Abstract
The key task of Steganalyzer is to identify if a carrier is carrying hidden information or not. Blind Steganalysis can be tackled as two-class pattern recognition problem. In this paper, we have extracted two sets of feature vectors from discrete wavelet transformation domain of images to improve performance of a Steganalyzer. The features extracted are histogram features with three bins 5, 10, and 15 and Markov features with five threshold values 2, 3, 4, 5, 6, respectively. The performance of two feature sets is compared among themselves and with existing Farid discrete wavelet transformation features based on parameter classification accuracy using neural network back-propagation classifier. In this paper, we are using three Steganography algorithms outguess, nsF5 and PQ with various embedding capacities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Choudhary, K.: Image steganography and global terrorism. Glob. Secur. Stud. 3(4), 115–135 (2012)
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Processing 90, pp. 727–752 (2010)
Johnson, N.F., Jajodia, S.: Steganalysis the investigation of hidden information. In: Proceedings of the IEEE Information Technology Conference, Syracuse, NY, pp. 113–116 (1998)
Nissar, A., Mir, A.H.: Classification of steganalysis techniques: a study. In: Digital Signal Processing, vol. 20, pp. 1758–1770 (2010)
Farid, H.: Detecting hidden messages using higher-order statistical models. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), vol. 2, pp. 905–908 (2002)
Niels Provos. www.outguess.org
Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of the ACM Workshop on Multimedia & Security, pp. 3–14 (2007)
Fridrich, J., Gojan, M., Soukal, D.: Perturbed quantization steganography. J. Multimedia Syst. 11, 98–107 (2005)
Ali, S.K., Beijie, Z.: Analysis and classification of remote sensing by using wavelet transform and neural network. In: IEEE 2008 International Conference on Computer Science and Software Engineering, pp. 963–966 (2008)
Shimazaki, H., Shinomoto, S.: A method for selecting the bin size of a time histogram. Neural Comput. 19(6), 1503–1527 (2007)
Saini, M., Chhikara, R.: DWT feature based blind image steganalysis using neural network classifier. Int. J. Eng. Res. Technol. 4(04), 776–782 (2015)
Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of the SPIE, pp. 03–04 (2007)
Bakhshandeh, S., Bakhshande, F., Aliyar, M.: Steganalysis algorithm based on cellular automata transform and neural network. In: Proceedings of the IEEE International Conference on Information Security and Cryptology (ISCISC), pp. 1–5 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saini, M., Chhikara, R. (2019). Performance Evaluation of Features Extracted from DWT Domain. In: Hoda, M., Chauhan, N., Quadri, S., Srivastava, P. (eds) Software Engineering. Advances in Intelligent Systems and Computing, vol 731. Springer, Singapore. https://doi.org/10.1007/978-981-10-8848-3_25
Download citation
DOI: https://doi.org/10.1007/978-981-10-8848-3_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8847-6
Online ISBN: 978-981-10-8848-3
eBook Packages: EngineeringEngineering (R0)