Professional Documents
Culture Documents
-chandana kaza
Steganography
Steganalysis
Conventional methods
Machine learning based steganalysis
Experiments and results
Transmit secret messages.
Best suited
◦ Gray scale images
Technique
◦ Let pixel value=j
◦ If j=2i, after flip j=2i+1
◦ If j=2i+1, after flip j=2i
Combines 2 pixel values 2i and 2i+1 together as a pair,
and the two values differ in the lowest bit.
Where k is the total number of all possible pixels.
Where F(G)=(F(x1),….f(xn))
The flipping function can be captured by a mask M,
In
the case of R-M and S-M the opposite
happens.
P is the length of message.
The initial measurement of R and S groups is RM(p/2),
I/p-images
O/p-class labels
Perform preprocessing
◦ Naïve Bayes
◦ Bayes networks
◦ Decision trees
◦ KNN
◦ SVM
◦ Neural networks
Apply ML-based classifier on POV3 algorithm.
The LSB bit-plane is treated as sequential pixel samples and
is split into 100 segments.
For every segment, the 2 probability for all the pixels from
the first segment to current one is calculated.
2. http://www.outguess.org/.
3. S. Antani, R. Kasturi, and R. Jain. A survey on the use of pattern recognition methods for abstraction,indexing and
retrieval of images and video. Pattern Recognition, 35(4):945{965, 2002.
4. G. Berg, I. Davidson, M.-Y. Duan, and G. Paul. Searching for hidden messages: Automatic detection of steganography. In
IAAI, pages 51-56, 2003.
5. M. Morkel. Steganography And Steganalysis, ICSA Research Group. University of Pretoria, South Africa. January 2005.
6. Y.-M. Di, H. Liu, A. Ramineni, and A. Sen. Detecting hidden information in images: A comparative study. In 2nd
Workshop on Privacy Preserving Data Mining (PPDM), 2003.
7. S. Dumitrescu, X. Wu, and Z. Wang. Detection of lsb steganography via sample pair analysis. InInformation Hiding 5th
International Workshop IH 2002 Revised Papers, Lecture Notes in ComputerScience vol. 2578, pages 355{372, 2003.
8. J. J. Fridrich. Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes.
In Information Hiding 6th International Workshop IH 2004 Revised Selected Papers, Lecture Notes in Computer Science vol.
3200,pages 67{81, 2004.
Thank you