Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors

被引:6
作者
Battikh, Dalia [1 ]
El Assad, Safwan [2 ]
Thang Manh Hoang [3 ]
Bakhache, Bassem [1 ]
Deforges, Olivier [4 ]
Khalil, Mohamad [1 ]
机构
[1] Lebanese Univ, LASTRE Lab, Tripoli 210, Lebanon
[2] Univ Nantes, Polytech Nantes, IETR, UMR CNRS 6164, Rue Christian Pauc CS 50609, F-44306 Nantes 3, France
[3] Hanoi Univ Sci & Technol, Sch Elect & Telecommun, 1 Dai Co Viet, Hanoi, Vietnam
[4] INSA Rennes, CNRS, IETR, F-35708 Rennes 7, France
关键词
steganography; chaotic system; steganalysis; wavelet; feature vector; SVM; FLD; IMAGE; ALGORITHM; SELECTION;
D O I
10.3390/e21080748
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size.
引用
收藏
页数:36
相关论文
共 53 条
[21]   Edge-based image steganography [J].
Islam, Saiful ;
Modi, Mangat R. ;
Gupta, Phalguni .
EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
[22]   Image Data Hiding Method Based on Multi-pixel Differencing and LSB Substitution Methods [J].
Jung, Ki-Hyun ;
Ha, Kyeoung-Ju ;
Yoo, Kee-Young .
ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, :355-358
[23]   Steganographic algorithm based on randomization of DCT kernel [J].
Karri, Swathi ;
Sur, Arijit .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (21) :9207-9230
[24]   Least significant bit steganography using hitzl-zele chaotic map [J].
Kordov, Krasimir ;
Stoyanov, Borislav .
International Journal of Electronics and Telecommunications, 2017, 63 (04) :417-422
[25]   A reversible high capacity data hiding scheme using pixel value adjusting feature [J].
Kumar, Rajeev ;
Chand, Satish .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) :241-259
[26]  
Lee C.K., 2004, INFRARED FACE RECOGN
[27]   Edge Adaptive Image Steganography Based on LSB Matching Revisited [J].
Luo, Weiqi ;
Huang, Fangjun ;
Huang, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) :201-214
[28]   LSB matching revisited [J].
Mielikainen, J .
IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) :285-287
[29]   Image steganalysis using a bee colony based feature selection algorithm [J].
Mohammadi, F. Ghareh ;
Abadeh, M. Saniee .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2014, 31 :35-43
[30]  
Muhammad K., 2016, ARXIV160101386