92 research outputs found

    Universal Image Steganalytic Method

    Get PDF
    In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting well-known and also newly developed steganographic methods. The steganalytic model is trained by MHF-DZ steganographic algorithm previously designed by the same authors. The calibration technique with the Feature Based Steganalysis (FBS) was employed in order to identify statistical changes caused by embedding a secret data into original image. The steganalyzer concept utilizes Support Vector Machine (SVM) classification for training a model that is later used by the same steganalyzer in order to identify between a clean (cover) and steganographic image. The aim of the paper was to analyze the variety in accuracy of detection results (ACR) while detecting testing steganographic algorithms as F5, Outguess, Model Based Steganography without deblocking, JP Hide&Seek which represent the generally used steganographic tools. The comparison of four feature vectors with different lengths FBS (22), FBS (66) FBS(274) and FBS(285) shows promising results of proposed universal steganalytic method comparing to binary methods

    TRIGGER-CONTAINERS IN LINGUISTIC STEGANOGRAPHY

    Get PDF
    The article deals with the new term “trigger-container” in linguistic steganography. The necessity to introduce this term was brought about by the creation a unique kind of steganographic containers of minimal possible size that would allow for insertion of confidential information into Russian written texts. The introduction of “trigger-containers” is intrinsically interwoven with our ongoing systematic attempt to create a linguistic steganographic term apparatus of describing sense information protection on the basis of linguistic experimentation with a strong scientific foundation. Concurrent use of the proposed steganographic term in praxis in conjunction with the data yielding from linguistic experiments would allow to create a method for concealing sensitive information in Russian written texts that is simultaneously highly secure against automated and expert-driven visual steganalysis as is not dependent on the usage of cryptographic cyphers. The novelty of this research is based on the introduction of the new term “trigger-containers”, which describes a phenomenon that is not touched upon in other research. The goal of the paper is, likewise, the introduction of the term, which allows one to describe the proper theoretical basis of qualitative research in the field of linguistic steganography. We introduce the term “trigger container” which allows to create the basis for our method of conducting perceptive experimental research in the field of linguistic steganography

    Survey of the Use of Steganography over the Internet

    Get PDF
    This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof. Niels Provos and Peter Honeyman conducted an extensive Internet search where they analyzed over 2 million images and didn’t find a single hidden image. After this study the scientific community was divided: some believed that Niels Provos and Peter Honeyman was conclusive enough other did not. This paper describes what Steganography is and what can be used for, various Steganography techniques and also presents the studies made regarding the use of Steganography on the Internet.Steganography, Secret Communication, Information Hiding, Cryptography

    Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel

    Get PDF
    In this paper we present a new technique to enhance embedding capacity of a steganographic channel by preprocessing the secret data. Here we limit ourselves to textual data only. By preprocessing we don't mean compression; secret data can be compressed after it has been preprocessed by our technique. We introduce the concept of Scrambled Letters, User Defined Codes and the Dictionary Module to explain our technique. All these concepts when applied together give a phenomenal embedding capacity. Theoretical results show that we can achieve at least 25-30% increase in embedding capacity. We introduce two techniques, one in which we only apply the dictionary concept while the other in which we use the user defined codes along with the dictionary approach. The former technique is generic and can be applied to any form of textual data, whereas the latter can only be applied to pure text, i.e. without any form of graphics like images or graphs. Once the data is preprocessed by using our technique it can be easily embedded in any steganographic cover medium by using any steganographic algorithm

    Efficient Parallel Feature Selection for Steganography Problems

    Get PDF
    The steganography problem consists of the identification of images hiding a secret message, which cannot be seen by visual inspection. This problem is nowadays becoming more and more important since the World Wide Web contains a large amount of images, which may be carrying a secret message. Therefore, the task is to design a classifier, which is able to separate the genuine images from the non-genuine ones. However, the main obstacle is that there is a large number of variables extracted from each image and the high dimensionality makes the feature selection mandatory in order to design an accurate classifier. This paper presents a new efficient parallel feature selection algorithm based on the Forward-Backward Selection algorithm. The results will show how the parallel implementation allows to obtain better subsets of features that allow the classifiers to be more accurate.TIN2007-60587, P07-TIC-02768 and P07-TIC-02906,TIC-3928Nokia Foundation, Finlan

    Understanding of mass transfer resistance for the adsorption of solute onto porous material from the modified mass transfer factor models

    Get PDF
    Mass transfer is important in separation and is essential for adsorption process. Mass transfer resistance controls the adsorption kinetic rate, but there is only limited understanding of the adsorption of a solute onto porous material from surface water. This study investigates the adsorptions of NHĂŸ 4 and Al3+ onto granular activated carbon from surface water using the laboratory-scale plug flow column. The use of the modified mass transfer models is able to determine the resistance of mass transfer for the adsorption of one or more solutes present in surface water onto porous material. In this case study identified that the resistance of mass transfer is dependent on film mass transfer before and porous diffusion after break- through occurred. The research findings advance understanding of novel approach for investigating mass transfer resistance of solute onto porous material from waters
    • 

    corecore