SPECTRAL ANALYSIS OF STEGANOGRAMS
DOI:
https://doi.org/10.15588/1607-3274-2015-2-9Keywords:
digital images, passive steganalysis, singular spectrum analysis, multifractal analysis.Abstract
The data embedding algorithms in transformation domain of digital images are widely used for increasing the robustness of stegoalgorithmsto known steganalysis methods. Applying of standard transformations the digital images by steganograms forming – two-dimensional discrete
cosine and wavelet transforms – allows minimizing the garbling the hidden messages by image compression. We propose to use the spectral analysis methods – singular spectrum analysis and multifractal analysis – for revealing the fact of message embedding with usage of standard transform of cover image and stegodata. The advantage of such approach in comparison with statistical steganalysis methods is possibility to simultaneously investigation of several components the cover image, which allows localizing the domain of data hiding.
Research of effectiveness of the spectral analysis methods was provided for the case of usage the one-stage and multi-stage embedding
methods. It is shown that stegodata embedding leads to alteration the all components of singular value decomposition of cover images as well
as appearance the peculiar alteration of multifractal features the steganograms – increasing the cardinality of monofractal components the image. Revealed distinctive features of steganograms are stable in wide range of cover image payloads, which is simplifying of task of stegodata revealing, hidden in transformation domain of digital images.
References
Kodovsky J. Calibration revisited / J. Kodovsky, J. Fridrich // 11th
Multimedia and Security Workshop, New York, 2009 : proceedings. – New York : ACM Press, 2009. DOI 10.1145/1597817.1597830.
Fridrich J. Rich models for steganalysis of digital images / J. Fridrich, J. Kodovsky // Transactions on Information Forensics and Security. – 2012. – Vol. 7, Issue 3. – P. 868–882. DOI 10.1109/tifs.2012.2190402.
Liu Q. Steganalysis of DCT–embedding based adaptive steganography and YASS / Q. Liu // 13th Multimedia & Security Workshop, New York, 2011 : proceedings. – New York : ACM Press, 2011. – P. 77–86. DOI 10.1145/2037252.2037267.
Holub V. Random Projections of Residuals for Digital Image Steganalysis / V. Holub, J. Fridrich // Transactions on Information Forensics and Security. – 2013. – Vol. 8, Issue 12. – P. 1996– 2006. DOI 10.1109/tifs.2013.2286682.
Прогонов Д. О. Виявлення стеганограм з даними, прихованими в області перетворення цифрових зображень / Д. О. Прогонов, С. М. Кущ // Вісник Національного технічного університету України «Київський політехнічний інститут». Серія «Радіотехніка. Радіоапаратобудування». – 2014. – № 57. –
С. 128–142.
Прогонов Д. Варіограмний аналіз стеганограм / Д. Прогонов,
С. Кущ // Захист інформації і безпека інформаційних систем: III Міжнародна науково-технічна конференція, Львів, 5–6 червня 2014 р.: матеріали конференції. – Львів : Українська академія друкарства, 2014. – C. 84–85.
Прогонов Д. А. Определение типа преобразований, использованных для скрытия данных в цифровых изображениях / Д. А. Прогонов, С. Н. Кущ // System analysis and information technologies : 16-я Международная научно-практическая конференция, Киев, 26–30 мая 2014 г. : материалы конференции. – К. : УНК «ИПСА» НТУУ «КПИ», 2014. – C. 435–436.
Elahian A. Improved robust DWT-watermaking in YCbCr color space / A. Elahian, M. Khalili, S. B. Shokouhi // Global journal of computer application and technology. – 2011. – Vol. 1, Issue 3. – P. 300–304.
Dey N. A novel approach of color image hiding using RGB color planes and DWT / N. Dey, A. B. Roy, S. Dey // International journal of computer application. – 2011. – Vol. 36, Issue 5. – P. 19–24.
Gunjal B. L. Secured color image watermarking technique in
DWT-DCT domain / B. L. Gunjal, S. N. Mali // International Journal of Computer Science, Engineering and Information Technology (IJCSEIT). – 2011. – Vol. 1, Issue 3. – P. 36–44.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 D. O. Progonov, S. M. Kushch
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.