Steganalysis of ±k Steganography based on Noncausal Linear Predictor

K. Manglem Singh, Yambem Jina Chanu, Themrichon Tuithung

Abstract


The paper proposes a novel steganalytic technique for ±k steganography
based on noncausal linear predictor using prediction coefficients obtained from the autocorrelation
matrix for a block of pixels in the stego-image. The image is divided into
equal-size blocks, autocorrelation matrix is found for the block, and the appropriate
noncausal linear prediction coefficients is selected to predict all pixels in that block. A
pixel is assumed to be embedded with message bit if the absolute difference between
the original pixel value and predicted pixel value exceeds the pre-defined threshold.
The effectiveness of the proposed technique is verified using different images.


Keywords


LSB embedding, noncausal linear predictor, RS analysis, steganalysis, steganography

Full Text:

PDF

References


Kawaguchi E.; Noda H.; Niimi M.; Eason R.O. (2003); A Model of Anonymous Covert Mailing System Using Steganographic Scheme, in Information modelling and knowledge bases, XIV, H. Yaakkola et al. (Eds), IOS Press, 81-85.

Wang H.; Wang S. (2004); Cyber Warfare Steganography vs Steganalysis, ACM Commun., 47: 76-82.
http://dx.doi.org/10.1145/1022594.1022597

Anderson R.J.; Pettitcolas, F.A.P. (1998); On The Limits Of Steganography, IEEE Journal on Selected Areas in Communication, 16(4): 474-481.

Zhang X.; Wang S. (2006); Dynamically Running Coding In Digital Watermarking, IEEE Signal Processing Letters, 13(3): 165-168.
http://dx.doi.org/10.1109/LSP.2005.862602

Provos N.; Honeyman P. (2003); Hide And Seek: An Introduction To Steganography, IEEE Security And Privacy, 1(3): 32-44.

Westfeld A.; Pfitzmann A. (1999); Attack On Steganographic Systems, Proc. Information Hiding - 3rd Intel Workshop, Springer Verlag, 61-76.

Fridrich J.; Goljan M. (2000); Practical Steganalysis Of Digital Images - State Of The Art, Security And Watermarking Of Multimedia Contents IV, E.J. Delp III and P.W. Wong, editors, Proc. of SPIE, 4675, 1-13.

Zhi L.; Fen S.A.; Xian Y.Y.A. (2003); LSB Steganography Detection Algorithm, Proc. IEEE ISPIMRC, 2780-2783.

LSB Steganography Detection Algorithm, Proc. IEEE ISPIMRC, 2780-2783.

Zhang T.; Ping X. (2003); Reliable Detection Of LSB Steganography Based On The Difference Image Histogram, IEEE International Conference on Acoustics, Speech, and Signal Processing, 3: 545-548.

Mielikainen J. (2006); LSB Matching Revisted, IEEE Signal Processing Letters, 13(5): 285-287.

Li X.; Yang B.; Cheng D.; Zeng T. (2009); A Generalization Of LSB Matching, IEEE Signal Processing Letters, 16(2): 69-72.
http://dx.doi.org/10.1109/LSP.2008.2008947

Fridrich J.; Soukal D.; Goljan M. (2005); Maximum Likehood Destination Of Secret Message Length Embedded Using PMK Steganography In Spatial Domain, Proc. Of IST/SPIE Electronic Imaging: Security, Steganography And Watermarking Of Multimedia Contents, VII, 5681, 595-606.

Balram N.; Moura M.F. (1996); Noncausal Predictive Image Codec, IEEE Trans. On Image Processing, 5(8): 1229-1242.
http://dx.doi.org/10.1109/83.506758

Schroeder M.R.; Atal B.S. (1985); Code-excited Linear Prediction (CELP): High Quality Speech At Very Low Bit Rates, IEEE Proc. ICASSP, 937-940.

Fang W.; Yagle A.E. (1994); Two-dimensional Linear Prediction And Spectral Estimation In Polar Raster, IEEE Trans. On Signal Processing, 42(3): 628-641.
http://dx.doi.org/10.1109/78.277855

Jain A.K. (1989); Fundamental of Digital Image Processing, Prentice Hall, Information and System Science Series.

Singh K. M. (2012); Vector Median Filter Based On Noncausal Linear Prediction For Detection Of Impulse Noise From Images, Inderscience International Journal of Computational Science and Engineering, 7(4): 345-355.
http://dx.doi.org/10.1504/IJCSE.2012.049729




DOI: https://doi.org/10.15837/ijccc.2014.5.704



Copyright (c) 2017 K. Manglem Singh, Yambem Jina Chanu, Themrichon Tuithung

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

CC-BY-NC  License for Website User

Articles published in IJCCC user license are protected by copyright.

Users can access, download, copy, translate the IJCCC articles for non-commercial purposes provided that users, but cannot redistribute, display or adapt:

  • Cite the article using an appropriate bibliographic citation: author(s), article title, journal, volume, issue, page numbers, year of publication, DOI, and the link to the definitive published version on IJCCC website;
  • Maintain the integrity of the IJCCC article;
  • Retain the copyright notices and links to these terms and conditions so it is clear to other users what can and what cannot be done with the  article;
  • Ensure that, for any content in the IJCCC article that is identified as belonging to a third party, any re-use complies with the copyright policies of that third party;
  • Any translations must prominently display the statement: "This is an unofficial translation of an article that appeared in IJCCC. Agora University  has not endorsed this translation."

This is a non commercial license where the use of published articles for commercial purposes is forbiden. 

Commercial purposes include: 

  • Copying or downloading IJCCC articles, or linking to such postings, for further redistribution, sale or licensing, for a fee;
  • Copying, downloading or posting by a site or service that incorporates advertising with such content;
  • The inclusion or incorporation of article content in other works or services (other than normal quotations with an appropriate citation) that is then available for sale or licensing, for a fee;
  • Use of IJCCC articles or article content (other than normal quotations with appropriate citation) by for-profit organizations for promotional purposes, whether for a fee or otherwise;
  • Use for the purposes of monetary reward by means of sale, resale, license, loan, transfer or other form of commercial exploitation;

    The licensor cannot revoke these freedoms as long as you follow the license terms.

[End of CC-BY-NC  License for Website User]


INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (IJCCC), With Emphasis on the Integration of Three Technologies (C & C & C),  ISSN 1841-9836.

IJCCC was founded in 2006,  at Agora University, by  Ioan DZITAC (Editor-in-Chief),  Florin Gheorghe FILIP (Editor-in-Chief), and  Misu-Jan MANOLESCU (Managing Editor).

Ethics: This journal is a member of, and subscribes to the principles of, the Committee on Publication Ethics (COPE).

Ioan  DZITAC (Editor-in-Chief) at COPE European Seminar, Bruxelles, 2015:

IJCCC is covered/indexed/abstracted in Science Citation Index Expanded (since vol.1(S),  2006); JCR2018: IF=1.585..

IJCCC is indexed in Scopus from 2008 (CiteScore2018 = 1.56):

Nomination by Elsevier for Journal Excellence Award Romania 2015 (SNIP2014 = 1.029): Elsevier/ Scopus

IJCCC was nominated by Elsevier for Journal Excellence Award - "Scopus Awards Romania 2015" (SNIP2014 = 1.029).

IJCCC is in Top 3 of 157 Romanian journals indexed by Scopus (in all fields) and No.1 in Computer Science field by Elsevier/ Scopus.

 

 Impact Factor in JCR2018 (Clarivate Analytics/SCI Expanded/ISI Web of Science): IF=1.585 (Q3). Scopus: CiteScore2018=1.56 (Q2); Editors-in-Chief: Ioan DZITAC & Florin Gheorghe FILIP.