Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Closure of sets: a statistically hypersensitive system for steganalysis of least significant bit embedding

Closure of sets: a statistically hypersensitive system for steganalysis of least significant bit embedding

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Signal Processing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This study introduces a new scheme for steganalysis of the least significant bit (LSB) embedding, based on the idea of closure of sets (CoS), which is independent of the type of cover signal, applicable to both spatial and transform domains. The CoS is referred to as some special subsets that could be found in a common space whose elements relate to higher-order statistical properties of the signal. The proposed scheme is used for steganalysis of the LSB steganography of greyscale TIFF and JPEG images and audio signals, employing a set of accurate and monotone features that are extracted based on the CoS definition. It is shown that significant improvement to the detection accuracy in steganalysis is achieved using the proposed scheme, particularly at low embedding rates.

References

    1. 1)
    2. 2)
    3. 3)
      • G. Doerr . Image database for steganalysis studies.
    4. 4)
      • Lu, P., Luo, X., Tang, Q., Shen, L.: `An improved sample pairs method for detection of LSB embedding', Proc. Sixth Information Hiding Workshop, 2004, p. 116–127, (LNCS, 3200).
    5. 5)
    6. 6)
      • United States Department of Agriculture: ‘Natural resources conservation service photo gallery’, Available at: http://photogallery.nrcs.usda.gov, accessed January 2008.
    7. 7)
    8. 8)
      • Corel Corporation: ‘Corel stock photo library 3’, Ontario, Canada, Available at: http://www.amazon.com/Corel-Stock-Photo-Library-3, accessed January 2008.
    9. 9)
    10. 10)
      • Westfeld, A., Pfitzmann, A.: `Attacks on steganographic systems', Proc. Third Information Hiding Workshop, September–October 1999, Dresden, Germany, p. 61–75.
    11. 11)
      • Harmsen, J., Pearlman, W.: `Steganalysis of additive noise modelable information hiding', Proc. SPIE Electronic Imaging, January 2003, Stockholm, Santa Clara, CA, p. 131–142.
    12. 12)
    13. 13)
      • Dumitrescu, S., Wu, X., Memon, N.: `On steganalysis of random LSB embedding in continuous-tone images', Proc. IEEE Int. Conf. on Image Processing, September 2002, p. 641–644.
    14. 14)
    15. 15)
      • T. Aura . Practical invisibility in digital communication. Lect. Notes Comput. Sci. , 265 - 278
    16. 16)
    17. 17)
    18. 18)
    19. 19)
      • Fridrich, J., Goljan, M.: `TPractical steganalysis of digital images – state of the art', Proc. SPIE, Security and Watermarking Multimedia Contents IV, January 2002, San Jose, CA, p. 1–13.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-spr.2010.0048
Loading

Related content

content/journals/10.1049/iet-spr.2010.0048
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address