SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010



 Detecting Original Image Using Histogram, DFT
                    and SVM
        T. H. Manjula Devi1, H.S.Manjunatha Reddy,2 K. B. Raja3Venugopal K. R3 and L. M. Patnaik4
            1
             Department of Telecommunication Engg, Dayananda Sagar College of Engineering, Bangalore
                    2
                      Department of Electronics & Communication, Global Academy of Technology
    3
      Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore
                          4
                            Vice chancellor, Defence Institute of Advanced Technology, Puna.
                                                 thm0303@gmail.com


Abstract                                                             specific). In case of universal technique, the embedding
                                                                     scheme is unknown; so attempt is made to detect the
 Information hiding for covert communication is rapidly              existence of hidden data. Whereas in embedding specific,
gaining momentum. With sophisticated techniques being                the embedding technique is known; therefore payload
developed in steganography, steganalysis needs to be
universal. In this paper we propose Universal Steganalysis
                                                                     size is estimated. There are Steganalysis Tools available
using Histogram, Discrete Fourier Transform and SVM                  freely or as commercial software. The Stegdetect Tool,
(SHDFT). The stego image has irregular statistical                   detects Jsteg, Jphide, invisible secrets, Outguess, F5,
characteristics as compare to cover image. Using Histogram           camouflage Steganographic schemes in JPEG images.
and DFT, the statistical features are generated to train One-        The Tools developed using the Chi-Square analysis,
Class SVM to discriminate the cover and stego image.                 performs a statistical attack to detect hidden data in BMP
SHDFT algorithm is found to be efficient and fast since the          images.
number of statistical features is less compared to the                   The success of steganography depends on various
existing algorithm.                                                  aspects such as the algorithm used for embedding,
                                                                     compression algorithm used and alteration of image
                                                                     properties. LSB is most commonly used technique for
Keywords: Universal Steganalysis, Cover-Medium, Payload,
Redundant Bits, Total Cover Capacity, Histogram, DFT,                image steganography, which uses bitwise methods to
SVM.                                                                 manipulate LSB of the cover image. The minute changes
                                                                     of LSB are imperceptible to human eye and the method
                      I. INTRODUCTION                                of hiding information in LSB can be analogized by
                                                                     adding noise to the image. Reliable algorithms for
     Since long time ago, surreptitious communication                compression used in Steganography are Windows Bitmap
and exchange of information is well known. There are                 (BMP), Graphics Interchange Format (GIF) and Joint
numerous illustrations depicting covertness used in                  Photographic Experts Group (JPEG), to ensure the
communication.      Steganography,      water    marking,            hidden information is not lost after transformation.
cryptography are some of the techniques used for hiding              Lossless compression algorithms such as BMP and GIF
information [1]. There are several mediums for hiding                formats are chosen for LSB techniques in which
information, such as digital images, text, audio, web                modifications are usually made in spatial domain. JPEG
pages, video, etc. Steganography is a skill and discipline           is losy compression algorithm where data hiding is
of embedding a secret payload into a cover medium. The               usually done in frequency domain.
redundant bits in the cover medium are identified and                    General Steganalysis method has not been developed
replaced with the payload. The intent of steganography is            since every Steganographic method utilizes different
ensuring that the presence of hidden message is                      methods of embedding the payload. In classical
undetectable. The different techniques used for                      Steganographic schemes, the security lies in the
embedding of data are Least Significant Bit (LSB),                   concealment of the encoding technique whereas the
Discrete Cosine Transform (DCT), Discrete Wavelet                    modern schemes adopt Kerchoff’s Principle of
Transform (DWT), Spread Spectrum (SS) and Palette                    Cryptography, and hence the security depends on the
technique. There are software tools available over the               secret key that is used to encode the payload.
Internet for embedding the payload in digital images and                 There are several Classifiers being used for pattern
videos viz., S-Tools, J-Steg, Outguess, F5 and Steghide.             recognition: Bayesian Multi-Variate, Fischer Linear
                                                                     Discriminant (FLD), Neural Network (NN), and Support
     The steganography is being used by criminals and                Vector Machines (SVM). SVM is based on statistical
terrorists to exchange information regarding their illegal           learning theory which is highly dependent upon the
activities. The government and other standard                        kernel functions viz., Gaussian Radial Basis Function,
organizations are using steganalysis to restrain these               Polynomial, Exponential Radial Basis Function, Multi-
illegal activities. Steganalysis is to discover and                  Layer Perceptron, Splines, BSplines, Additive Kernels
recognize the extent of a hidden message and can be                  and Tensor Product are used for mapping features. SVM
either blind (universal) or non-blind (embedding                     can be classified as One-Class and Multi-Class. In One-

                                                                17
© 2010 ACEEE
DOI: 01.ijsip.01.01.04
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


Class SVM, only the features of cover images are                     for images. The statistical regularities exhibited by the
required for classification of cover and stego image                 natural images are captured by First and Higher Order
whereas in Multi-Class SVM, the features of both the                 Statistical Model. The FLD is used for classification of
cover and stego-images are required for discriminating               the cover and stego image. This model explores its
the cover and stego image. Owing to simple geometry,                 usefulness in digital forensics including steganography;
SVMs are used more predominantly than Neural                         distinguish between natural photographs and computer
Networks. Biggest limitation of SVM is choosing of the               generated images.
kernel function, speed and size, both in training and                    Siwei Lyu and Hany Farid [9] have proposed
testing.                                                             universal Steganalysis using Higher Order Statistics
     Contribution: In this paper, we have proposed                   (SHS). Wavelet Decomposition based on QMF is used to
SHDFT Universal Steganalysis Method. Histogram and                   obtain the statistics of an image. The magnitude statistics
Discrete Fourier Transform of color images are computed              is obtained from Linear Predictor and phase statistics is
to obtain the PDF moments. In addition, the energy of the            obtained from Gaussian Pyramid and Local Angular
image is considered. The non-linear Classifier Support               Harmonic Decomposition. One Class and Multi Class
Vector Machine is used for classification of cover and               SVM is used for classification. The disadvantage of the
stego image.                                                         algorithm is the number of features required to train the
                                                                     SVM are high. Hence, the time required to detect stego
                     II. RELATED WORK                                image is more.

     Anderson and Petitcolas [2] have proposed two                                             III. MODEL
mathematical frame works for Steganography:
informatics and theoretical models. The quality of the                 The steganalysis model is discussed in this section.
retrieved image is poor in this algorithm. Petitcolas et al.,
                                                                           Steganalysis Model
[3] have discussed a survey on information hiding. The
applications and the terminologies used in information
hiding are elucidated. Certain limitations of information                 Figure 1 gives the block diagram of SHDFT to
hiding have been portrayed, the JPEG compression, low                discriminate cover and stego images using SVM.
pass filtering, cropping, scaling, Additive Gaussian noise,               Color image: JPEG and BMP color images are used
rotation, cause distortion in the image. An important                for the analysis. It consists of RGB color planes, c ∈ {r,
understanding of these limitations is helpful in                     g, b}. The color planes are separated and 1D-Histogram
steganalysis.                                                        is applied to each of the separated color planes of the
                                                                     image.
     Fridich et al., [4] have presented a steganalytic                    Histogram: Histograms are the basis for numerous
method to identify stego image generated by F5                       spatial domain processing techniques used to provide
steganographic algorithm in JPEG images reliably. The                useful image statistics. Image processing operations such
method involves estimation of the cover image histogram              as steganography result in changes to the image
from the stego image. The statistical variation of cover             histogram. The histogram is applied on each color plane
image is determined using the Least Square Fit, which                of the image. The first and second PDF moments i.e., the
compares estimated histogram of DCT coefficients of                  mean and the variance of the histogram coefficients of
stego-image. This technique can be extended to other                 each colour plane are calculated which yields 6D
steganographic algorithms that manipulate quantized                  statistical features.
DCT coefficients. Siwei Lyu and Hany Farid [5] have                       Discrete Fourier Transform (DFT): The sequence of
described an approach of multi-scale Wavelet                         N spatial complex coefficients x0, x1,…….., xN-1 is
Decomposition to build Higher Order Statistical Model to             transformed into the sequence of N frequency complex
detect hidden data in gray images. Support Vector                    coefficients X(0), X(1),…….., X(N-1) by the DFT
Machine is used to detect the statistical variations in a            according to the formula as given in Equation
test image.
                                                                                        N −1
                                                                                                      − i 2πnk
   Farid [6] has described a steganalytic method to detect
hidden messages using Wavelet Decomposition by
                                                                                X(k)=   ∑ x(n) exp(
                                                                                        n =0              N
                                                                                                               )
building Higher Order Statistical Model of the image.                   Where n=0, 1… N-1 and k=0, 1… N-1.
The model extracts basic coefficient statistics and error               DFT for Histogram of each color channel, c ∈ {r, g, b}
statistics from an optimal magnitude predictor. FLD is               is applied. The PDF moments i.e., mean, variance,
used to distinguish the cover and stego image. Siwei Lyu             skewness and kurtosis of the DFT coefficients are
and Hany Farid [7] have described a Universal                        computed which yields 12D statistics. The total energy
Steganalysis Algorithm that exploits strong statistical              for DFT coefficients is computed which yields 3D
regularities that exist between the color channels of                Statistics.
natural images. The statistical model is generated using                 SVM: In One-Class SVM, only the features of cover
first and Higher Order Statistics of the image. One Class            images are required for classification of cover and stego
SVM is used to detect hidden data.                                   image. The feature vector comprising 24D statistics is
     Hany Farid and Siwei Lyu [8] have employed Multi-               used to train the SVM.
Scale Wavelet Decomposition to build a statistical model
                                                                18
© 2010 ACEEE
DOI: 01.ijsip.01.01.04
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


                                                                   generate 100 stego images Using Jphide software for
                                                                   JPEG images and S-Tools 4.0 software for BMP images.
        Color image                                                The payload is of the size 6.0, 4.7, 1.2, 0.3 kilobytes,
                                                                   corresponding to 100%, 78%, 20% and 5% Of total
                                                                   cover capacity The capacity will vary according to the
                                                                   size of the cover image. The steganographic capacity is
       1D Histogram                       Feature Vector           then the ratio of the size of the embedded payload to the
                                                                   total cover capacity. Each stego image is generated with
                                                                   the same quality factor as that of the original cover image
                                                                   so as to minimize the statistical variations. Figure 3 and
                                                                   Table 2 gives the comparison of the detection rate for the
             DFT                        One-Class SVM              proposed algorithm SHDFT and existing algorithm SHS
                                                                   for different embedding rate in BMP images using S-
                                                                   Tools. It is observed that the percentage of detection rate
               Figure 1: Block Diagram of SHDFT                    increases as embedding rate increases for both the
                                                                   algorithms. Figure 4 and Table 3 gives the comparison of
     Features:We find the mean of the difference between           the detection rate for the proposed algorithm SHDFT and
DFT and Histogram for each color plane which yields 3D             existing algorithm SHS for different embedding rate in
statistics. SHDFT totally yields 24D characteristics which         JPEG images using JPhide and S-Tools. The proposed
are used to discriminate the cover and stego image.                algorithm SHDFT requires only 24D statistics for
                                                                   training SVM as compared to 432D statistics required for
                       IV. ALGORITHM                               existing SHS algorithm for the detection of payload[9].
                             TABLE 1:

                     ALGORITHM FOR SHDFT



      Algorithm for SHDFT
      • Input: The test image
      • Output: SVM classifies the test image as
            cover or stego image.
 1.    Separation of the color planes, c ∈ {r, g, b} of                        (a)                             (b)
       the color image.
 2.    Build Histogram (1D) for each color planes
       c ∈ {r, g, b}. Compute the 1st and 2nd moments
       i.e., mean and variance of the histogram
       coefficients. This yields 6D statistics.
 3.    Build Discrete Fourier Transform for histogram
       of each color planes, c ∈ {r, g, b}. Compute the                        (c)                             (d)
       1st, 2nd, 3rd and 4th moments i.e., mean variance,
       skewness and kurtosis of the DFT coefficients.
       This yields 12D statistics. Also compute the
       total energy for the DFT coefficients. This
       yields 3D more statistics.
 4.    The 1st order moment Mean of the difference of
       histogram and DFT is computed for each color                            (e)                            (f)
       channel. This yields 3D statistics.                              Figure 2: The payload images (a)( b), BMP cover
 5.    The feature vectors obtained from steps 2, 3 and                    image (c)( d) and JPEG cover image (e)(f).
       4 yields 24D features.
 6.    The feature vectors obtained in steps 5 are used
       to train SVM to classify test image.



              V. PERFORMANCE ANALYSIS
    For the performance analysis we consider 100 color
images of JPEG and BMP formats with 600*400 pixels
in size (86 kilobytes). Figure 2 (a)(b) shows the payload.
Figure2 (c)(d) and (e)( f) gives the cover images of BMP
and JPEG formats respectively. The payload of various
sizes is embedded into the full-resolution cover images to
                                                              19
© 2010 ACEEE
DOI: 01.ijsip.01.01.04
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


                                                                                                           VI. CONCLUSION
                                            TABLE 2

           EMBEDDING RATE FOR BMP IMAGES USING S-TOOLS                               In the wake of a number of steganographic techniques
                                                                                  being developed, steganalysis needs to have a universal
                                                                                  approach. We present a steganalysis technique that relies
                         Embedding           Detection Rate (%)                   on building a Statistical Model using the Histogram and
                         Rate (%)        SHDFT          SHS                       Discrete Fourier Transform. SVM is used for
                         100             96.42          85.71                     classification of stego and cover images. This Model has
                         78              92.67          78.57                     fairly higher detection rates and comparatively
                         20              89.87          71.42                     computation time is less, as the numbers of features
                          5              86.78          64.28                     required to train the SVM is much lesser than other
                                                                                  techniques. In future, the algorithm may be tested for
                                                                                  embedding rate less than 5%.
                                S-Tools                 SHDFT
                                                        SHS
                                                                                                          REFERENCES
                          100
                           90
    Detection Rate (%)




                           80
                           70                                                     [1]     D. Kahn, “The History of Steganography,” Lecture Notes
                           60                                                             in Computer Science, Springer-Verlag, vol. 1174, 1996.
                           50                                                     [2]     R. Anderson and F. Petitcolas, “On the Limits of
                           40                                                             Steganography,” IEEE Journal on Selected Areas in
                           30                                                             Communications, vol. 16, no. 4, pp. 474–481, 1998.
                           20                                                     [3]      E. Petitcolas, R. Anderson and M. Kuhn, “Information
                           10                                                             Hiding – a Survey,” Proceedings of the IEEEs, vol. 87,
                            0                                                             no. 7, pp. 1062–1078, 1999.
                                100         78          20               5
                                                                                  [4]     J. Fridrich, M. Goljan, and D. Hogea, “Steganalysis of
                                      Embedding Rate (% )                                 JPEG images: Breaking the F5 Algorithm,” International
                                                                                          Workshop on Information Hiding, Lecture Notes in
                                                                                          Computer Science, Springer-Verlag, vol. 2578, pp. 310-
 Figure 3: Comparison of Detection rate for various payload sizes for                     323, 2003.
    SHDFT and SHS algorithm for BMP images using OC-SVM.                          [5]     S. Lyu and H. Farid, “Detecting Hidden Messages using
                                                                                          Higher Order Statistics and Support Vector Machines,”,
                     TABLE 3                                                              International Workshop on Information Hiding, Lecture
    EMBEDDING RATE FOR JPEG IMAGES USING JPHIDE                                           Notes in Computer Science, Springer-Verlag, vol. 2578,
                                                                                          pp. 340-354,
                                                                                  [6]     S. Lyu and H. Farid, “Steganalysis using Color Wavelet
                    Embedding                Detection Rate (%)
                                                                                          Statistics and One-Class Support Vector Machines,” in
                    Rate (%)           SHDFT           SHS                                SPIE Symposium on Electronic Imaging, vol. 5306, pp.
                    100                98.67           89.91                              35-46, 2004.
                    78                 95.73           80.57                      [7]     E. P. Simoncelli, “Statistical Modelling of Photographic
                                                                                          Images,” in Handbook of Image and Video Processing, A.
                    20                 91.32           76.42                              Bovik, Ed. Academic Press, chapter 4.7, Second Edition,
                     5                 86.78           68.28                              2005.
                                                                                  [8]     Hany Farid and Siwei Lyu, “Higher-order Wavelet
                                                                                          Statistics and their Application to Digital Forensics,”
                                                             SHDFT                        IEEE Workshop on Statistical Analysis in Computer
                                JPhide                       SHS                          Vision, 2003.
                                                                                  [9]     Siwei Lyu and Hany Farid, “Steganalysis using Higher-
                         100
                                                                                          Order Image Statistics,” IEEE Transaction on
                          90
                                                                                          Information Forensics and Security, vol. 1, pp. 111-119,
                          80
                                                                                          2006.
    Detection Rate (%)




                          70
                          60
                          50
                                                                                                              Mrs. Manjula Devi T.H is an
                          40
                                                                                                             Assistant Professor in the
                          30
                                                                                                             Department                of
                          20
                          10
                                                                                                             Telecommunication     Engg,
                           0
                                                                                                             Dayananda Sagar College of
                                100        78          20            5                                       Engg,      Bangalore.   She
                                      Embedding Rate (% )                                                    obtained her B.E. degree in
                                                                                                             Electronics    Engg    from
  Figure 4: Comparison of Detection rate for various payload sizes for
                                                                                                             Bangalore University. Her
     SHDFT and SHS algorithm for JPEG images using OC-SVM                                                    specialization in Master
                                                                                        degree was Electronics & Communication from

                                                                             20
© 2010 ACEEE
DOI: 01.ijsip.01.01.04
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


  Bangalore University and currently she is pursuing                Economics from Bangalore University and Ph.D. in
  Ph.D. in the area of Steganography and Steganalysis               Computer Science from Indian Institute of
  under the guidance of Dr. K. B. Raja, Asst. Professor,            Technology, Madras. He has a distinguished academic
  Dept of Electronics and Communication Engg,                       career and has degrees in Electronics, Economics,
  University Visvesvaraya college of Engg, Bangalore.               Law,      Business     Finance,     Public   Relations,
  Her area of interest is in the field of Signal Processing,        Communications, Industrial Relations, Computer
  Communication and Control Systems. She is the life                Science and Journalism. He has authored 27 books on
  member of International Microelectronics And                      Computer Science and Economics, which include
  Packaging Society (IMAPS) India Chapter, and Indian               Petrodollar and the World Economy, C Aptitude,
  society for Technical Education.                                  Mastering C, Microprocessor Programming, Mastering
                                                                    C++ etc. He has been serving as the Professor and
                        Mr. H.S.Manjunatha Reddy is a               Chairman, Department of Computer Science and
                        Professor in the department of              Engineering, University Visvesvaraya College of
                        Electronics and Communication               Engineering, Bangalore University, Bangalore. During
                        Engineering, Global Academy                 his three decades of service at UVCE he has over 200
                        of Technology, Bangalore. He                research papers to his credit. His research interests
                        obtained his B.E. Degree in                 include computer networks, parallel and distributed
                        Electronics from Bangalore                  systems, digital signal processing and data mining.
                        University, Bangalore. His
                        specialization in Master degree
                        was Digital Electronics from                L M Patnaik is a Vice Chancellor, Defence Institute of
                        Visvesvaraya      Technological                                    Advanced Technology (Deemed
  University, Belgaum. He is pursuing research in the                                      University), Pune, India. During
  area of Steganography and Steganalysis for secured                                       the past 35 years of his service
  communication. His area of interest is in the field of                                   at the Indian Institute of
  Digital Image Processing, Communication Networks                                         Science, Bangalore. He has over
  and Biometrics. He is life member of Indian Society                                      500 research publications in
  for Technical Education, New Delhi.                                                      refereed International Journals
                                                                                           and Conference Proceedings.
                       K B Raja is an Assistant                                            He is a Fellow of all the four
                       Professor, Dept. of Electronics                                     leading       Science        and
                       and Communication Engg,                                             Engineering Academies in
                       University Visvesvaraya college              India; Fellow of the IEEE and the Academy of Science
                       of Engg, Bangalore University,               for the Developing World. He has received twenty
                       Bangalore. He obtained his                   national and international awards; notable among them
                       Bachelor of Engineering and                  is the IEEE Technical Achievement Award for his
                       Master of Engineering in                     significant contributions to high performance
                       Electronics and Communication                computing and soft computing. His areas of research
                       Engineering from University                  interest have been parallel and distributed computing,
                       Visvesvaraya     College     of              mobile computing, CAD for VLSI circuits, soft
  Engineering, Bangalore. He was awarded Ph.D. in                   computing, and computational neuroscience.
  Computer Science and Engineering from Bangalore
  University. He has over 35 research publications in
  refereed International Journals and Conference
  Proceedings. His research interests include Image
  Processing, Biometrics, VLSI Signal Processing,
  computer networks.

                     K R Venugopal is currently the
                     Principal and Dean, Faculty of
                     Engineering,        University
                     Visvesvaraya    College     of
                     Engineering,        Bangalore
                     University,   Bangalore.   He
                     obtained his Bachelor of
                     Engineering from University
                     Visvesvaraya    College     of
                     Engineering. He received his
                     Masters degree in Computer
  Science and Automation from Indian Institute of
  Science Bangalore. He was awarded Ph.D. in

                                                               21
© 2010 ACEEE
DOI: 01.ijsip.01.01.04

More Related Content

What's hot

Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAnkita Dubey
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
Matlab project
Matlab projectMatlab project
Matlab projectshahu2212
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 MethodKaushik Chakraborty
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learningijtsrd
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED IJCERT JOURNAL
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...Journal For Research
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 

What's hot (19)

Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubey
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
E017443136
E017443136E017443136
E017443136
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
Matlab project
Matlab projectMatlab project
Matlab project
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 

Similar to Detecting Original Image Using Histogram, DFT and SVM

SasuriE ajal
SasuriE ajalSasuriE ajal
SasuriE ajalAJAL A J
 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IJNSA Journal
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based onacijjournal
 
A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESA Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESIRJET Journal
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm basedIJNSA Journal
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 

Similar to Detecting Original Image Using Histogram, DFT and SVM (20)

O017429398
O017429398O017429398
O017429398
 
G017444651
G017444651G017444651
G017444651
 
SasuriE ajal
SasuriE ajalSasuriE ajal
SasuriE ajal
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 
K0815660
K0815660K0815660
K0815660
 
Av4102350358
Av4102350358Av4102350358
Av4102350358
 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESA Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AES
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm based
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Detecting Original Image Using Histogram, DFT and SVM

  • 1. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Detecting Original Image Using Histogram, DFT and SVM T. H. Manjula Devi1, H.S.Manjunatha Reddy,2 K. B. Raja3Venugopal K. R3 and L. M. Patnaik4 1 Department of Telecommunication Engg, Dayananda Sagar College of Engineering, Bangalore 2 Department of Electronics & Communication, Global Academy of Technology 3 Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore 4 Vice chancellor, Defence Institute of Advanced Technology, Puna. thm0303@gmail.com Abstract specific). In case of universal technique, the embedding scheme is unknown; so attempt is made to detect the Information hiding for covert communication is rapidly existence of hidden data. Whereas in embedding specific, gaining momentum. With sophisticated techniques being the embedding technique is known; therefore payload developed in steganography, steganalysis needs to be universal. In this paper we propose Universal Steganalysis size is estimated. There are Steganalysis Tools available using Histogram, Discrete Fourier Transform and SVM freely or as commercial software. The Stegdetect Tool, (SHDFT). The stego image has irregular statistical detects Jsteg, Jphide, invisible secrets, Outguess, F5, characteristics as compare to cover image. Using Histogram camouflage Steganographic schemes in JPEG images. and DFT, the statistical features are generated to train One- The Tools developed using the Chi-Square analysis, Class SVM to discriminate the cover and stego image. performs a statistical attack to detect hidden data in BMP SHDFT algorithm is found to be efficient and fast since the images. number of statistical features is less compared to the The success of steganography depends on various existing algorithm. aspects such as the algorithm used for embedding, compression algorithm used and alteration of image properties. LSB is most commonly used technique for Keywords: Universal Steganalysis, Cover-Medium, Payload, Redundant Bits, Total Cover Capacity, Histogram, DFT, image steganography, which uses bitwise methods to SVM. manipulate LSB of the cover image. The minute changes of LSB are imperceptible to human eye and the method I. INTRODUCTION of hiding information in LSB can be analogized by adding noise to the image. Reliable algorithms for Since long time ago, surreptitious communication compression used in Steganography are Windows Bitmap and exchange of information is well known. There are (BMP), Graphics Interchange Format (GIF) and Joint numerous illustrations depicting covertness used in Photographic Experts Group (JPEG), to ensure the communication. Steganography, water marking, hidden information is not lost after transformation. cryptography are some of the techniques used for hiding Lossless compression algorithms such as BMP and GIF information [1]. There are several mediums for hiding formats are chosen for LSB techniques in which information, such as digital images, text, audio, web modifications are usually made in spatial domain. JPEG pages, video, etc. Steganography is a skill and discipline is losy compression algorithm where data hiding is of embedding a secret payload into a cover medium. The usually done in frequency domain. redundant bits in the cover medium are identified and General Steganalysis method has not been developed replaced with the payload. The intent of steganography is since every Steganographic method utilizes different ensuring that the presence of hidden message is methods of embedding the payload. In classical undetectable. The different techniques used for Steganographic schemes, the security lies in the embedding of data are Least Significant Bit (LSB), concealment of the encoding technique whereas the Discrete Cosine Transform (DCT), Discrete Wavelet modern schemes adopt Kerchoff’s Principle of Transform (DWT), Spread Spectrum (SS) and Palette Cryptography, and hence the security depends on the technique. There are software tools available over the secret key that is used to encode the payload. Internet for embedding the payload in digital images and There are several Classifiers being used for pattern videos viz., S-Tools, J-Steg, Outguess, F5 and Steghide. recognition: Bayesian Multi-Variate, Fischer Linear Discriminant (FLD), Neural Network (NN), and Support The steganography is being used by criminals and Vector Machines (SVM). SVM is based on statistical terrorists to exchange information regarding their illegal learning theory which is highly dependent upon the activities. The government and other standard kernel functions viz., Gaussian Radial Basis Function, organizations are using steganalysis to restrain these Polynomial, Exponential Radial Basis Function, Multi- illegal activities. Steganalysis is to discover and Layer Perceptron, Splines, BSplines, Additive Kernels recognize the extent of a hidden message and can be and Tensor Product are used for mapping features. SVM either blind (universal) or non-blind (embedding can be classified as One-Class and Multi-Class. In One- 17 © 2010 ACEEE DOI: 01.ijsip.01.01.04
  • 2. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Class SVM, only the features of cover images are for images. The statistical regularities exhibited by the required for classification of cover and stego image natural images are captured by First and Higher Order whereas in Multi-Class SVM, the features of both the Statistical Model. The FLD is used for classification of cover and stego-images are required for discriminating the cover and stego image. This model explores its the cover and stego image. Owing to simple geometry, usefulness in digital forensics including steganography; SVMs are used more predominantly than Neural distinguish between natural photographs and computer Networks. Biggest limitation of SVM is choosing of the generated images. kernel function, speed and size, both in training and Siwei Lyu and Hany Farid [9] have proposed testing. universal Steganalysis using Higher Order Statistics Contribution: In this paper, we have proposed (SHS). Wavelet Decomposition based on QMF is used to SHDFT Universal Steganalysis Method. Histogram and obtain the statistics of an image. The magnitude statistics Discrete Fourier Transform of color images are computed is obtained from Linear Predictor and phase statistics is to obtain the PDF moments. In addition, the energy of the obtained from Gaussian Pyramid and Local Angular image is considered. The non-linear Classifier Support Harmonic Decomposition. One Class and Multi Class Vector Machine is used for classification of cover and SVM is used for classification. The disadvantage of the stego image. algorithm is the number of features required to train the SVM are high. Hence, the time required to detect stego II. RELATED WORK image is more. Anderson and Petitcolas [2] have proposed two III. MODEL mathematical frame works for Steganography: informatics and theoretical models. The quality of the The steganalysis model is discussed in this section. retrieved image is poor in this algorithm. Petitcolas et al., Steganalysis Model [3] have discussed a survey on information hiding. The applications and the terminologies used in information hiding are elucidated. Certain limitations of information Figure 1 gives the block diagram of SHDFT to hiding have been portrayed, the JPEG compression, low discriminate cover and stego images using SVM. pass filtering, cropping, scaling, Additive Gaussian noise, Color image: JPEG and BMP color images are used rotation, cause distortion in the image. An important for the analysis. It consists of RGB color planes, c ∈ {r, understanding of these limitations is helpful in g, b}. The color planes are separated and 1D-Histogram steganalysis. is applied to each of the separated color planes of the image. Fridich et al., [4] have presented a steganalytic Histogram: Histograms are the basis for numerous method to identify stego image generated by F5 spatial domain processing techniques used to provide steganographic algorithm in JPEG images reliably. The useful image statistics. Image processing operations such method involves estimation of the cover image histogram as steganography result in changes to the image from the stego image. The statistical variation of cover histogram. The histogram is applied on each color plane image is determined using the Least Square Fit, which of the image. The first and second PDF moments i.e., the compares estimated histogram of DCT coefficients of mean and the variance of the histogram coefficients of stego-image. This technique can be extended to other each colour plane are calculated which yields 6D steganographic algorithms that manipulate quantized statistical features. DCT coefficients. Siwei Lyu and Hany Farid [5] have Discrete Fourier Transform (DFT): The sequence of described an approach of multi-scale Wavelet N spatial complex coefficients x0, x1,…….., xN-1 is Decomposition to build Higher Order Statistical Model to transformed into the sequence of N frequency complex detect hidden data in gray images. Support Vector coefficients X(0), X(1),…….., X(N-1) by the DFT Machine is used to detect the statistical variations in a according to the formula as given in Equation test image. N −1 − i 2πnk Farid [6] has described a steganalytic method to detect hidden messages using Wavelet Decomposition by X(k)= ∑ x(n) exp( n =0 N ) building Higher Order Statistical Model of the image. Where n=0, 1… N-1 and k=0, 1… N-1. The model extracts basic coefficient statistics and error DFT for Histogram of each color channel, c ∈ {r, g, b} statistics from an optimal magnitude predictor. FLD is is applied. The PDF moments i.e., mean, variance, used to distinguish the cover and stego image. Siwei Lyu skewness and kurtosis of the DFT coefficients are and Hany Farid [7] have described a Universal computed which yields 12D statistics. The total energy Steganalysis Algorithm that exploits strong statistical for DFT coefficients is computed which yields 3D regularities that exist between the color channels of Statistics. natural images. The statistical model is generated using SVM: In One-Class SVM, only the features of cover first and Higher Order Statistics of the image. One Class images are required for classification of cover and stego SVM is used to detect hidden data. image. The feature vector comprising 24D statistics is Hany Farid and Siwei Lyu [8] have employed Multi- used to train the SVM. Scale Wavelet Decomposition to build a statistical model 18 © 2010 ACEEE DOI: 01.ijsip.01.01.04
  • 3. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 generate 100 stego images Using Jphide software for JPEG images and S-Tools 4.0 software for BMP images. Color image The payload is of the size 6.0, 4.7, 1.2, 0.3 kilobytes, corresponding to 100%, 78%, 20% and 5% Of total cover capacity The capacity will vary according to the size of the cover image. The steganographic capacity is 1D Histogram Feature Vector then the ratio of the size of the embedded payload to the total cover capacity. Each stego image is generated with the same quality factor as that of the original cover image so as to minimize the statistical variations. Figure 3 and Table 2 gives the comparison of the detection rate for the DFT One-Class SVM proposed algorithm SHDFT and existing algorithm SHS for different embedding rate in BMP images using S- Tools. It is observed that the percentage of detection rate Figure 1: Block Diagram of SHDFT increases as embedding rate increases for both the algorithms. Figure 4 and Table 3 gives the comparison of Features:We find the mean of the difference between the detection rate for the proposed algorithm SHDFT and DFT and Histogram for each color plane which yields 3D existing algorithm SHS for different embedding rate in statistics. SHDFT totally yields 24D characteristics which JPEG images using JPhide and S-Tools. The proposed are used to discriminate the cover and stego image. algorithm SHDFT requires only 24D statistics for training SVM as compared to 432D statistics required for IV. ALGORITHM existing SHS algorithm for the detection of payload[9]. TABLE 1: ALGORITHM FOR SHDFT Algorithm for SHDFT • Input: The test image • Output: SVM classifies the test image as cover or stego image. 1. Separation of the color planes, c ∈ {r, g, b} of (a) (b) the color image. 2. Build Histogram (1D) for each color planes c ∈ {r, g, b}. Compute the 1st and 2nd moments i.e., mean and variance of the histogram coefficients. This yields 6D statistics. 3. Build Discrete Fourier Transform for histogram of each color planes, c ∈ {r, g, b}. Compute the (c) (d) 1st, 2nd, 3rd and 4th moments i.e., mean variance, skewness and kurtosis of the DFT coefficients. This yields 12D statistics. Also compute the total energy for the DFT coefficients. This yields 3D more statistics. 4. The 1st order moment Mean of the difference of histogram and DFT is computed for each color (e) (f) channel. This yields 3D statistics. Figure 2: The payload images (a)( b), BMP cover 5. The feature vectors obtained from steps 2, 3 and image (c)( d) and JPEG cover image (e)(f). 4 yields 24D features. 6. The feature vectors obtained in steps 5 are used to train SVM to classify test image. V. PERFORMANCE ANALYSIS For the performance analysis we consider 100 color images of JPEG and BMP formats with 600*400 pixels in size (86 kilobytes). Figure 2 (a)(b) shows the payload. Figure2 (c)(d) and (e)( f) gives the cover images of BMP and JPEG formats respectively. The payload of various sizes is embedded into the full-resolution cover images to 19 © 2010 ACEEE DOI: 01.ijsip.01.01.04
  • 4. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 VI. CONCLUSION TABLE 2 EMBEDDING RATE FOR BMP IMAGES USING S-TOOLS In the wake of a number of steganographic techniques being developed, steganalysis needs to have a universal approach. We present a steganalysis technique that relies Embedding Detection Rate (%) on building a Statistical Model using the Histogram and Rate (%) SHDFT SHS Discrete Fourier Transform. SVM is used for 100 96.42 85.71 classification of stego and cover images. This Model has 78 92.67 78.57 fairly higher detection rates and comparatively 20 89.87 71.42 computation time is less, as the numbers of features 5 86.78 64.28 required to train the SVM is much lesser than other techniques. In future, the algorithm may be tested for embedding rate less than 5%. S-Tools SHDFT SHS REFERENCES 100 90 Detection Rate (%) 80 70 [1] D. Kahn, “The History of Steganography,” Lecture Notes 60 in Computer Science, Springer-Verlag, vol. 1174, 1996. 50 [2] R. Anderson and F. Petitcolas, “On the Limits of 40 Steganography,” IEEE Journal on Selected Areas in 30 Communications, vol. 16, no. 4, pp. 474–481, 1998. 20 [3] E. Petitcolas, R. Anderson and M. Kuhn, “Information 10 Hiding – a Survey,” Proceedings of the IEEEs, vol. 87, 0 no. 7, pp. 1062–1078, 1999. 100 78 20 5 [4] J. Fridrich, M. Goljan, and D. Hogea, “Steganalysis of Embedding Rate (% ) JPEG images: Breaking the F5 Algorithm,” International Workshop on Information Hiding, Lecture Notes in Computer Science, Springer-Verlag, vol. 2578, pp. 310- Figure 3: Comparison of Detection rate for various payload sizes for 323, 2003. SHDFT and SHS algorithm for BMP images using OC-SVM. [5] S. Lyu and H. Farid, “Detecting Hidden Messages using Higher Order Statistics and Support Vector Machines,”, TABLE 3 International Workshop on Information Hiding, Lecture EMBEDDING RATE FOR JPEG IMAGES USING JPHIDE Notes in Computer Science, Springer-Verlag, vol. 2578, pp. 340-354, [6] S. Lyu and H. Farid, “Steganalysis using Color Wavelet Embedding Detection Rate (%) Statistics and One-Class Support Vector Machines,” in Rate (%) SHDFT SHS SPIE Symposium on Electronic Imaging, vol. 5306, pp. 100 98.67 89.91 35-46, 2004. 78 95.73 80.57 [7] E. P. Simoncelli, “Statistical Modelling of Photographic Images,” in Handbook of Image and Video Processing, A. 20 91.32 76.42 Bovik, Ed. Academic Press, chapter 4.7, Second Edition, 5 86.78 68.28 2005. [8] Hany Farid and Siwei Lyu, “Higher-order Wavelet Statistics and their Application to Digital Forensics,” SHDFT IEEE Workshop on Statistical Analysis in Computer JPhide SHS Vision, 2003. [9] Siwei Lyu and Hany Farid, “Steganalysis using Higher- 100 Order Image Statistics,” IEEE Transaction on 90 Information Forensics and Security, vol. 1, pp. 111-119, 80 2006. Detection Rate (%) 70 60 50 Mrs. Manjula Devi T.H is an 40 Assistant Professor in the 30 Department of 20 10 Telecommunication Engg, 0 Dayananda Sagar College of 100 78 20 5 Engg, Bangalore. She Embedding Rate (% ) obtained her B.E. degree in Electronics Engg from Figure 4: Comparison of Detection rate for various payload sizes for Bangalore University. Her SHDFT and SHS algorithm for JPEG images using OC-SVM specialization in Master degree was Electronics & Communication from 20 © 2010 ACEEE DOI: 01.ijsip.01.01.04
  • 5. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Bangalore University and currently she is pursuing Economics from Bangalore University and Ph.D. in Ph.D. in the area of Steganography and Steganalysis Computer Science from Indian Institute of under the guidance of Dr. K. B. Raja, Asst. Professor, Technology, Madras. He has a distinguished academic Dept of Electronics and Communication Engg, career and has degrees in Electronics, Economics, University Visvesvaraya college of Engg, Bangalore. Law, Business Finance, Public Relations, Her area of interest is in the field of Signal Processing, Communications, Industrial Relations, Computer Communication and Control Systems. She is the life Science and Journalism. He has authored 27 books on member of International Microelectronics And Computer Science and Economics, which include Packaging Society (IMAPS) India Chapter, and Indian Petrodollar and the World Economy, C Aptitude, society for Technical Education. Mastering C, Microprocessor Programming, Mastering C++ etc. He has been serving as the Professor and Mr. H.S.Manjunatha Reddy is a Chairman, Department of Computer Science and Professor in the department of Engineering, University Visvesvaraya College of Electronics and Communication Engineering, Bangalore University, Bangalore. During Engineering, Global Academy his three decades of service at UVCE he has over 200 of Technology, Bangalore. He research papers to his credit. His research interests obtained his B.E. Degree in include computer networks, parallel and distributed Electronics from Bangalore systems, digital signal processing and data mining. University, Bangalore. His specialization in Master degree was Digital Electronics from L M Patnaik is a Vice Chancellor, Defence Institute of Visvesvaraya Technological Advanced Technology (Deemed University, Belgaum. He is pursuing research in the University), Pune, India. During area of Steganography and Steganalysis for secured the past 35 years of his service communication. His area of interest is in the field of at the Indian Institute of Digital Image Processing, Communication Networks Science, Bangalore. He has over and Biometrics. He is life member of Indian Society 500 research publications in for Technical Education, New Delhi. refereed International Journals and Conference Proceedings. K B Raja is an Assistant He is a Fellow of all the four Professor, Dept. of Electronics leading Science and and Communication Engg, Engineering Academies in University Visvesvaraya college India; Fellow of the IEEE and the Academy of Science of Engg, Bangalore University, for the Developing World. He has received twenty Bangalore. He obtained his national and international awards; notable among them Bachelor of Engineering and is the IEEE Technical Achievement Award for his Master of Engineering in significant contributions to high performance Electronics and Communication computing and soft computing. His areas of research Engineering from University interest have been parallel and distributed computing, Visvesvaraya College of mobile computing, CAD for VLSI circuits, soft Engineering, Bangalore. He was awarded Ph.D. in computing, and computational neuroscience. Computer Science and Engineering from Bangalore University. He has over 35 research publications in refereed International Journals and Conference Proceedings. His research interests include Image Processing, Biometrics, VLSI Signal Processing, computer networks. K R Venugopal is currently the Principal and Dean, Faculty of Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore. He obtained his Bachelor of Engineering from University Visvesvaraya College of Engineering. He received his Masters degree in Computer Science and Automation from Indian Institute of Science Bangalore. He was awarded Ph.D. in 21 © 2010 ACEEE DOI: 01.ijsip.01.01.04