Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


An Efficient Steganalytic Algorithm based on Contourlet with GLCM

1T.J. Benedict Jose and 2P. Eswaran
1Department of Computer Science, Manonmaniam Sundaranar University, Tirunelveli, India
2Department of Computer Science, Alagappa University, Karaikudi, India
Research Journal of Applied Sciences, Engineering and Technology  2014  12:1396-1403
http://dx.doi.org/10.19026/rjaset.8.1113  |  © The Author(s) 2014
Received: April ‎29, ‎2014  |  Accepted: May ‎25, ‎2014  |  Published: September 25, 2014

Abstract

Steganalysis is a technique to detect the hidden embedded information in the provided data. This study proposes a novel steganalytic algorithm which distinguishes between the normal and the stego image. III level contourlet is exploited in this study. Contourlet is known for its ability to capture the intrinsic geometrical structure of an image. Here, the lowest frequency component of each level is obtained. The pixel distance is taken as 1 and the directions considered are 0, 45, 90 and 180°, respectively. Finally, Support Vector Machine (SVM) is used as the classifier to differentiate between the normal and the stego image. This steganalytic system is tested with DWT, Ridgelet, Contourlet, Curvelet, Bandelet and Shearlet. All these were tested in the aspects of first order, Run length and Gray-Level Co-occurrence Matrix (GLCM) features. Among all these, Contourlet with GLCM shows the maximum accuracy of 98.79% and has the lowest misclassification rate of 1.21 and are presented in graphs.

Keywords:

Contourlet , first order , GLCM , run length , steganalysis , SVM,


References

  1. Aura, T., 1996. Practical invisibility in digital communication. Proceeding of the 1st International Workshop on Information Hiding, pp: 265-278.
    CrossRef    
  2. Auria, L. and R.A. Moro, 2008. Support Vector Machines (SVM) as a Technique for Solvency Analysis. DIW Berlin Discussion Paper No. 811.
  3. Chang, C.C. and C.J. Lin, 2001. LIBSVM: A Library for Support Vector Machines 2001 [Online]. Retrieved form: http://www.csie.ntu.edu.tw/~cjlin/ libsvm.
    Direct Link
  4. Dey, N., A.B. Roy and S. Dey, 2011. A novel approach of color image hiding using RGB color planes and DWT. Int. J. Comput. Appl., 36(5): 19-24.
  5. Farid, H., 2001. Detecting Steganographic message in digital images. Technical Report, TR2001-412, Dartmouth College, New Hampshire, pp: 1-9.
    PMid:11824909    
  6. Fontaine, C. and F. Galand, 2009. How Reed-Solomon codes can improve steganographic schemes. EURASIP J. Inform. Secur., 2009: 1-10.
    CrossRef    
  7. Fridrich, J., 2004. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proceeding of the 6th International Information Hiding, Workshop, LNCS 3200, pp: 67-81.
    CrossRef    
  8. Fridrich, J., M. Goljan and D. Hogea, 2003. Steganalysis of JPEG images: Breaking the F5 algorithm. Proceeding of the 5th International Workshop on Information Hiding, 2578: 310-323.
    CrossRef    
  9. Fridrich, J., M. Goljan and D. Soukal, 2004. Perturbed quantization steganography with wet paper codes. Proceeding of the ACM Workshop Multimedia and Security. Magdeburg, Germany, pp: 4-15.
    CrossRef    
  10. Huang, F., J. Huang and Y.Q. Shi, 2012. New channel selection rule for JPEG steganography. IEEE T. Inf. Foren. Sec., 7(4): 1181-1191.
    CrossRef    
  11. Jassim, D., 2010. Digital Photography and Imaging. SYPEX Inc., Alameda, California, USA, pp: 272.
  12. Jose, T.J.B. and P. Eswaran, 2013. Effective steganalytic algorithm based on residual value of pixels in an image. Int. J. Adv. Comput. Res., 3(12): 32-36.
  13. Kaur, B., A. Kaur and J. Singh, 2011. Steganographic approach for hiding image in DCT domain. Int. J. Adv. Eng. Technol., 1(3): 72-78.
  14. Kundur, D. and D. Hatzinakos, 1998. Digital watermarking using multiresolution wavelet decomposition. Proceeding of the IEEE International Conference Acoustic, Speech, Signal Processing. Seattle WA, pp: 2969-2972.
    CrossRef    
  15. Schönfeld, D. and A. Winkler, 2007. Reducing the complexity of syndrome coding for embedding. Proceeding of the 9th International Workshop on Information Hiding, 4567: 145-158.
    CrossRef    
  16. Vaudenay, S., 1996. An Experiment on DES Statistical Cryptanalysis. 3rd ACM Conference on Computer and Communications Security, ACM Press, pp: 139-147.
    CrossRef    
  17. Westfeld, A., 2001. F5-A Steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (Ed.), Proceeding of 4th International Workshop on Information Hiding (IH'01). Pittsburgh, USA, LNCS 2137, pp: 289-302.
  18. Westfeld, A. and A. Pfitzmann, 2000. Attacks on steganographic systems. In: Pfitzmann, A. (ed.), IH'99. Springer-Verlag, Berlin, Heidelberg, LNCS 1768, pp: 61-75.
    CrossRef    
  19. Zhu, W., Z. Xiong and Y.Q. Zhang, 1998. Multiresolution watermarking for images and video: A unified approach. Proceeding of International Conference on Image (ICIP'98). Chicago, IL, pp: 465-468.
    PMid:9679647    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved