A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis
Bibek Ranjan Ghosh1
Section:Research Paper, Product Type: Journal Paper
Volume-10 ,
Issue-4 , Page no. 1-5, Apr-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i4.15
Online published on Apr 30, 2022
Copyright © Bibek Ranjan Ghosh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Bibek Ranjan Ghosh, “A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis,” International Journal of Computer Sciences and Engineering, Vol.10, Issue.4, pp.1-5, 2022.
MLA Style Citation: Bibek Ranjan Ghosh "A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis." International Journal of Computer Sciences and Engineering 10.4 (2022): 1-5.
APA Style Citation: Bibek Ranjan Ghosh, (2022). A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis. International Journal of Computer Sciences and Engineering, 10(4), 1-5.
BibTex Style Citation:
@article{Ghosh_2022,
author = {Bibek Ranjan Ghosh},
title = {A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2022},
volume = {10},
Issue = {4},
month = {4},
year = {2022},
issn = {2347-2693},
pages = {1-5},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5455},
doi = {https://doi.org/10.26438/ijcse/v10i4.15}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v10i4.15}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5455
TI - A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis
T2 - International Journal of Computer Sciences and Engineering
AU - Bibek Ranjan Ghosh
PY - 2022
DA - 2022/04/30
PB - IJCSE, Indore, INDIA
SP - 1-5
IS - 4
VL - 10
SN - 2347-2693
ER -
VIEWS | XML | |
448 | 330 downloads | 130 downloads |
Abstract
Image steganography is used as a covert communication technique which hides secret data in cover image intelligently so that it is visually imperceptible. This is often used by individual or organization with bad intent to harm people, organization or society. Steganalysis technique is used to break these systems to extract the secret information, reveal such covert communication and thwart imminent threat. Steganalytic techniques can be broadly classified as targeted or blind. In the former the knowledge of steganographic system used should be known and the latter adopts a more general approach where no knowledge of the process used to hide data is required. This paper studies some well-established statistical methods of targeted steganalysis and gray level co-occurrence matrix based blind steganalysis and compare their performances.
Key-Words / Index Term
RS, Sample pair analysis, Chi-squared, Gray level co-occurrence matrix
References
[1] R.J. Anderson, F. A Petitcolas, “On the Limits of Steganography”, IEEE Journal on Selected Areas in Communications, Vol.16, Issue.4,pp.474-481,1998.
[2] B. Li, J. He, J. Huang, Y. Q. Shi, "A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing., Vol. 2, Issue.2 ,pp.142-172, 2011.
[3] A. Nissar, A.H. Mir, “Classification of Steganalysis Techniques. A Study”, Digital Signal Processing, Vol. 20, Issue.6, pp.1758-1770, 2010.
[4] S. Pathak, R. Roy, S. Changder, “Performance Analysis of Image Steganalysis Techniques and Future Research Directives”, International Journal of Information and Computer Security. Vol.10, Issue.1, pp.1-24, 2018.
[5] A. Westfeld, A. Pfitzmann, “Attacks on Steganographic Systems”,In Lecture Notes in Computer Science, Vol.1768, Springer, Berlin, pp. 61-76, 2000.
[6] J. Fridrich ,M. Goljan, R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images”, In the Proceedings of the Workshop on Multimedia and Security: New Challenges, ACM, New York, pp. 27-30,2001.
[7] S. Dumitrescu, X. Wu, Z.Wang, “Detection of LSB Steganography via Sample Pair Analysis”, IEEE Transactions on Signal Processing, Vol.51, Issue.7, pp. 1995-2007, 2003.
[8] P. Lu, X. Luo, Q. Tang, L. Shen, “An Improved Sample Pairs Method for Detection of LSB Embedding.”, In Lecture Notes in Computer Science, Vol. 3200, Springer, Berlin, pp.116-127,2004.
[9] R. M. Haralick, K. Shanmugam, I. H. Dinstein,"Textural Features for Image Classification", IEEE Transactions On Systems, Man, and Cybernetics Vol.3, Issue. 6 , pp. 610-621, 1973.
[10] R. M. Haralick, "Statistical And Structural Approaches To Texture," Proceedings of the IEEE, vol. 67, no. 5, pp. 786-804, 1979.
[11] K. Sullivan, U. Madhow, S. Chandrasekaran , B. S. Manjunath, "Steganalysis for Markov Cover Data With Applications to Images", IEEE Transactions on Information Forensics and Security Vol.1, Issue. 2, pp. 275-287, 2006.
[12] L. Nanni, S. Brahnam, S. Ghidoni, E. Menegatti, T. Barrier, "Different Approaches for Extracting Information from the Co-Occurrence Matrix.," PloS one Vol.8, Issue. 12, pp. 1-9, 2013.
[13] A.D. Ker,”Quantitative Evaluation of Pairs and RS Steganalysis”. In the Proceddings of SPIE 5306. Security, Steganography, and Watermarking of Multimedia Contents VI, Vol. 5306,SPIE,San Jose, pp. 83-97,2004.
[14] H. Zhang, H. Tang, “A Novel Image Steganography Algorithm Against Statistical Analysis.” In the Proceedings of International Conference on Machine Learning and Cybernetics, IEEE, Hong Kong, pp. 3884-3888, 2007.
[15] X. Luo,F. Liu,P. Lu, “A LSB Steganography Approach Against Pixels Sample Pairs Steganalysis”, International Journal of Innovative Computing, Information and Control, Vol.3, Issue.3, pp. 575-588,2007.
[16] S. Manoharan, “An Empirical Analysis of RS Steganalysis” In the Proceedings of the Third International Conference on Internet Monitoring and Protection, IEEE, Bucharest, pp.172-177, 2008.
[17] T. Qian, S. Manoharan, “A Comparative Review of Steganalysis Techniques”, In the Proceedings of 2nd International Conference on Information Science and Security (ICISS), IEEE, Seoul,pp.1-4, 2015.
[18] N. Prokhozhev, , O. Mikhailichenko, , A. Sivachev, , D. Bashmakov, A. Korobeynikov, “Passive Steganalysis Evaluation: Reliabilities of Modern Quantitative Steganalysis Algorithms”, In the Proceedings of the First International Scientific Conference Intelligent Information Technologies for Industry (IITI’16). Advances in Intelligent Systems and Computing, Vol. 451. Springer, Cham, pp. 89-94, 2016.
[19] R. A. Solodukha, I. V. Atlasov, “Modification of RS-Steganalysis to Attacks Based on Known Stego-Program”, In the Proceedings of Second Russia and Pacific Conference on Computer Technology and Applications (RPC), IEEE, Vladivostok, pp. 176-179, 2017.
[20] N. Mewalal, W. S. Leung “Improving Hidden Message Extraction Using LSB Steganalysis Techniques”, In the Proceedings of International Conference on Information Science and Applications, Lecture Notes in Electrical Engineering. Vol. 514, Springer, Singapore, pp. 273-284, 2018.
[21] W. Lin, T. Lai, C. Chou “Chi-Square-based Steganalysis Method Against Modified Pixel-Value Differencing Steganography”, Arabian Journal for Science and Engineering, Vol.46, Issue.9,pp. 8525-8533,2021.
[22] H. B. Kekre, A. A. Athawale, S. A. Patki, "Improved Steganalysis of LSB Embedded Color Images Based On Stego-Sensitive Threshold Close Color Pair Signature", International Journal of Engineering Science and Technology (IJEST), Vol. 3, Issue. 2, pp. 836-842,2011.
[23] H. B. Kekre, A. A. Athawale and S. A. Patki., "Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix", International Journal of image processing (IJIP), Vol. 5, Issue. 1, pp. 36-45, 2011.
[24] Z. Xia, X. Wang, X. Sun,B. Wang, "Steganalysis of Least Significant Bit Matching using Multi?Order Difference," Security and Communication Networks, Vol. 7, Issue. 8, pp. 1283-1291, 2014.
[25] A. Anjum, S. Islam, "LSB Steganalysis Using Modified Weighted Stego-Image Method," In the Proceedings of the 3rd International Conference on Signal Processing and Integrated Networks (SPIN), IEEE,Noida, pp. 630-635,2016.
[26] O. J. Sandoval, M. C. Hernandez, G. S. Perez, K. T. Medina, H. P. Meana, M. N. Miyatake, "Compact Image Steganalysis For LSB-Matching Steganography", In the Proceedings of the 5th International Workshop on Biometrics and Forensics (IWBF), IEEE, Coventry, pp. 1-6,2017.
[27] Z. Sun, M. Hui, C. Guan, "Steganalysis Based on Co-occurrence Matrix of Differential Image", In the Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, Harbin, pp. 1097-1100, 2008.
[28] S. Ghanbari, M. Keshtegary, N. Ghanbari,, "New Steganalysis Method using GLCM and Neural Network", International Journal of Computer Applications Vol.42, Issue. 2, pp. 45-50, 2012.
[29] I. A. Khalifa, S. R. Zeebaree, M. Ata?, F. M. Khalifa, "Image Steganalysis In Frequency Domain Using Co-Occurrence Matrix and BPNN" Science Journal of University of Zakho Vol. 7, Issue. 1, pp. 27-32, 2019.
[30] J. Fridrich, M. Goljan, D. Soukal, “Higher-Order Statistical Steganalysis of Palette Images”, In the Proceedings of SPIE 5020, Security and Watermarking of Multimedia Contents V, SPIE , Santa Clara, pp. 178 - 190, 2003.