Close Color Pair Signature ensemble Adaptive Threshold based Steganalsis for LSB Embedding in Digital Images
نویسندگان
چکیده
We present a novel technique for effective steganalysis of high‐color‐depth digital images that have been subjected to embedding by LSB steganographic algo‐ rithms. The detection theory is based on the idea that under repeated embedding, the disruption of the signal characteristics is the highest for the first embedding and de‐ creases subsequently. That is the marginal distortions due to repeated embeddings de‐ crease monotonically. This decreasing distortion property exploited with Close Color Pair signature is used to construct the classifier that can distinguish between stego and cover images. For evaluation, a database composed of 1200 plain and stego images (at 10% and 20% payload and each one artificially adulterated with 20% additional data) was established. Based on this database, extensive experiments were conducted to prove the feasibility of our proposed system. Our main results are (i) a 90%+ positive‐detection rate; (ii) Close Color Pair ratio is not modified significantly when additional bit streams are embedded into a test image that is already tampered with a message.; (iii) an image quality metric Czenakowski Meas‐ ure, that is substantially sensitive to LSB embedding is utilized to derive the effective image adaptive threshold; (iv) capable of detecting stego images with an embedding of even 10% payload while the earlier methods can achieve the same detection rate only with 20% payload.
منابع مشابه
Eigenvalues-based LSB steganalysis
So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...
متن کاملIncreased Capacity of Information Hiding in LSB-s Method for Text and Image
Steganography, derived from Greek, literally means “covered writing”. It includes a vast array of secret communications methods that conceal the message’s very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. This paper proposes a new improved version of Least Significant Bit (LSB) method....
متن کاملSteganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram
In this paper we present a new accurate steganalysis method for the LSBreplacement steganography. The suggested method is based on the changes that occur in thehistogram of an image after the embedding of data. Every pair of neighboring bins of ahistogram are either inter-related or unrelated depending on whether embedding of a bit ofdata in the image could affect both bins or not. We show that...
متن کاملSteganalysis of Lsb Encoding in Uncompressed Images by Close Colour Pair Analysis
In this paper we have described a steganalytic tool to detect the presence of hidden message in LSB steganography. It is a stego -only attack in LSB insertion for uncompressed color images encoded in 24 bit BMP format. The detection theory is based on statistical analysis of pixel pairs using their RGB components. The necessity of a variable threshold to mark the stego images is explained .The ...
متن کاملRobust Potato Color Image Segmentation using Adaptive Fuzzy Inference System
Potato image segmentation is an important part of image-based potato defect detection. This paper presents a robust potato color image segmentation through a combination of a fuzzy rule based system, an image thresholding based on Genetic Algorithm (GA) optimization and morphological operators. The proposed potato color image segmentation is robust against variation of background, distance and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Trans. Data Privacy
دوره 1 شماره
صفحات -
تاریخ انتشار 2008