Research Article | OPEN ACCESS
An Efficient Steganalytic Algorithm based on Contourlet with GLCM
1T.J. Benedict Jose and 2P. Eswaran
1Department of Computer Science, Manonmaniam Sundaranar University, Tirunelveli, India
2Department of Computer Science, Alagappa University, Karaikudi, India
Research Journal of Applied Sciences, Engineering and Technology 2014 12:1396-1403
Received: April ‎29, ‎2014 | Accepted: May ‎25, ‎2014 | Published: September 25, 2014
Abstract
Steganalysis is a technique to detect the hidden embedded information in the provided data. This study proposes a novel steganalytic algorithm which distinguishes between the normal and the stego image. III level contourlet is exploited in this study. Contourlet is known for its ability to capture the intrinsic geometrical structure of an image. Here, the lowest frequency component of each level is obtained. The pixel distance is taken as 1 and the directions considered are 0, 45, 90 and 180°, respectively. Finally, Support Vector Machine (SVM) is used as the classifier to differentiate between the normal and the stego image. This steganalytic system is tested with DWT, Ridgelet, Contourlet, Curvelet, Bandelet and Shearlet. All these were tested in the aspects of first order, Run length and Gray-Level Co-occurrence Matrix (GLCM) features. Among all these, Contourlet with GLCM shows the maximum accuracy of 98.79% and has the lowest misclassification rate of 1.21 and are presented in graphs.
Keywords:
Contourlet , first order , GLCM , run length , steganalysis , SVM,
References
-
Aura, T., 1996. Practical invisibility in digital communication. Proceeding of the 1st International Workshop on Information Hiding, pp: 265-278.
CrossRef
-
Auria, L. and R.A. Moro, 2008. Support Vector Machines (SVM) as a Technique for Solvency Analysis. DIW Berlin Discussion Paper No. 811.
-
Chang, C.C. and C.J. Lin, 2001. LIBSVM: A Library for Support Vector Machines 2001 [Online]. Retrieved form: http://www.csie.ntu.edu.tw/~cjlin/ libsvm.
Direct Link
-
Dey, N., A.B. Roy and S. Dey, 2011. A novel approach of color image hiding using RGB color planes and DWT. Int. J. Comput. Appl., 36(5): 19-24.
-
Farid, H., 2001. Detecting Steganographic message in digital images. Technical Report, TR2001-412, Dartmouth College, New Hampshire, pp: 1-9.
PMid:11824909
-
Fontaine, C. and F. Galand, 2009. How Reed-Solomon codes can improve steganographic schemes. EURASIP J. Inform. Secur., 2009: 1-10.
CrossRef
-
Fridrich, J., 2004. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proceeding of the 6th International Information Hiding, Workshop, LNCS 3200, pp: 67-81.
CrossRef
-
Fridrich, J., M. Goljan and D. Hogea, 2003. Steganalysis of JPEG images: Breaking the F5 algorithm. Proceeding of the 5th International Workshop on Information Hiding, 2578: 310-323.
CrossRef
-
Fridrich, J., M. Goljan and D. Soukal, 2004. Perturbed quantization steganography with wet paper codes. Proceeding of the ACM Workshop Multimedia and Security. Magdeburg, Germany, pp: 4-15.
CrossRef
-
Huang, F., J. Huang and Y.Q. Shi, 2012. New channel selection rule for JPEG steganography. IEEE T. Inf. Foren. Sec., 7(4): 1181-1191.
CrossRef
-
Jassim, D., 2010. Digital Photography and Imaging. SYPEX Inc., Alameda, California, USA, pp: 272.
-
Jose, T.J.B. and P. Eswaran, 2013. Effective steganalytic algorithm based on residual value of pixels in an image. Int. J. Adv. Comput. Res., 3(12): 32-36.
-
Kaur, B., A. Kaur and J. Singh, 2011. Steganographic approach for hiding image in DCT domain. Int. J. Adv. Eng. Technol., 1(3): 72-78.
-
Kundur, D. and D. Hatzinakos, 1998. Digital watermarking using multiresolution wavelet decomposition. Proceeding of the IEEE International Conference Acoustic, Speech, Signal Processing. Seattle WA, pp: 2969-2972.
CrossRef
-
Schönfeld, D. and A. Winkler, 2007. Reducing the complexity of syndrome coding for embedding. Proceeding of the 9th International Workshop on Information Hiding, 4567: 145-158.
CrossRef
-
Vaudenay, S., 1996. An Experiment on DES Statistical Cryptanalysis. 3rd ACM Conference on Computer and Communications Security, ACM Press, pp: 139-147.
CrossRef
-
Westfeld, A., 2001. F5-A Steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (Ed.), Proceeding of 4th International Workshop on Information Hiding (IH'01). Pittsburgh, USA, LNCS 2137, pp: 289-302.
-
Westfeld, A. and A. Pfitzmann, 2000. Attacks on steganographic systems. In: Pfitzmann, A. (ed.), IH'99. Springer-Verlag, Berlin, Heidelberg, LNCS 1768, pp: 61-75.
CrossRef
-
Zhu, W., Z. Xiong and Y.Q. Zhang, 1998. Multiresolution watermarking for images and video: A unified approach. Proceeding of International Conference on Image (ICIP'98). Chicago, IL, pp: 465-468.
PMid:9679647
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|