CFP last date
20 January 2025
Reseach Article

Digital Image Steganalysis Schemes for Breaking Steganography

Published on August 2012 by Kanchan Patil, Ravindra Gupta, Gajendra Singh
International Conference on Advances in Communication and Computing Technologies 2012
Foundation of Computer Science USA
ICACACT - Number 1
August 2012
Authors: Kanchan Patil, Ravindra Gupta, Gajendra Singh
d9c10fab-0497-446f-b22d-ca302d1c8bc3

Kanchan Patil, Ravindra Gupta, Gajendra Singh . Digital Image Steganalysis Schemes for Breaking Steganography. International Conference on Advances in Communication and Computing Technologies 2012. ICACACT, 1 (August 2012), 11-15.

@article{
author = { Kanchan Patil, Ravindra Gupta, Gajendra Singh },
title = { Digital Image Steganalysis Schemes for Breaking Steganography },
journal = { International Conference on Advances in Communication and Computing Technologies 2012 },
issue_date = { August 2012 },
volume = { ICACACT },
number = { 1 },
month = { August },
year = { 2012 },
issn = 0975-8887,
pages = { 11-15 },
numpages = 5,
url = { /proceedings/icacact/number1/7967-1003/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Communication and Computing Technologies 2012
%A Kanchan Patil
%A Ravindra Gupta
%A Gajendra Singh
%T Digital Image Steganalysis Schemes for Breaking Steganography
%J International Conference on Advances in Communication and Computing Technologies 2012
%@ 0975-8887
%V ICACACT
%N 1
%P 11-15
%D 2012
%I International Journal of Computer Applications
Abstract

Steganography is the art and science of secret communication, aiming to conceal the existence of a communication. Steganography in the modern day sense of the word usually refers to information or a file that has been concealed inside a digital Image, Audio/Video file. Information Security is becoming an inseparable part of Data Communication through Internet. In order to address this Information Security, Steganography plays an important role. In contrast to steganography, steganalysis is focused on detecting, tracking, extracting, and modifying secret messages transmitted through a covert channel. The digital media steganalysis is divided into three domains, which are image steganalysis, audio steganalysis, and video steganalysis. In this paper we are discussing about the digital image steganalysis technique for breaking steganography algorithm.

References
  1. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. "Digital Watermarking and Steganography (Second Edition)", Morgan Kaufmann Publishers, ISBN: 978-0-12- 372585-1, 2007.
  2. A. Dennis and B. Wixom. "Systems Analysis & Design (Second Edition)", John Wiley & Sons, Inc. , ISBN: 04-7136815-6, 2003.
  3. S. Dumitrescu, X. Wu, and Z. Wang. "Detection of LSB Steganography via Sample Pair Analysis", Lecture Notes in Computer Science, vol. 2578, pp. 355-372, 2003.
  4. H. Farid. "Detecting Hidden Messages Using Higher-Order Statistical Models", Proceedings of the International Conference on Image Processing, Rochester, NY, USA, 2002.
  5. J. Fridrich, M. Goljan, and D. Hogea. "Attacking the OutGuess", Proceedings of the 3rd Information Hiding Workshop on Multimedia and Security 2002, Juan-les-Pins, France, 2002.
  6. J. Fridrich, M. Goljan, and D. Hogea. "Steganalysis of JPEG Images: Breaking the F5 Algorithm", Lecture Notes in Computer Science, vol. 2578, pp. 310-323, 2003.
  7. J. Fridrich. "Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes", Lecture Notes in Computer Science, vol. 3200, pp. 67-81, 2004.
  8. D. Fu, Y. Shi, D. Zou, and G. Xuan. "JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain", IEEE: 8th Workshop on Multimedia Signal Processing 2006, pp. 310-313, 2006.
  9. R. Gonzales, R. Woods, and S. Eddins. "Digital Image Processing Using MATLAB", Publishing House of Electronics Industry, ISBN: 7-5053-9876-8, 2004.
  10. N. Johnson and S. Jajodia. "Exploring Steganography: Seeing the Unseen", IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998.
  11. N. Johnson and S. Katzenbeisser "A Survey of steganographic techniques", Information Hiding, Artech House, pp. 43-78, 2000.
  12. A. Ker. "Improved Detection of LSB Steganography in Grayscale Images", Lecture Notes in Computer Science, vol. 3200, pp. 97-115, 2005. 117 REFERENCES
  13. K. Lee, A. Westfeld, and S. Lee. "Category Attack for LSB Steganalysis of JPEG Images", Lecture Notes in Computer Science, vol. 4283, pp. 35-48, 2006.
  14. M. Leivaditis. "Statistical Steganalysis", Master's thesis, Department of Computing, University of Surrey, 2007.
  15. N. Memon, I. Avcibas, and B. Sankur. "Steganalysis Based on Image Quality Metrics", emphIEEE: Security and Watermarking of Multimedia Contents, vol. 4314, 2001.
  16. C. Ming, Z. Ru, N. Xinxin, and Y. Yixian. "Analysis of Current Steganography Tools: Classifications & Features", Intelligent Information Hiding and Multimedia Signal Processing 2006, pp. 384-387, 2006.
  17. N. Provos and P. Honeyman. "Detecting Steganographic Content on the Internet", CITI Technical Report, vol. 1, pp. 1-11, 2001.
  18. N. Provos. "Defending Against Statistical Steganalysis", Proceedings of the 10th USENIX Security Symposium, vol. 10, pp. 323-335, 2001.
  19. N. Provos and P. Honeyman. "Hide and Seek: An Introduction to Steganography",IEEE: Security & Privacy, vol. 1, pp. 32-44, 2003.
  20. X. Quan, H. Zhang, and H. Dou. "Steganalysis for JPEG Images Based on StatisticalFeatures of Stego and Cover Images", Lecture Notes in Computer Science, vol. 4681.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Steganalysis Cryptography Cryptanalysis Ciphertext Image Cover Media