Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors

被引:6
作者
Battikh, Dalia [1 ]
El Assad, Safwan [2 ]
Thang Manh Hoang [3 ]
Bakhache, Bassem [1 ]
Deforges, Olivier [4 ]
Khalil, Mohamad [1 ]
机构
[1] Lebanese Univ, LASTRE Lab, Tripoli 210, Lebanon
[2] Univ Nantes, Polytech Nantes, IETR, UMR CNRS 6164, Rue Christian Pauc CS 50609, F-44306 Nantes 3, France
[3] Hanoi Univ Sci & Technol, Sch Elect & Telecommun, 1 Dai Co Viet, Hanoi, Vietnam
[4] INSA Rennes, CNRS, IETR, F-35708 Rennes 7, France
关键词
steganography; chaotic system; steganalysis; wavelet; feature vector; SVM; FLD; IMAGE; ALGORITHM; SELECTION;
D O I
10.3390/e21080748
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size.
引用
收藏
页数:36
相关论文
共 53 条
[1]  
Abdelwahab AA, 2008, P IEEE SWARM INT S, P1
[2]  
Abu Taha Mohammed, 2017, International Journal of Internet Technology and Secured Transactions, V7, P89
[3]  
Abutaha M, 2017, THESIS
[4]   Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis [J].
Ahvanooey, Milad Taleby ;
Li, Qianmu ;
Hou, Jun ;
Rajput, Ahmed Raza ;
Chen, Yini .
ENTROPY, 2019, 21 (04)
[5]  
Akhter F., 2015, ARXIV150603681
[6]   Differential evolution algorithm for the selection of optimal scaling factors in image watermarking [J].
Ali, Musrrat ;
Ahn, Chang Wook ;
Siarry, Patrick .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2014, 31 :15-26
[7]  
[Anonymous], 2007, P IEEE COMP SOC 2007
[8]  
Battikh D, 2013, INT CONF INTERNET, P20, DOI 10.1109/ICIST.2013.6747498
[9]  
Battikh D., 2015, STEGANOGRAPHIE BASEE
[10]  
Boora M., 2013, INT J SOFT COMPUT EN, V3, P136