Research Article | OPEN ACCESS
A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
N.V.S. Sree Rathna Lakshmi
Agni College of Technology, India
Research Journal of Applied Sciences, Engineering and Technology 2014 19:4100-4105
Received: December 13, 2013 | Accepted: January 04, 2014 | Published: May 15, 2014
Abstract
In this study, a novel steganalytic algorithm which can differentiate between the normal and the stego image is proposed, in order to break a steganographic method, whose stego image is of high quality. The proposed steganographic method is employed to hide multiple images, in a JPEG cover image without any compromise in quality and is shown in experimental results. The steganographic method makes sense for JPEG, PNG and BMP image formats. The steganalytic algorithm exploits ‘3-Level DWT’ and the energy value is calculated, based on which classification between the stego and the normal image is carried out. However, the proposed steganalytic algorithm proves its accuracy, by identifying between the stego and normal image with 90% accuracy, over the existing method which shows 80% accuracy rate and is shown in experimental results.
Keywords:
BMP, DWT, JPEG, steganalysis, steganography,
References
-
Chandramouli, R. and N. Memon, 2001. Analysis of LSB based image steganography techniques. Proceeding of the International Conference on Image Processing, 3: 1019-1022.
CrossRef
-
Fridrich, J., M. Goljan and R. Du, 2001. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 8(4): 22-28.
CrossRef
-
Fridrich, J., M. Goljan and D. Hogea, 2002. Steganalysis of JPEG Images: Breaking the F5 algorithm. Proceeding of the 5th International Workshop on Information Hiding, pp: 310-323.
CrossRef
-
Kundur, D. and D. Hatzinakos, 1998. Digital watermarking using multiresolution wavelet decomposition. Proceedings of the IEEE International Conference on Acoustic, Speech, Signal Processing, 5: 2969-2972.
CrossRef
-
Lyu, S. and H. Farid, 2002. Detecting hidden messages using higher-order statistics and support vector machines. Proceedings of the 5th International Workshop on Information Hiding. Noordwijkerhout, the Netherlands.
-
Sullivan, K., K. Madhow, S. Chandrasekaran and B.S. Manjunath, 2005. Steganalysis of spread spectrum data hiding exploiting cover memory. Proceedings of the SPIE 2005, 5681: 38-46.
CrossRef
-
Xuan, G., Y.Q. Shi and Z. Ni, 2004. Lossless data hiding using integer wavelet transform and spread spectrum. Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP04). Siena, Italy.
CrossRef
-
Zou, D., Y.Q. Shi, S. Wei and X. Guorong, 2006. Steganalysis based on Markov model of thresholded prediction-error image. Proceeding of the IEEE International Conferences on Multimedia and Expo, pp: 1365-1368.
CrossRef
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|