposed steganalysis method has been experimented on a set of stego images where different steganographic techniques are used and it successfully detects all those stego images.
引用
收藏
页数:11
相关论文
共 11 条
  • [1] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [2] Das Rig, 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), P14, DOI 10.1109/NCETACS.2012.6203290
  • [3] Gibbs Construction in Steganography
    Filler, Tomas
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) : 705 - 720
  • [4] Fridrich J, 2003, LECT NOTES COMPUT SC, V2578, P310
  • [5] Practical steganalysis of digital images - State of the art
    Fridrich, J
    Goljan, M
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 1 - 13
  • [6] FRIDRICH J, 2001, P ACM SPEC SESS MULT
  • [7] Holub V., 2013, ACM WORKSH IF HID MU
  • [8] Holub V, 2012, IEEE WORKSH INF FOR
  • [9] Histogram estimation-scheme-based steganalysis defeating the steganography using pixel-value differencing and modulus function
    Joo, Jeong-Chun
    Kim, Kyung-Su
    Lee, Heung-Kyu
    Lee, Hae-Yeoun
    [J]. OPTICAL ENGINEERING, 2010, 49 (07)
  • [10] Lou DC, 2011, INT J INNOV COMPUT I, V7, P5429