Revealing of steganograms with data, which are hidden in transformation domain of digital images

Authors

  • D. O. Progonov National Technical University of Ukraine, Kyiv Politechnic Institute, Kiev http://orcid.org/0000-0002-1124-1497
  • S. M. Kushch National Technical University of Ukraine, Kyiv Politechnic Institute, Kiev

DOI:

https://doi.org/10.20535/RADAP.2014.57.128-142

Keywords:

passive steganalysis, multifractal detrended fluctuation analysis, Hurst exponent

Abstract

Introduction. The paper is devoted to analysis the correlation and fractal properties of bright¬ness fluctuation the steganograms. The case of multistage embedding the modified stegodata in transformation domain of digital images is considered.
Data hiding in transformation domain of digital images. The Gunjal method of message hiding in digital images is investigated. The method is based on usage of Arnold transform for mangling the stegodata. Embedding of modified message is carried out by applying of two-dimensional discrete wavelet transform and block two-dimensional discrete cosine transform.
Multifractal detrended fluctuation analysis of digital images. The correlation and fractal characteristics of the digital images noise components are consider. It is shown the advanta¬ges of multifractal detrended fluctuation analysis over classic detrended fluctuation analysis – the representation of signal fluctuation as set of monofractal aggregates with corresponding generalized Hurst exponents.
Conclusion. Data hiding in transformation domain of digital images leads to smoothing of spectrum the generalized Hurst exponents and narrowing the multifractal spectrum of fluctuations. It is established that ascertained disclosure features do not depend on degree of container filling.

Author Biographies

D. O. Progonov, National Technical University of Ukraine, Kyiv Politechnic Institute, Kiev

Postgraduate student

S. M. Kushch, National Technical University of Ukraine, Kyiv Politechnic Institute, Kiev

Cand. of Sci. (Techn.), Assoc. Prof.

References

Перелік посилань

Choudhary K. Image Steganography and Global Terrorism / K. Choudhary // International Journal of Scientific & Engineering Research. – 2012. – Vol. 3, Issue 4. – 12 p.

Zielinska E. Trends in Steganography / E. Zielinska, W. Mazurczyk, K. Szczypiorski // Communications of the ACM. – Vol. 57, No 3. – 2014. – pp. 86-95.

The Cisco 2014 Annual Security Report [Електронний ресурс] / San Jose, California, USA, 2014. – 81 p. – Режим доступу: http://www.eplus.com/Collateral/Brochures/

Cisco 2014 Annual Security Report.PDF.

Katzenbeisser S. Information Hiding Techniques for Steganography and Digital Watermarking / S. Katzenbeisser, P. Petitcolas. – Artech House, 2000. – 237 p.

Fridrich J. Practical Steganalysis of Digital Images: State of the Art / J. Fridrich, M. Goljan // Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV (April 29, 2002). – Vol. 1.

Avcibas I. Steganalysis using image quality metrics / I. Avcibas, N. Memon, B. Sankur // IEEE Transaction on Image Processing. – 2003. – Vol. 12, No. 2., pp. 221-229.

Progonov D. O. Evaluation of the Effectiveness of Applying the Image Quality Metrics for Acquisition the Steganograms / D.O. Progonov, S.M. Kushch // Theoretical and Applied Aspects of Cybernetics ; Proc. of the 3rd Int. Sci. Conf. of Students and Young Scientists. – Kyiv: Bukrek, 2013. – рp. 34-42;

Ambalavanan A. A Bayesian Image Steganalysis Approach to Estimate the Embedded Secret Message / A. Ambalavanan, R. Chandramouli // Proceedings of the 7th workshop on Multimedia and security. – 2005. – pp. 33-38.

Fridrich J. Higher-order Statistical Steganalysis of Palette Images / J. Fridrich, M. Goljan, D. Soukal // Proc. of SPIE Electronic Imaging, Security, Steganalyis and Watermarking of Multimedia Contents V. ; Santa Clara, California, USA. – 2003. – pp. 178-190.

Ramkumar M. Data Hiding in Multimedia - Theory and Applications / M. Ramkumar. – Doc. Diss. ; New Jersey Institute of Technology, Department of Electrical and Computer Engineering, 1999, 70 p.

Joseph A. Robust Watermarking Based on DWT-SVD / A. Joseph, K. Anusudha // International Journal on Signal & Image Security. – 2013. – Vol. 1, No 1.

Khan M. I. Digital Watermarking for Image Authentication Based on Combined DCT, DWT and SVD Transformation / M. I. Khan, M. Rahman, I. H. Sarker // International Journal of Computer Science Issues. – 2013. – Vol. 10, Issue 3, No 1.

Gunjal L. Secured color image watermarking technique in DWT-DCT domain / B. L. Gunjal, S. N. Mali // International Journal of Computer Science, Engineering and Information Technology. – 2011. – Vol. 1, No. 3. – pp. 36-44.

Гонсалес Р. Цифровая обработка изображений / Р. Гонсалес, Р. Вудс ; изд. 3-е, испр. и доп. – М. : Техносфера, 2012. – 1104 с.

Nance J. Periods of discretized Arnold Cat Map and its extension to dimensions / J. Nance ; Department of Mathematics, University of Illinois at Urbana-Champaign. – 2013. – 11 p. – Режим доступу: http://arxiv.org/abs/1111.2984.

Kantelhardt J. Multifractal Detrended Fluctuation Analysis of Nonstationary Time Series / J. Kantelhardt, S. Zschiegner, E. Koscielny-Bunde, A. Bunde, S. Havlin, E. Stanley // Physica A: Statistical Mechanics and its Applications. – 2002. – Vol. 316, Is. 1-4. – pp. 87-114.

Hu K. Effect of trends on detrended fluctuation analysis / K. Hu, P. Ch. Ivanov, Z. Chen, P. Carpena, H. E. Stanley // Physical Review E. – 2001. – Vol. 64, Article 011114. – 19 p.

Большаков А. Методы обработки многомерных данных и временных рядов / А. Большаков, Р. Каримов. – М. : Горячая линия – Телеком, 2007. – 522 с.

References

Choudhary K. (2012) Image Steganography and Global Terrorism. International Journal of Scientific & Engineering Research, Vol. 3, Is. 4. – 12 p.

Zielinska E., Mazurczyk W. and Szczypiorski K. (2014) Trends in Steganography. Communications of the ACM. Vol. 57, No 3, pp. 86-95.

The Cisco 2014 Annual Security Report. Available at: http://www.eplus.com/Collateral/Brochures/Cisco 2014 Annual Security Report.PDF.

Katzenbeisser S. and Petitcolas P. (2000) Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 237 p.

Fridrich J. and Goljan M. (2002) Practical Steganalysis of Digital Images – State of the Art. Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV (April 29, 2002) Vol. 1.

Avcibas I., Memon N. and Sankur B. (2003) Steganalysis using image quality metrics. IEEE Transaction on Image Processing, Vol. 12, No. 2., pp. 221-229.

Progonov D.O. and Kushch S.M. (2013) Evaluation of the Effectiveness of Applying the Image Quality Metrics for Acquisition the Steganograms. Theoretical and Applied Aspects of Cybernetics, pр. 34-42.

Ambalavanan A. and Chandramouli R. (2005) A Bayesian Image Steganalysis Approach to Estimate the Embedded Secret Message. Proceedings of the 7th workshop on multimedia and security, pp. 33-38.

Fridrich J., Goljan M. and Soukal D. (2003) Higher-order Statistical Steganalysis of Palette Images. Proc. of SPIE Electronic Imaging, Security, Steganalyis and Watermarking of Multimedia Contents V, pp. 178-190.

Ramkumar M. (1999) Data Hiding in Multimedia – Theory and Applications. Dr. Diss., New Jersey Institute of Technology, Department of Electrical and Computer Engineering, 70 p.

Joseph A. and Anusudha K. (2013) Robust Watermarking Based on DWT-SVD. International Journal on Signal & Image Security, Vol. 1, Issue 1.

Khan M. I., Rahman M. and Sarker I. H. (2013) Digital Watermarking for Image Authentication Based on Combined DCT, DWT and SVD Transformation. International Journal of Computer Science Issues. Vol. 10, Issue 3, No 1.

Gunjal B.L. and Mali S.N. (2011) Secured color image watermarking technique in DWT-DCT domain. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT). Vol. 1, No. 3, pp. 36-44.

Gonsales R. and Woods R. (2012) Tsifrovaya obrabotka izobrazhenii [Digital Image Processing]. Moskva, Tekhnosfera Publ., 1104 p.

Nance J. (2013) Periods of discretized Arnold Cat Map and its extension to dimensions. Department of Mathematics, University of Illinois at Urbana-Champaign, 11 p.

Kantelhardt J., Zschiegner S., Koscielny-Bunde E., Bunde A., Havlin S. and Stanley E. (2002) Multifractal Detrended Fluctuation Analysis of Nonstationary Time Series. Physica A: Statistical Mechanics and its Applications, Vol. 316, Issue 1-4, pp. 87-114.

Hu K., Ivanov P. Ch., Chen Z., Carpena P. and Stanley H. E. (2001) Effect of trends on detrended fluctuation analysis. Physical Review E. Vol. 64, Article 011114, 19 p.

Bol'shakov A. and Karimov R. (2007) Metody obrabotki mnogomernykh dannykh i vremennykh ryadov [Processing methods of multidimensional data and time series]. Moskow, "Goryachaya liniya–Telekom" Publ., 522 p.

Published

2014-06-30

How to Cite

Прогонов, Д. О. and Кущ, С. М. (2014) “Revealing of steganograms with data, which are hidden in transformation domain of digital images”, Visnyk NTUU KPI Seriia - Radiotekhnika Radioaparatobuduvannia, 0(57), pp. 128-142. doi: 10.20535/RADAP.2014.57.128-142.

Issue

Section

Information Security