Steganalysis of LSB-Matching Steganography by Removing Most Significant Bit planes

被引:1
|
作者
Mehrabi, M. A. [1 ]
Aghaeinia, H. [1 ]
Abolghasemi, M. [1 ]
机构
[1] Amirkabir Univ Technol, Dept Elect Engn, Tehran 15914, Iran
关键词
Steganalysis; Steganography; Wavelet; LSB-Matching; Histogram;
D O I
10.1109/ISTEL.2008.4651396
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposed a new Steganalysis scheme of LSB-Matching steganography based on statistical moments of the DFT of histogram of multi-level wavelet subbands. Before deriving these wavelet subbands a pre-processing apply to images under the test. The pre-processing contains removing some most significant bit planes. Then we decompose the image using three-level Haar discrete wavelet transform (DWT) into 13 subbands (here the image itself is considered as the LL0 subband).The Fourier transform of each subband histogram, is calculated. Then it is divided into low and high frequency bands. The first three statistical moments of each band are selected to form a 78-dimensional feature vector for Steganalysis. Support Vector Machines (SVM) classifier is then used to discriminate between stego-images and innocent images.
引用
收藏
页码:731 / 734
页数:4
相关论文
共 37 条
  • [21] Modification Four Bits of Uncompressed Steganography using Least Significant Bit (LSB) Method
    Jasril
    Marzuki, Ismail
    Rahmat, Faisal
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2012, : 287 - 292
  • [22] Steganalysis of least significant bit matching based on image histogram and correlation
    Xia, Zhihua
    Wang, Shufang
    Sun, Xingming
    Wang, Baowei
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2013, 22 (03)
  • [23] Intensive Image Malware Analysis and Least Significant Bit Matching Steganalysis
    Kulkarni, Yogesh
    Gorkar, Anurag
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2309 - 2317
  • [24] High Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography
    Al-Afandy, Khalid A.
    El-Rabaie, El-Sayed
    Faragallah, Osama S.
    Elmhalawy, Ahmed
    El-Banby, Gh. M.
    [J]. 2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 400 - 404
  • [25] Multibit Least Significant Bit Matching: A Novel Approach to Image Steganography
    Essa, Almabrok
    Wu, Ian
    [J]. MULTIMODAL IMAGE EXPLOITATION AND LEARNING 2024, 2024, 13033
  • [27] Steganalysis of least significant bit matching using multi-order differences
    Xia, Zhihua
    Wang, Xinhui
    Sun, Xingming
    Wang, Baowei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1283 - 1291
  • [28] Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting
    Tan, Shunquan
    Li, Bin
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (06) : 336 - 339
  • [29] Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography
    Fan, MingQuan
    Liu, PeiPei
    Wang, HongXia
    Sun, XingMing
    [J]. TELECOMMUNICATION SYSTEMS, 2016, 63 (04) : 523 - 529
  • [30] Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography
    MingQuan Fan
    PeiPei Liu
    HongXia Wang
    XingMing Sun
    [J]. Telecommunication Systems, 2016, 63 : 523 - 529