Steganalysis Of The Image By Visual & Statistical Attacks

Monisha Sharma*, Swagota Bera**
* Associate Professor, Department of Electronics & Telecommunications, SSCET, Bhilai, India.
** Reader, Department of Electronics & Telecommunications, DSCET, Durg, India.
Periodicity:December - February'2011
DOI : https://doi.org/10.26634/jele.1.2.1372

Abstract

Steganography is the technique for hiding secret information in any ordinary image. Such image in which secret information is hidden is known as stego image. Where as Steganalysis is the reverse technique in which detection of the secret information is done in the stego images .In this paper, various visual and statistical attack techniques are implemented for the detection of the secret data in the stego image.

There are two ways of doing visual attack: 1. The technique in which detection is done by knowing the cover image without the knowledge of the coding algorithm for the formation of stego image. This technique can be named as visual attack: known cover image. 2. Another technique in which detection is applied to the incoming image without any information known as universal attack .This technique can be named as visual attack: Enhanced LSB technique. With these two techniques the area of hidden data is detected on the basis of the difference in visual texture of the stego image.

Similarly two ways of doing statistical attack: 1. The technique in which detection is done by comparing the stego & cover image in which first order statistical analysis is applied without the knowledge of the coding algorithm of the stego image. This technique can be named as histogram analysis. 2. Another technique in which detection is done by the image smoothening technique by using probability distribution function. This technique can be named as statistical attack: image smoothening. With these two technique based on the difference in statistical parameter of the stego image with cover image detection is done. Further the comparison of the techniques of both the attacks is done on the basis of time, memory requirement and information requirement.

Keywords

Steganography, Steganalysis, Cover Image, Stego Image, Cover Image, Attack, Least Significant Bit (LSB)

How to Cite this Article?

Monisha Sharma and Swagota Bera (2011). Steganalysis of the Image by Visual & Statistical Attacks. i-manager’s Journal on Electronics Engineering, 1(2), 48-55. https://doi.org/10.26634/jele.1.2.1372

References

[1]. R. J. Anderson, (1996). “Information Hiding: First International Workshop’Ed”., of Lecture Notes in Computer Science, Isaac Newton Institute, Cambridge, England, Springer-Verlag, Berlin, Germany. ISBN3-540- 61996-8, Vol. 1174, May.
[2]. Anonymous “What is Steganography?” www.techfaq. com/steganography.html.
[3]. Apostil Maile, Lasun Zhanna, Sardinas &, Yigit Yesenin, (2002). ”Image Encryption Using LSB/MSB“, Term Project, CpE-462, 04/30/02, April.
[4]. Anonymous “Miscellaneous Steganographic”, scien.stanford.edu/class/psyh221/projects/05/vvikram/ stegomisc.htm.
[5]. Jahne,Bernd,Digital Image Processing, (1993). “Concepts, Algorithms ,an Scientific Applications”, II nd ed.,Springer-Verlag.
[6]. R. B. Wolfgang, E. J. Delp, (1996). ”A watermark for digital Images”, In International Conference on Images Processing, Lausanne, Switzerland, IEEE, pp. 219–222, 16–19 Sept.
[7]. Mehdi Kharrazi1, Husrev T. Sencar., & Nasir Memon, (2004). "Image Steganography: Concepts and Practices” Department of Electrical and Computer Engineering,Department of Computer and Information Science Polytechnic University, Brooklyn, NY 11201, USA Fmehditaha, memong@isis.poly.edu, www.ims.nus.edu.sg/preprints/pdf.
[8]. Swagota Bera & Monisha Sharma, (2007). ” Survey on Steganographic Techniques & Steganalysis”, National Conference in Advances in Electronics & Telecommunication Technologia, vision-2020, IIM, 28-29, Pune, India, Oct.
[9]. Jiri Fridich, Rui Du,Meng long, (2000). “Steganalysis of LSB Encoding in Color Images”, Multimedia and Expo, and ICME 2000. IEEE International Conference, Vol. 3, pp 1279-1282, 30 July-2 Aug.
[10]. Tao zang & Xijian Ping, (2003). “Reliable Detection of LSB Steganography based on the Difference Image Histogram” Acoustics, speech and signal Processing 2003 Proceedings.(ICASSP International Conference pp-III- 545-8 Vol.3, 6-10 April.
[11]. Deshpande, Neeta, Kamalapur, Snehal Jacob, Daisy, (2006). ”Implementation of LSB Steganography and its Evaluation for various Bits” Digital Information Management, 2006 first International Conference, pp- 173-178, 6-6 Dec.
[12]. Monisha Sharma, Swagota Bera, etal, (2007). ”LSB Information Hiding Technique forFfixed Text”,National Conference, Technovision -2007,PP-198,SSCET,Bhilai,26- 27 Oct.
[13]. Monisha Sharma, Swagota Bera, etal, (2007). ”Variable Text Steganographic Techniques“, National Conference,"Technovision –2007" PP-198, SSCET, Bhilai, 26-27 Oct.
[14]. Gonzalez R. and Woods R., & S.L Eddins, (2004). ”The Digital image Processing using MATLAB” ,Pearson Education,Inc,
[15]. Tao zing & Xijian Ping & Mingwu Song, (2006). ”Detection of LSB Steganography based on Image Smoothness” Multimedia and Expo, 2006 IEEE International Conference, pp 1377-1380 July.
[16]. Monisha Sharma, Swagota Bera, (2010). “Steganalysis of Real Time Image by Statistical Attacks”, International Journal of Engineering Science and Technology, Vol. 2(9), 4397-4406.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.