Scientific and Technical Journal

ELECTROTECHNIC AND COMPUTER SYSTEMS

ISSN Print 2221-3937
ISSN Online 2221-3805
FUNDAMENTALS OF THE NEW APPROACH TO DIGITAL IMAGES OF STEGANALYSIS
Abstract:
Proposed a new approach to the organization of detecting the presence of embedding additional information by modifying the least significant bit in the digital image. Given results of the computational experiments, confirming the effectiveness of the proposed approach, including at small bandwidth (less than 0.5 bit / pixel) of the hidden communication channel.
Authors:
Keywords
DOI
References
1. Gkizeli M. Optimal Signature Design for Spread-Spectrum Steganography / M.Gkizeli, D.A.Pados, M.J.Medley // IEEE Trans. On Image Processing. — 2007. — Vol.16, (2). — Р. 1021—1031.
2. Bergman C. Unitary embedding for data hiding with the SVD / C.Bergman, J.Davidson // Security, steganography and watermarking of multimedia contents VII, SPIE. — 2005. — Vol.5681. — Р.619—630.
3. Katzenbeisser S. Information Techniques for Steganography and DigitalWatermarking / S.Katzenbeisser and F.A.P.Petitcolas. — Boston: Artech House, 2000. — 220 p.
4. Li, B. A Survey on Image Steganography and Steganalysis / B. Li, J. He, et al. // Journal of Information Hiding and Multimedia Signal Processing. — 2011. — Vol.2, No.2. — P.142–172.
5. Chandramouli, R. Analysis of LSB based Image Steganography Techniques / R. Chandramouli, N. Memon // Proceedings of ICIP, Thessaloniki, Greece, October 7-10, 2001. — 2001. — Vol.3. — P. 1019–1022.
6. Ker, A.D. A Weighted Stego Image Detector for Sequential LSB Replacement // Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom. — 2007. — P. 453–456.
7. Mitra, S. Steganalysis of LSB Encoding in Uncompressed Images by Close Color Pair Analysis / S. Mitra, T. Roy, D. Mazumdar and A.B. Saha // IIT Kanpur Hackers’ Workshop 2004 (IITKHACK04), 23–24 Feb 2004, Kanpur, India. — Kanpur: Indian Institute of Technology Kanpur, 2004. — P. 23–24.
8. Bhattacharyya, S. Steganalysis of LSB Image Steganography using Multiple Regression and Auto Regressive (AR) Model // S. Bhattacharyya, G. Sanyal // International Journal of Computer Technology and Applications. — 2011. — Vol.2, Iss.4. — P. 1069–1077.
9. Gul, G. SVD-Based Universal Spatial Domain Image Steganalysis / G. Gul, F. Kurugollu // IEEE Transactions on Information Forensics and Security. — 2010. — Vol.5, No.2. — P. 349–353.
10. Gul, G. Steganalytic Features for JPEG Compression-Based Perturbed Quantization / G. Gul, A.E. Dirik, I. Avcibas // IEEE Signal Processing Letters. — 2007. — Vol.14, Iss.3. — P. 205–208.
11. Natarajan, V. Blind Image Steganalysis Based on Contourlet Transform / V. Natarajan, R. Anitha // International Journal on Cryptography & Information Security. — 2012. — Vol.2, Iss.3. — P. 77–87.
12. Dumitrescu, S. Detection of Lsb Steganography via Sample Pair Analysis / S. Dumitrescu, X. Wu, Z. Wang // IEEE
Transactions on Signal Processing. — 2003. — Vol.51, Iss.7. — P. 1995–2007.
13. StegAlyzerSS. Steganography Analyzer Signature Scanner // Backbone Security. Fairmont, WV, USA. Available at: http://www.sarc-wv.com/products/stegalyzerss/ (accessed 27.06.2012).
14. StegoHunt // WetStone Technologies. Cortland, NY, USA. Available at: http://www.wetstonetech.com/product/stegohunt/ (accessed 27.06.2012).
Published:
Last download:
2017-11-16 11:38:39

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014. Any use of information from the site is possible only under the condition that the source link! ]
Яндекс.Метрика