Steganalysis System for Colour Steganographic Images using Three Different Techniques

被引:1
|
作者
Aljarf, Ahd [1 ]
Amin, Saad [1 ]
Al-Jarrah, Mudhafar M. [2 ]
机构
[1] Coventry Univ, Coventry, W Midlands, England
[2] Middel East Univ, Amman, Jordan
关键词
Image Steganography; Images Steganalysis; Stego Images; Security; Histogram Features;
D O I
10.1109/DeSE.2018.00068
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Various steganalysis methods have been introduced in the literature. These methods have been developed to combat specific steganography techniques and to detect data hidden in specific image formats. However, no single steganalysis method or tool can detect all types of steganography or support all available image formats. One of the problems is the need for a more general system to cover different types of image formats and the ability to detect a wider range of stego images, as blindly created by many steganography methods. This paper has presented an image steganalysis system to distinguished between clean and stego images using three different techniques. The first technique is the extraction of a large number of image features from the colour gradient co-occurrence matrix (CGCM). The second is the extraction of a number of histogram features by exploiting the histogram of difference image, which is usually a generalised Gaussian distribution centred at 0. Finally, the CGCM features and histogram features tested were merged to improve the performance of the system. Merging two different types of features allows one to take advantage of the beneficial properties of each in order to increase system ability in terms of detection. The experimental results demonstrate that the proposed system possesses reliable detection ability and accuracy. The proposed system is a more generalized detector than previous systems, covering a wider variety of stego image types and image formats. In addition, experimental results show that the proposed steganalysis system performed considerably better than some previous detection methods.
引用
收藏
页码:346 / 353
页数:8
相关论文
共 50 条
  • [1] Benchmarking steganographic and steganalysis techniques
    Kharrazi, I
    Sencar, HT
    Memon, N
    Security, Steganography, and Watermarking of Multimedia Contents VII, 2005, 5681 : 252 - 263
  • [2] Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
    Battikh, Dalia
    El Assad, Safwan
    Thang Manh Hoang
    Bakhache, Bassem
    Deforges, Olivier
    Khalil, Mohamad
    ENTROPY, 2019, 21 (08)
  • [3] A steganographic method for digital images robust to RS steganalysis
    Marçal, ARS
    Pereira, PR
    IMAGE ANALYSIS AND RECOGNITION, 2005, 3656 : 1192 - 1199
  • [4] Steganographic Techniques of Data Hiding using Digital Images
    Saha, Babloo
    Sharma, Shuchi
    DEFENCE SCIENCE JOURNAL, 2012, 62 (01) : 11 - 18
  • [5] Steganalysis of synthetic low-colour images
    Manoharan, Sathiamoorthy
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 784 - 788
  • [6] Steganalysis System for Colour Images Based on Merging the Colour Gradient Cooccurrence Matrix and Histogram of Difference Image
    Aljarf, Ahd
    Amin, Saad
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [7] Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis
    Chiew, Kang Leng
    Pieprzyk, Josef
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 341 - +
  • [8] A FPGA based Steganographic System Implementing a Modern Steganalysis Resistant LSB Algorithm
    Pathak, Kunjan
    Bansal, Manu
    DEFENCE SCIENCE JOURNAL, 2017, 67 (05) : 551 - 558
  • [9] Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    Fridrich, J
    INFORMATION HIDING, 2004, 3200 : 67 - 81
  • [10] Adaptive steganographic system for binary images using variable block embedding rate
    Agalan, Sos. S.
    Cherukurl, Ravindranath C.
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 1879 - +