Detecting Hidden Data Using Higher Order Empirical Transition Matrix

Swagota Bera*, Monisha Sharma**
* Associate Professor, Department of Electronics and Telecommunication, Shri Shankaracharya Institute of Engineering & Technology, Durg.
** Professor, Department of Electronics and Telecommunication, Shri Shankaracharya College of Engineering and Technology, Bhilai.
Periodicity:April - June'2014
DOI : https://doi.org/10.26634/jse.8.4.3047

Abstract

Steganalysis is the art of detecting the presence of hidden data in any common data. Universal steganalysis is general class of steganalysis techniques which can be implemented with any steganographic embedding algorithm, even an unknown algorithm. In this paper, the detection technique is based on the fact that there occurs variation in the feature vectors in an image before and after hiding. The whole image is divided in blocks of 8x8. There exists interdependency among the pixel values within the image blocks known as intrablock dependency. The statistical feature is calculated on the basis of the transition in the pixel value. The features used here is the transition probability matrix calculated by using the markov statistical process. If the transition probability matrix is found out by considering the transition in the pixel value of second pixel w.r.t to first one and so on, then it is known as one step transition probability matrix. If the transition probability matrix is found out by considering the transition in the pixel value of third pixel w.r.t to first and second one simultaneously and so on then it is known as two step transition probability matrix. Further the values of the quantized DCT pixel is restricted in -4 to 4 values which is known as thresholding. This way a feature set is calculated with optimum dimension for the classification between the cover image and the stego image.

Keywords

Steganography, Steganalysis, Cover Image, Stego Image, Cover Image, Attack, Least Significant Bit (LSB), Discrete Cosine Transform (DCT).

How to Cite this Article?

Bera,S., and Sharma,M. (2014). Detecting Hidden Data Using Higher Order Empirical Transition Matrix. i-manager’s Journal on Software Engineering, 8(4), 9-16. https://doi.org/10.26634/jse.8.4.3047

References

[1]. Kelly, J. (2001). Terror groups hide behind web encryption, USA Today, 2 May 2001, Retrieved from http:// www.usatoday. com/life/cyber/tech/2001- 02- 05- binladen.htm.
[2]. Anonymous, What is steganography?. Retrieved from www.tech-faq.com/steganography.html.
[3]. Maile, A., Zhanna, L., Ana, S., & Yasemin, Y. (2002, April). Image Encryption Using LSB/MSB.Term Project, CpE- 462.
[4]. Anonymus. Miscellaneous Steganographic. Retrived from scien.stanford.edu/class/psyh221/project/05/ vvikram/stegomisc.htm.
[5]. Bernd. J. (II Ed.). (1993). Concepts, Algorithms, an Scientific Applications. Digital Image processing. Springer-Verlag.
[6]. Wolfgang, R.B., Delp, E.J. (1996). A watermark for digital Image. (16-19 Sep1996). International Conference on Images Processing, Lausanne, Switzerland. IEEE, pp.219–222.
[7]. Kharrazi, M., Sencar, T.H., & Memon, N., (2002). Image Steganography: Concepts and Practices. Department of Computer and Information Science Polytechnic University, Brooklyn, NY 11201, USA.
[8]. Bera, S. & Sharma, M. (2007). Survey on Steganographic Techniques & Steganalysis. (2007, 28-29 Oct). National Conference in Advances in electronics & Telecommunication Technologia. vision- 2020.
[9]. Bera, S. & Sharma, M. Steganalysis of Real Time Image by Statistical Attacks.(2010). International Journal of Engineering Science and Technology, Vol. 2(9), pp.4397- 4406.
[10]. Monisha Sharma and Swagota Bera (2011). Steganalysis of the Image by Visual & Statistical Attacks, imanager’s Journal on Electronics Engineering. 1(2) Dec- Feb, 2011 Print ISSN: 2229-7286, E-ISSN: 2249-0760, pp,48-55.
[11]. Bera, S. & Sharma, M. (2012). A Review on blind still image Steganalysis Techniques Using Features Extraction and Pattern Classification Method. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), ISSN:2231-3117(Online);2231- 3605(print). Vol.2(3), pp.117-135.
[12]. Shi. Y. Q., Chen. C. and Chen. W. (2007). A markov process based approach to effective attacking JPEG steganography. Lecture Notes in Computer Science, Information Hiding, Springer. 4437: pp.249–264.
[13]. Kumar M., (2012). Steganography and Steganalysis of Joint Picture Expert Group (JPEG) Images. Ph.D. Thesis, University of Florida.
[14]. Andrews Ker ,K. (2001). Retrieved from http://www.outguess.org
[15]. Latham, A. (2001). Retrived from http://wwwrn.inf.tudresden. de/~westfeld/f5.html.
[16]. A. Latham. (1999, August). Jp hide&seek. [Online]. Available: http://linux01.gwdg.de/latham/stego.html
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.