Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index

نویسندگان

  • Veena H. Bhat
  • S. Krishna
  • P. Deepa Shenoy
  • K. R. Venugopal
  • Lalit M. Patnaik
چکیده

Targeted steganalysis aims at detecting hidden data embedded by a particular algorithm without any knowledge of the ‘cover’ image. In this paper we propose a novel approach for detecting Perturbed Quantization Steganography (PQ) by HFS (Huffman FR index Steganalysis) algorithm using a combination of Huffman Bit Code Length (HBCL) Statistics and File size to Resolution ratio (FR Index) which is not yet explored by steganalysts. JPEG images spanning a wide range of sizes, resolutions, textures and quality are used to test the performance of the model. In this work we evaluate the model against several classifiers like Artificial Neural Networks (ANN), k-Nearest Neighbors (k-NN), Random Forests (RF) and Support Vector Machines (SVM) for steganalysis. Experiments conducted prove that the proposed HFS algorithm can detect PQ of several embedding rates with a better accuracy compared to the existing attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of perturbed quantization (PQ) steganography based on empirical matrix

Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...

متن کامل

Steganalysis of YASS Using Huffman Length Statistics

This work proposes two main contributions to statistical steganalysis of Yet Another Steganographic Scheme (YASS) in JPEG images. Firstly, this work presents a reliable blind steganalysis technique to predict YASS which is one of recent and least statistically detectable embedding scheme using only five features, four Huffman length statistics (H) and the ratio of file size to resolution (FR In...

متن کامل

Benchmarking steganographic and steganalysis techniques

There have been a number of steganography embedding techniques proposed over the past few years. In turn the development of these techniques have led to an increased interest in steganalysis techniques. More specifically Universal steganalysis techniques have become more attractive since they work independently of the embedding technique. In this work, our goal is to compare a number of univers...

متن کامل

Nonparametric steganalysis of QIM data hiding using approximate entropy

This paper proposes a nonparametric steganalysis method for quantization index modulation (QIM) based steganography. The proposed steganalysis method uses irregularity (or randomness) in the test-image to distinguish between the coverand the stego-image. We have shown that plain-quantization (quantization without message embedding) induces regularity in the resulting quantized-image; whereas me...

متن کامل

Estimating the Redundancy Factor for RA-encoded sequences and also Studying Steganalysis Performance of YASS

Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform (DCT) domain in randomly chosen image blocks. To maximize the embedding rate for a given image and a specified attack channel, the redundancy factor used by the repeat-accumulate (RA) code based error correction frame...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011