Skip to main content
Top

2019 | OriginalPaper | Chapter

Performance Evaluation of Features Extracted from DWT Domain

Authors : Manisha Saini, Rita Chhikara

Published in: Software Engineering

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The key task of Steganalyzer is to identify if a carrier is carrying hidden information or not. Blind Steganalysis can be tackled as two-class pattern recognition problem. In this paper, we have extracted two sets of feature vectors from discrete wavelet transformation domain of images to improve performance of a Steganalyzer. The features extracted are histogram features with three bins 5, 10, and 15 and Markov features with five threshold values 2, 3, 4, 5, 6, respectively. The performance of two feature sets is compared among themselves and with existing Farid discrete wavelet transformation features based on parameter classification accuracy using neural network back-propagation classifier. In this paper, we are using three Steganography algorithms outguess, nsF5 and PQ with various embedding capacities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Choudhary, K.: Image steganography and global terrorism. Glob. Secur. Stud. 3(4), 115–135 (2012) Choudhary, K.: Image steganography and global terrorism. Glob. Secur. Stud. 3(4), 115–135 (2012)
2.
go back to reference Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Processing 90, pp. 727–752 (2010)CrossRef Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Processing 90, pp. 727–752 (2010)CrossRef
3.
go back to reference Johnson, N.F., Jajodia, S.: Steganalysis the investigation of hidden information. In: Proceedings of the IEEE Information Technology Conference, Syracuse, NY, pp. 113–116 (1998) Johnson, N.F., Jajodia, S.: Steganalysis the investigation of hidden information. In: Proceedings of the IEEE Information Technology Conference, Syracuse, NY, pp. 113–116 (1998)
4.
go back to reference Nissar, A., Mir, A.H.: Classification of steganalysis techniques: a study. In: Digital Signal Processing, vol. 20, pp. 1758–1770 (2010)CrossRef Nissar, A., Mir, A.H.: Classification of steganalysis techniques: a study. In: Digital Signal Processing, vol. 20, pp. 1758–1770 (2010)CrossRef
5.
go back to reference Farid, H.: Detecting hidden messages using higher-order statistical models. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), vol. 2, pp. 905–908 (2002) Farid, H.: Detecting hidden messages using higher-order statistical models. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), vol. 2, pp. 905–908 (2002)
7.
go back to reference Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of the ACM Workshop on Multimedia & Security, pp. 3–14 (2007) Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of the ACM Workshop on Multimedia & Security, pp. 3–14 (2007)
8.
go back to reference Fridrich, J., Gojan, M., Soukal, D.: Perturbed quantization steganography. J. Multimedia Syst. 11, 98–107 (2005)CrossRef Fridrich, J., Gojan, M., Soukal, D.: Perturbed quantization steganography. J. Multimedia Syst. 11, 98–107 (2005)CrossRef
9.
go back to reference Ali, S.K., Beijie, Z.: Analysis and classification of remote sensing by using wavelet transform and neural network. In: IEEE 2008 International Conference on Computer Science and Software Engineering, pp. 963–966 (2008) Ali, S.K., Beijie, Z.: Analysis and classification of remote sensing by using wavelet transform and neural network. In: IEEE 2008 International Conference on Computer Science and Software Engineering, pp. 963–966 (2008)
10.
go back to reference Shimazaki, H., Shinomoto, S.: A method for selecting the bin size of a time histogram. Neural Comput. 19(6), 1503–1527 (2007)MathSciNetCrossRef Shimazaki, H., Shinomoto, S.: A method for selecting the bin size of a time histogram. Neural Comput. 19(6), 1503–1527 (2007)MathSciNetCrossRef
11.
go back to reference Saini, M., Chhikara, R.: DWT feature based blind image steganalysis using neural network classifier. Int. J. Eng. Res. Technol. 4(04), 776–782 (2015) Saini, M., Chhikara, R.: DWT feature based blind image steganalysis using neural network classifier. Int. J. Eng. Res. Technol. 4(04), 776–782 (2015)
12.
go back to reference Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of the SPIE, pp. 03–04 (2007) Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of the SPIE, pp. 03–04 (2007)
13.
go back to reference Bakhshandeh, S., Bakhshande, F., Aliyar, M.: Steganalysis algorithm based on cellular automata transform and neural network. In: Proceedings of the IEEE International Conference on Information Security and Cryptology (ISCISC), pp. 1–5 (2013) Bakhshandeh, S., Bakhshande, F., Aliyar, M.: Steganalysis algorithm based on cellular automata transform and neural network. In: Proceedings of the IEEE International Conference on Information Security and Cryptology (ISCISC), pp. 1–5 (2013)
Metadata
Title
Performance Evaluation of Features Extracted from DWT Domain
Authors
Manisha Saini
Rita Chhikara
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8848-3_25

Premium Partner