We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Novel Digital Image Steganalysis Approach for Investigation

by Nanhay Singh, Bhoopesh Singh Bhati, R. S. Raw
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 12
Year of Publication: 2012
Authors: Nanhay Singh, Bhoopesh Singh Bhati, R. S. Raw
10.5120/7240-0140

Nanhay Singh, Bhoopesh Singh Bhati, R. S. Raw . A Novel Digital Image Steganalysis Approach for Investigation. International Journal of Computer Applications. 47, 12 ( June 2012), 18-21. DOI=10.5120/7240-0140

@article{ 10.5120/7240-0140,
author = { Nanhay Singh, Bhoopesh Singh Bhati, R. S. Raw },
title = { A Novel Digital Image Steganalysis Approach for Investigation },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 12 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number12/7240-0140/ },
doi = { 10.5120/7240-0140 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:41:41.176805+05:30
%A Nanhay Singh
%A Bhoopesh Singh Bhati
%A R. S. Raw
%T A Novel Digital Image Steganalysis Approach for Investigation
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 12
%P 18-21
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the electronic world, one of the most appropriate "hosts" for steganography are digital images. Digital photographs are a commonly shared, sent, and exchanged throughout the Internet in the form of email attachments or web postings. However, current steganographic software available on the market has poor support for high-capacity image steganography. Even worse, some steganographic software actually distorts or degrades the appearance of cover images and therefore exposes the steganographic transformation the image has undergone. In this paper, we propose an algorithm for investigate digital image by steganalysis which is extended version of Modified Kekre Algorithm.

References
  1. H. B. Kekre, Archana Athawale and Pallavi N. Halarnkar 2009, "Polynomial Transformation To Improve Capacity Of Cover Image For Information Hiding In Multiple LSBs", International Journal of Engineering Research and Industrial Applications (IJERIA), Ascent Publications, Volume II, March 2009, Pune.
  2. Chen, W. J. , Chang, C. C. and Le, T. H. N. 2010, "High Payload Steganography Mechanism Using Hybrid Edge Detector," Expert Systems with Applications (ESWA 2010), vol. 37, no. pp. 3292-3301, 4th April 2010.
  3. H. B. Kekre, A. Athawale and P. N. Halarnkar 2009, "Performance Evaluation of Pixel Value Differencing and Kekre's Modified Algorithm for Information Hiding in Images". ACM International Conference on Advances in Computing, Communication and Control (ICAC3).
  4. Hamid, A. M. , M. L. M. Kiah, et al. 2009 "Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis. " International Journal of Engineering and Technology (IJET).
  5. L. M. Marvel, G. W. Hartwig, and C. Boncelet 2000, Compression-compatible fragile and semi-fragile tamper detection. In SPIE EI Photonics West, pages 131{139, San Jose, CA.
  6. Hussain, M. 2010, "Pixel intensity based high capacity data embedding method" International Conference on Information and Emerging Technologies (ICIET), Pp. 1 - 5.
  7. H. B. Kekre, Archana Athawale, Tanuja K. Sarode, Kalpana Sagvekar 2010, "Mixing Codebooks of LBG, KPE and KFCG Algorithms to Increase Capacity of Information Hiding", International Journal of Computer Applications, Number 3 - Article 4.
  8. N. M. Nasrabadi and R. King 1988, "Image coding using vector quantization: A review," IEEE Trans. Commun. , vol. 36, no. 8, pp. 957–971, Aug. 1988.
Index Terms

Computer Science
Information Sciences

Keywords

Steganalysis Digital Forensic Digital Image Steganalysis Extended Version Of Mka