statistical steganalysis
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 3)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
A. S. Melman ◽  
◽  
P. O. Petrov ◽  
A. A. Shelupanov ◽  
A. V. Aristov ◽  
...  

Steganography allows to ensure the confidentiality of information by organizing covert data transmission channels. However, the effectiveness of steganographic information protection directly depends on the invisibility of a secret message, both for the human eye and for steganalysis methods. The paper proposes an approach that allows solving the problem of vulnerability of the popular QIM embedding method to statistical steganalysis. For this, it is proposed to use a variable quantization step, which is adaptively selected for each block of the JPEG cover image. The experimental results demonstrate an increase in the security level of steganographic embedding due to the application of the proposed approach.


Steganographic tools available in the internet and other commercial steganographic tools are preferred than customized steganographic tools developed from scratch by unlawful groups. Hence a clue regarding the steganographic tool deployed in the covert communication process can save time for the steganalyst in the crucial active steganalysis phase. Signature analysis can lead to success in targeted steganalysis but tool detection needs to be taken forward from a point with a suspicious stego image in hand with no additional details available. In such scenarios, statistical steganalysis comes to rescue but with issues to be addressed like huge dimensionality of feature sets and complex ensemble classifiers. This work accomplishes tool detection with a specific composite feature set identified to distinguish one stego tool from the others with a weighted decision function to enhance the role of the specific feature set when it votes for a particular class. A tool detection accuracy of 85.25% has been achieved simultaneously addressing feature set dimensionality and complexity of ensemble classifiers and a comparison with a benchmark procedure has been made


2018 ◽  
Vol 2018 ◽  
pp. 1-11
Author(s):  
Junhui He ◽  
Junxi Chen ◽  
Shichang Xiao ◽  
Xiaoyu Huang ◽  
Shaohua Tang

Steganography is a means of covert communication without revealing the occurrence and the real purpose of communication. The adaptive multirate wideband (AMR-WB) is a widely adapted format in mobile handsets and is also the recommended speech codec for VoLTE. In this paper, a novel AMR-WB speech steganography is proposed based on diameter-neighbor codebook partition algorithm. Different embedding capacity may be achieved by adjusting the iterative parameters during codebook division. The experimental results prove that the presented AMR-WB steganography may provide higher and flexible embedding capacity without inducing perceptible distortion compared with the state-of-the-art methods. With 48 iterations of cluster merging, twice the embedding capacity of complementary-neighbor-vertices-based embedding method may be obtained with a decrease of only around 2% in speech quality and much the same undetectability. Moreover, both the quality of stego speech and the security regarding statistical steganalysis are better than the recent speech steganography based on neighbor-index-division codebook partition.


2017 ◽  
Vol 68 (2) ◽  
pp. 117-124
Author(s):  
Martin Broda ◽  
Vladimír Hajduk ◽  
Dušan Levický

Abstract Novel image steganalytic method used to detection of secret message in static images is introduced in this paper. This method is based on statistical steganalysis (SS), where statistical vector is composed by 285 statistical features (parameters) extracted from DCT (Discrete Cosine Transformation) domain and 46 features extracted mainly from DWT (Discrete Wavelet Transformation) domain. Classification process was realized by Ensemble classifier that was helpful in reduction of computational and time complexity. Proposed steganalytic method was verified by detection of popular image steganographic methods. Novel method was also compared with existing steganalytic methods by overall detection accuracy of a secret message.


2016 ◽  
Vol 5 (4) ◽  
pp. 250-255 ◽  
Author(s):  
Amitava Nag ◽  
Soni Choudhary ◽  
Suryadip Basu ◽  
Subham Dawn

Sign in / Sign up

Export Citation Format

Share Document