Steganalysis of ±k Steganography based on Noncausal Linear Predictor
Keywords:
LSB embedding, noncausal linear predictor, RS analysis, steganalysis, steganographyAbstract
The paper proposes a novel steganalytic technique for ±k steganography
based on noncausal linear predictor using prediction coefficients obtained from the autocorrelation
matrix for a block of pixels in the stego-image. The image is divided into
equal-size blocks, autocorrelation matrix is found for the block, and the appropriate
noncausal linear prediction coefficients is selected to predict all pixels in that block. A
pixel is assumed to be embedded with message bit if the absolute difference between
the original pixel value and predicted pixel value exceeds the pre-defined threshold.
The effectiveness of the proposed technique is verified using different images.
References
Kawaguchi E.; Noda H.; Niimi M.; Eason R.O. (2003); A Model of Anonymous Covert Mailing System Using Steganographic Scheme, in Information modelling and knowledge bases, XIV, H. Yaakkola et al. (Eds), IOS Press, 81-85.
Wang H.; Wang S. (2004); Cyber Warfare Steganography vs Steganalysis, ACM Commun., 47: 76-82. http://dx.doi.org/10.1145/1022594.1022597
Anderson R.J.; Pettitcolas, F.A.P. (1998); On The Limits Of Steganography, IEEE Journal on Selected Areas in Communication, 16(4): 474-481.
Zhang X.; Wang S. (2006); Dynamically Running Coding In Digital Watermarking, IEEE Signal Processing Letters, 13(3): 165-168. http://dx.doi.org/10.1109/LSP.2005.862602
Provos N.; Honeyman P. (2003); Hide And Seek: An Introduction To Steganography, IEEE Security And Privacy, 1(3): 32-44.
Westfeld A.; Pfitzmann A. (1999); Attack On Steganographic Systems, Proc. Information Hiding - 3rd Intel Workshop, Springer Verlag, 61-76.
Fridrich J.; Goljan M. (2000); Practical Steganalysis Of Digital Images - State Of The Art, Security And Watermarking Of Multimedia Contents IV, E.J. Delp III and P.W. Wong, editors, Proc. of SPIE, 4675, 1-13.
Zhi L.; Fen S.A.; Xian Y.Y.A. (2003); LSB Steganography Detection Algorithm, Proc. IEEE ISPIMRC, 2780-2783.
LSB Steganography Detection Algorithm, Proc. IEEE ISPIMRC, 2780-2783.
Zhang T.; Ping X. (2003); Reliable Detection Of LSB Steganography Based On The Difference Image Histogram, IEEE International Conference on Acoustics, Speech, and Signal Processing, 3: 545-548.
Mielikainen J. (2006); LSB Matching Revisted, IEEE Signal Processing Letters, 13(5): 285-287.
Li X.; Yang B.; Cheng D.; Zeng T. (2009); A Generalization Of LSB Matching, IEEE Signal Processing Letters, 16(2): 69-72. http://dx.doi.org/10.1109/LSP.2008.2008947
Fridrich J.; Soukal D.; Goljan M. (2005); Maximum Likehood Destination Of Secret Message Length Embedded Using PMK Steganography In Spatial Domain, Proc. Of IST/SPIE Electronic Imaging: Security, Steganography And Watermarking Of Multimedia Contents, VII, 5681, 595-606.
Balram N.; Moura M.F. (1996); Noncausal Predictive Image Codec, IEEE Trans. On Image Processing, 5(8): 1229-1242. http://dx.doi.org/10.1109/83.506758
Schroeder M.R.; Atal B.S. (1985); Code-excited Linear Prediction (CELP): High Quality Speech At Very Low Bit Rates, IEEE Proc. ICASSP, 937-940.
Fang W.; Yagle A.E. (1994); Two-dimensional Linear Prediction And Spectral Estimation In Polar Raster, IEEE Trans. On Signal Processing, 42(3): 628-641. http://dx.doi.org/10.1109/78.277855
Jain A.K. (1989); Fundamental of Digital Image Processing, Prentice Hall, Information and System Science Series.
Singh K. M. (2012); Vector Median Filter Based On Noncausal Linear Prediction For Detection Of Impulse Noise From Images, Inderscience International Journal of Computational Science and Engineering, 7(4): 345-355. http://dx.doi.org/10.1504/IJCSE.2012.049729
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.