Revealing of steganograms with data, which are hidden in transformation domain of digital images
DOI:
https://doi.org/10.20535/RADAP.2014.57.128-142Keywords:
passive steganalysis, multifractal detrended fluctuation analysis, Hurst exponentAbstract
Introduction. The paper is devoted to analysis the correlation and fractal properties of bright¬ness fluctuation the steganograms. The case of multistage embedding the modified stegodata in transformation domain of digital images is considered.Data hiding in transformation domain of digital images. The Gunjal method of message hiding in digital images is investigated. The method is based on usage of Arnold transform for mangling the stegodata. Embedding of modified message is carried out by applying of two-dimensional discrete wavelet transform and block two-dimensional discrete cosine transform.
Multifractal detrended fluctuation analysis of digital images. The correlation and fractal characteristics of the digital images noise components are consider. It is shown the advanta¬ges of multifractal detrended fluctuation analysis over classic detrended fluctuation analysis – the representation of signal fluctuation as set of monofractal aggregates with corresponding generalized Hurst exponents.
Conclusion. Data hiding in transformation domain of digital images leads to smoothing of spectrum the generalized Hurst exponents and narrowing the multifractal spectrum of fluctuations. It is established that ascertained disclosure features do not depend on degree of container filling.
References
Перелік посилань
Choudhary K. Image Steganography and Global Terrorism / K. Choudhary // International Journal of Scientific & Engineering Research. – 2012. – Vol. 3, Issue 4. – 12 p.
Zielinska E. Trends in Steganography / E. Zielinska, W. Mazurczyk, K. Szczypiorski // Communications of the ACM. – Vol. 57, No 3. – 2014. – pp. 86-95.
The Cisco 2014 Annual Security Report [Електронний ресурс] / San Jose, California, USA, 2014. – 81 p. – Режим доступу: http://www.eplus.com/Collateral/Brochures/
Cisco 2014 Annual Security Report.PDF.
Katzenbeisser S. Information Hiding Techniques for Steganography and Digital Watermarking / S. Katzenbeisser, P. Petitcolas. – Artech House, 2000. – 237 p.
Fridrich J. Practical Steganalysis of Digital Images: State of the Art / J. Fridrich, M. Goljan // Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV (April 29, 2002). – Vol. 1.
Avcibas I. Steganalysis using image quality metrics / I. Avcibas, N. Memon, B. Sankur // IEEE Transaction on Image Processing. – 2003. – Vol. 12, No. 2., pp. 221-229.
Progonov D. O. Evaluation of the Effectiveness of Applying the Image Quality Metrics for Acquisition the Steganograms / D.O. Progonov, S.M. Kushch // Theoretical and Applied Aspects of Cybernetics ; Proc. of the 3rd Int. Sci. Conf. of Students and Young Scientists. – Kyiv: Bukrek, 2013. – рp. 34-42;
Ambalavanan A. A Bayesian Image Steganalysis Approach to Estimate the Embedded Secret Message / A. Ambalavanan, R. Chandramouli // Proceedings of the 7th workshop on Multimedia and security. – 2005. – pp. 33-38.
Fridrich J. Higher-order Statistical Steganalysis of Palette Images / J. Fridrich, M. Goljan, D. Soukal // Proc. of SPIE Electronic Imaging, Security, Steganalyis and Watermarking of Multimedia Contents V. ; Santa Clara, California, USA. – 2003. – pp. 178-190.
Ramkumar M. Data Hiding in Multimedia - Theory and Applications / M. Ramkumar. – Doc. Diss. ; New Jersey Institute of Technology, Department of Electrical and Computer Engineering, 1999, 70 p.
Joseph A. Robust Watermarking Based on DWT-SVD / A. Joseph, K. Anusudha // International Journal on Signal & Image Security. – 2013. – Vol. 1, No 1.
Khan M. I. Digital Watermarking for Image Authentication Based on Combined DCT, DWT and SVD Transformation / M. I. Khan, M. Rahman, I. H. Sarker // International Journal of Computer Science Issues. – 2013. – Vol. 10, Issue 3, No 1.
Gunjal L. Secured color image watermarking technique in DWT-DCT domain / B. L. Gunjal, S. N. Mali // International Journal of Computer Science, Engineering and Information Technology. – 2011. – Vol. 1, No. 3. – pp. 36-44.
Гонсалес Р. Цифровая обработка изображений / Р. Гонсалес, Р. Вудс ; изд. 3-е, испр. и доп. – М. : Техносфера, 2012. – 1104 с.
Nance J. Periods of discretized Arnold Cat Map and its extension to dimensions / J. Nance ; Department of Mathematics, University of Illinois at Urbana-Champaign. – 2013. – 11 p. – Режим доступу: http://arxiv.org/abs/1111.2984.
Kantelhardt J. Multifractal Detrended Fluctuation Analysis of Nonstationary Time Series / J. Kantelhardt, S. Zschiegner, E. Koscielny-Bunde, A. Bunde, S. Havlin, E. Stanley // Physica A: Statistical Mechanics and its Applications. – 2002. – Vol. 316, Is. 1-4. – pp. 87-114.
Hu K. Effect of trends on detrended fluctuation analysis / K. Hu, P. Ch. Ivanov, Z. Chen, P. Carpena, H. E. Stanley // Physical Review E. – 2001. – Vol. 64, Article 011114. – 19 p.
Большаков А. Методы обработки многомерных данных и временных рядов / А. Большаков, Р. Каримов. – М. : Горячая линия – Телеком, 2007. – 522 с.
References
Choudhary K. (2012) Image Steganography and Global Terrorism. International Journal of Scientific & Engineering Research, Vol. 3, Is. 4. – 12 p.
Zielinska E., Mazurczyk W. and Szczypiorski K. (2014) Trends in Steganography. Communications of the ACM. Vol. 57, No 3, pp. 86-95.
The Cisco 2014 Annual Security Report. Available at: http://www.eplus.com/Collateral/Brochures/Cisco 2014 Annual Security Report.PDF.
Katzenbeisser S. and Petitcolas P. (2000) Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 237 p.
Fridrich J. and Goljan M. (2002) Practical Steganalysis of Digital Images – State of the Art. Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV (April 29, 2002) Vol. 1.
Avcibas I., Memon N. and Sankur B. (2003) Steganalysis using image quality metrics. IEEE Transaction on Image Processing, Vol. 12, No. 2., pp. 221-229.
Progonov D.O. and Kushch S.M. (2013) Evaluation of the Effectiveness of Applying the Image Quality Metrics for Acquisition the Steganograms. Theoretical and Applied Aspects of Cybernetics, pр. 34-42.
Ambalavanan A. and Chandramouli R. (2005) A Bayesian Image Steganalysis Approach to Estimate the Embedded Secret Message. Proceedings of the 7th workshop on multimedia and security, pp. 33-38.
Fridrich J., Goljan M. and Soukal D. (2003) Higher-order Statistical Steganalysis of Palette Images. Proc. of SPIE Electronic Imaging, Security, Steganalyis and Watermarking of Multimedia Contents V, pp. 178-190.
Ramkumar M. (1999) Data Hiding in Multimedia – Theory and Applications. Dr. Diss., New Jersey Institute of Technology, Department of Electrical and Computer Engineering, 70 p.
Joseph A. and Anusudha K. (2013) Robust Watermarking Based on DWT-SVD. International Journal on Signal & Image Security, Vol. 1, Issue 1.
Khan M. I., Rahman M. and Sarker I. H. (2013) Digital Watermarking for Image Authentication Based on Combined DCT, DWT and SVD Transformation. International Journal of Computer Science Issues. Vol. 10, Issue 3, No 1.
Gunjal B.L. and Mali S.N. (2011) Secured color image watermarking technique in DWT-DCT domain. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT). Vol. 1, No. 3, pp. 36-44.
Gonsales R. and Woods R. (2012) Tsifrovaya obrabotka izobrazhenii [Digital Image Processing]. Moskva, Tekhnosfera Publ., 1104 p.
Nance J. (2013) Periods of discretized Arnold Cat Map and its extension to dimensions. Department of Mathematics, University of Illinois at Urbana-Champaign, 11 p.
Kantelhardt J., Zschiegner S., Koscielny-Bunde E., Bunde A., Havlin S. and Stanley E. (2002) Multifractal Detrended Fluctuation Analysis of Nonstationary Time Series. Physica A: Statistical Mechanics and its Applications, Vol. 316, Issue 1-4, pp. 87-114.
Hu K., Ivanov P. Ch., Chen Z., Carpena P. and Stanley H. E. (2001) Effect of trends on detrended fluctuation analysis. Physical Review E. Vol. 64, Article 011114, 19 p.
Bol'shakov A. and Karimov R. (2007) Metody obrabotki mnogomernykh dannykh i vremennykh ryadov [Processing methods of multidimensional data and time series]. Moskow, "Goryachaya liniya–Telekom" Publ., 522 p.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).