77 research outputs found

    Universal Image Steganalytic Method

    Get PDF
    In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting well-known and also newly developed steganographic methods. The steganalytic model is trained by MHF-DZ steganographic algorithm previously designed by the same authors. The calibration technique with the Feature Based Steganalysis (FBS) was employed in order to identify statistical changes caused by embedding a secret data into original image. The steganalyzer concept utilizes Support Vector Machine (SVM) classification for training a model that is later used by the same steganalyzer in order to identify between a clean (cover) and steganographic image. The aim of the paper was to analyze the variety in accuracy of detection results (ACR) while detecting testing steganographic algorithms as F5, Outguess, Model Based Steganography without deblocking, JP Hide&Seek which represent the generally used steganographic tools. The comparison of four feature vectors with different lengths FBS (22), FBS (66) FBS(274) and FBS(285) shows promising results of proposed universal steganalytic method comparing to binary methods

    A Survey of Data Mining Techniques for Steganalysis

    Get PDF

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach

    Get PDF
    The ability of sending a secret message through a network nowadays has become a more challenging and complex process. One of the reasons why we need tools to detect the hidden message is because of security and safety. Secret messages can be both for good or bad, and subversive groups have been known to send secret messages to coordinate their terrorist activities. Thus,a technique such as steganalysis is one method example to detect a secret message. Much of the technical steganalysis work had been carried out on image, video, and audio steganalysis, but in any agency or organisation, all business documents generally uses the natural language in text form or document form. Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. The aim of this project was to detect a hidden message in an observed message using text steganalysis

    Cryptology and Communication Security

    Get PDF
    Cryptology is the scientific study and practice of making (cryptography) and breaking (cryptanalysis) of codes andciphers. Code is a system of rephrasing parts of normal language meaningful with certain standard groups or symbols. Whereas cipher is a system of transforming fixed length group of language symbols at normally the single character of alphabet into code alphabet character. The science of making communications unintelligible to all except the intended recipient(s) is known as cryptography. Until recently cryptography has been of interest primarily to the defence and diplomatic personnel of governments, guarded over and directed by their national crypto logic services. But now a day’s It has become the part of our daily life viz. providing electronic security to our house and offices, use of ATM, Credit Card, Smart Cards and RFID tags, etc. all of them needs cryptography in some form. Private business sectors, terrorist outfit and electronic communication agencies are using cryptographic methods to keep their data, valuable information and their developmental activities secret until they feel that it is important for their commercial interest, etc. Many cryptographic devices and algorithms are available for non-governmental application, such as M209, Hagelin machine, DES, AES, Public key cryptography (RSA system), and also varieties of crypto algorithms are available in the open literatures for any interested agency to implement their own system of encryptions.Defence Science Journal, 2012, 62(1), pp.3-5, DOI:http://dx.doi.org/10.14429/dsj.62.143

    Preserve Imperceptibility and Robustness Performance on Steganography Technique based on StegaSVM-Shifted LBS Model

    Get PDF
    In image steganography, the most popular and widely used techniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well.Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm.Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret.This paper designing the new model is proposed called StegaSVM-Shifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images.The StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance

    A Review on Edge Based Image Steganography

    Get PDF
    Security of the information has always been the interesting area for researchers. Integrity, Confidentiality, and Authentication are main security principles. There are so many techniques developed to achieve these security principles using cryptography. But all these techniques are unable to keep the communication secret. Although the attacker is unable to access the secret message but he knows about the existence of the message. To overcome this limitation of cryptography a new idea is proposed by researchers that is Steganography. Steganography is the art of concealing secret message in a carrier such as text, image, audio, video and protocol messages. Different Steganography techniques are used based on these carrier messages and way of hiding. The choice of these method is depends on the requirements of application. Some application requires huge data embedding and some require high secrecy. This paper gives a review on image Steganography based on edge detection and their comparative study. It also gives an overview of basic edge detection techniques

    Recent Advances in Steganography

    Get PDF
    Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced

    Fitness value based evolution algorithm approach for text steganalysis model

    Get PDF
    In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. This paper provides a valuable insight into the development and enhancement of the text steganalysis domain
    corecore