Skip to main content

Performance Evaluation of Features Extracted from DWT Domain

  • Conference paper
  • First Online:
Software Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 731))

Abstract

The key task of Steganalyzer is to identify if a carrier is carrying hidden information or not. Blind Steganalysis can be tackled as two-class pattern recognition problem. In this paper, we have extracted two sets of feature vectors from discrete wavelet transformation domain of images to improve performance of a Steganalyzer. The features extracted are histogram features with three bins 5, 10, and 15 and Markov features with five threshold values 2, 3, 4, 5, 6, respectively. The performance of two feature sets is compared among themselves and with existing Farid discrete wavelet transformation features based on parameter classification accuracy using neural network back-propagation classifier. In this paper, we are using three Steganography algorithms outguess, nsF5 and PQ with various embedding capacities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Choudhary, K.: Image steganography and global terrorism. Glob. Secur. Stud. 3(4), 115–135 (2012)

    Google Scholar 

  2. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Processing 90, pp. 727–752 (2010)

    Article  Google Scholar 

  3. Johnson, N.F., Jajodia, S.: Steganalysis the investigation of hidden information. In: Proceedings of the IEEE Information Technology Conference, Syracuse, NY, pp. 113–116 (1998)

    Google Scholar 

  4. Nissar, A., Mir, A.H.: Classification of steganalysis techniques: a study. In: Digital Signal Processing, vol. 20, pp. 1758–1770 (2010)

    Article  Google Scholar 

  5. Farid, H.: Detecting hidden messages using higher-order statistical models. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), vol. 2, pp. 905–908 (2002)

    Google Scholar 

  6. Niels Provos. www.outguess.org

  7. Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of the ACM Workshop on Multimedia & Security, pp. 3–14 (2007)

    Google Scholar 

  8. Fridrich, J., Gojan, M., Soukal, D.: Perturbed quantization steganography. J. Multimedia Syst. 11, 98–107 (2005)

    Article  Google Scholar 

  9. Ali, S.K., Beijie, Z.: Analysis and classification of remote sensing by using wavelet transform and neural network. In: IEEE 2008 International Conference on Computer Science and Software Engineering, pp. 963–966 (2008)

    Google Scholar 

  10. Shimazaki, H., Shinomoto, S.: A method for selecting the bin size of a time histogram. Neural Comput. 19(6), 1503–1527 (2007)

    Article  MathSciNet  Google Scholar 

  11. Saini, M., Chhikara, R.: DWT feature based blind image steganalysis using neural network classifier. Int. J. Eng. Res. Technol. 4(04), 776–782 (2015)

    Google Scholar 

  12. Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of the SPIE, pp. 03–04 (2007)

    Google Scholar 

  13. Bakhshandeh, S., Bakhshande, F., Aliyar, M.: Steganalysis algorithm based on cellular automata transform and neural network. In: Proceedings of the IEEE International Conference on Information Security and Cryptology (ISCISC), pp. 1–5 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manisha Saini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saini, M., Chhikara, R. (2019). Performance Evaluation of Features Extracted from DWT Domain. In: Hoda, M., Chauhan, N., Quadri, S., Srivastava, P. (eds) Software Engineering. Advances in Intelligent Systems and Computing, vol 731. Springer, Singapore. https://doi.org/10.1007/978-981-10-8848-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8848-3_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8847-6

  • Online ISBN: 978-981-10-8848-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics