Eigenvalues-based LSB steganalysis

Authors

Abstract:

So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a new analytical method for detecting stego images, which is robust against some of the embedding patterns designed specifically to foil steganalysis attempts. The proposed approach is based on the analysis of the eigenvalues of the cover correlation matrix used for the purpose of the study. Image cloud partitioning, vertical correlation function computation, constellation of the correlated data, and eigenvalues examination are the major challenging stages of this analysis method. The proposed method uses the LSB plane of images in spatial domain, extendable to transform domain, to detect low embedding rates-a major concern in the area of the LSB steganography. The simulation results based on deviation detection and rate estimation methods indicated that the proposed approach outperforms some well-known LSB steganalysis methods, specifically at low embedding rates.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Eigenvalues-based LSB Steganalysis

So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...

full text

Steganalysis: Detecting LSB Steganographic Techniques

Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis is used to detect messages often encrypted using secret key from stego images produced by steganography techniques. Recently lots of new and improved steganography techniques are developed and proposed by researchers which require robust steganalysis techniques to detect the stego images having minimum false alarm rat...

full text

Steganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram

In this paper we present a new accurate steganalysis method for the LSBreplacement steganography. The suggested method is based on the changes that occur in thehistogram of an image after the embedding of data. Every pair of neighboring bins of ahistogram are either inter-related or unrelated depending on whether embedding of a bit ofdata in the image could affect both bins or not. We show that...

full text

Steganalysis of LSB Replacement Using Parity-Aware Features

Detection of LSB replacement in digital images has received quite a bit of attention in the past ten years. In particular, structural detectors together with variants of Weighted Stego-image (WS) analysis have materialized as the most accurate. In this paper, we show that further surprisingly significant improvement is possible with machine– learning based detectors utilizing co-occurrences of ...

full text

Steganalysis of LSB matching for Images with High Noise

This paper proposed a new steganalysis method against least significant bit (LSB) matching for images with high noise component which is considered more difficult for steganalysis than images with low noise component. First we calculate the sum of curvature of images histogram as discriminative feature which will reduce after LSB matching. Then, the calibration mechanism is introduced to reduce...

full text

On steganalysis of random LSB embedding in continuous-tone images

In this paper we present an LSB steganalysis technique that can detect the existence of hidden messages that are randomly embedded in the least significant bits of natural continuous-tone images. The technique is inspired by recent work of Fridrich et al. [1] and just like [1], it can also precisely measure the length of the embedded message, even when the hidden message is very short relative ...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 4  issue 2

pages  97- 106

publication date 2012-07-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023