Detection of perturbed quantization (PQ) steganography based on empirical matrix

Authors

Abstract:

Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the empirical matrix. The proposed features can be exploited within an empirical matrix of DCT coefficients which some most significant bit planes were deleted. We obtain four empirical matrices and fuse resulted features from these matrices which have been employed for steganalysis. This technique can detect PQ embedding on stego images with 77 percent detection accuracy on mixed embedding rates between 0.05 _ 0.4 bits per non-zero DCT AC coefficients (BPNZC). Comparing the results, we also show that the detection rates are effectively comparable with respect to current steganalysis techniques for PQ steganography.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Detection of PerturbedQuantization (PQ) SteganographyBased on EmpiricalMatrix

A B S T R A C T Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bitplanes. For steganalysis of PQ, we propose features extrac...

full text

Quantization Table Based Steganography System

Steganography is an important area of research in recent years involving a number of applications. Steganography is the process of hiding one file inside another such that others can neither identify the meaning of the embedded object, nor even recognize its existence. One of the most Common methods of implementation is Least Significant Bit (LSB) Insertion in which the least significant bit of...

full text

image cover selection for steganography based on run length matrix

in this paper, we proposed a data-hiding scheme based on run length matrix. in a previously proposed method, a technique based on texture classification was introduced where four statically features extracted from run length matrix; then best cover images are selected based on these features. using appropriate features for comparing images from undetectability viewpoint, guarantees, less detect...

full text

Effective Steganography Detection Based On Data Compression

(The main idea: The compression used for stegotext detection. It is known that an embedding message breaks statistical structure of the container, increasing its entropy. Consequently, the full container will compress worse than empty. Let us consider the example: A, B empty and full container respectively. Table 1: Container size before and after compression container.. container size before c...

full text

Edge Detection with Hessian Matrix Property Based on Wavelet Transform

In this paper, we present an edge detection method based on wavelet transform and Hessian matrix of image at each pixel. Many methods which based on wavelet transform, use wavelet transform to approximate the gradient of image and detect edges by searching the modulus maximum of gradient vectors. In our scheme, we use wavelet transform to approximate Hessian matrix of image at each pixel, too. ...

full text

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 2  issue 2

pages  119- 128

publication date 2010-07-13

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023