Abstract
In this paper, we propose a new blind steganalytic method to detect the presence of secret messages embedded in black and white images using the steganographic techniques. We start by extracting several sets of matrix, such as run length matrix, gap length matrix and pixel difference. We also apply characteristic function on these matrices to enhance their discriminative capabilities. Then we calculate the statistics which include mean, variance, kurtosis and skewness to form our feature sets. The presented empirical works demonstrate our proposed method can effectively detect three different types of steganography. This proves the universality of our proposed method as a blind steganalysis. In addition, the experimental results show our proposed method is capable of detecting small amount of the embedded message.
| Original language | English |
|---|---|
| Title of host publication | 2010 International Conference on Availability, Reliability and Security (ARES 2010) |
| Place of Publication | Piscataway, N.J. |
| Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
| Pages | 653-658 |
| Number of pages | 6 |
| ISBN (Electronic) | 9781424458806, 9780769539652 |
| ISBN (Print) | 9781424458790 |
| DOIs | |
| Publication status | Published - Feb 2010 |
| Event | 5th International Conference on Availability, Reliability, and Security, ARES - 2010 - Krakow, Poland Duration: 15 Feb 2010 → 18 Feb 2010 |
Other
| Other | 5th International Conference on Availability, Reliability, and Security, ARES - 2010 |
|---|---|
| Country/Territory | Poland |
| City | Krakow |
| Period | 15/02/10 → 18/02/10 |
Bibliographical note
Copyright 2010 IEEE. Reprinted from Proceedings, the Fifth International Conference on Availability, Reliability and Security : Krakow, Poland, 15-18 February 2010. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.Fingerprint
Dive into the research topics of 'Blind steganalysis: a countermeasure for binary image steganography'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver