An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

This paper deals with the study of interest in the fields
of Steganography and Steganalysis. Steganography involves hiding
information in a cover media to obtain the stego media in such a
way that the cover media is perceived not to have any embedded
message for its unintended recipients. Steganalysis is the mechanism
of detecting the presence of hidden information in the stego media
and it can lead to the prevention of disastrous security incidents. In
this paper, we provide a critical review of the steganalysis algorithms
available to analyze the characteristics of an image stego media
against the corresponding cover media and understand the process
of embedding the information and its detection. We anticipate that
this paper can also give a clear picture of the current trends in
steganography so that we can develop and improvise appropriate
steganalysis algorithms.




References:
[1] H. Gharsellaoui, M. Khalgui, S. Ben Ahmed. Preemptive Hard Real-time
Scheduling of Reconfigurable OS Tasks on Multiprocessors Embedded
Control Systems. PECCS - Proceedings of the 4th International
Conference on Pervasive and Embedded Computing and Communication
Systems, 192–197, Lisbon, Portugal, 7-9 January, 2014.
[2] H. Kekre, A. Athawale, T. Sarode, S. Thepade and K. Sagvekar.
Steganography Using Dictionary Sort on Vector Quantized Codebook.
International Journal of Computer Science and Security (IJCSS), vol. 4,
no. 4, pp. 392–402, 2010.
[3] V. Michopoulos, L. Guan, G. Oikonomou, I. Phillips. DCCC6: Duty
Cycle-aware congestion control for 6LoWPAN networks. Proceedings
of the IEEE International Conference on Pervasive Computing and
Communications Workshops (PERCOM Workshops), 278–283, 2012.
[4] D. Stinson. Cryptography: Theory and Practice. 2nd Edition, Chapman
and Hall, CRC, 2002. [5] N. Johnson and S. Jajodia. Steganalysis of Images Created using Current
Steganography Software. Lecture Notes in Computer Science, vol. 1525,
pp. 32–47, Springer Verlag, 1998.
[6] J. Fridrich, M. Goljan, D. Hogea and D. Soukal. Quantitative Steganalysis
of Digital Images: Estimating the Secret Message Length. ACM
Multimedia Systems Journal, Special issue on Multimedia Security, vol.
9, no. 3, pp. 288–302, 2003.
[7] A. Westfeld and A. Pfitzmann. Attacks on Steganographic Systems.
Proceedings of the 3rd International Workshop on Information Hiding,
pp. 61–76, 1999.
[8] S. Dumitrescu, X. Wu and N. Memon. On Steganalysis of Random LSB
Embedding in Continuous tone Images. Proceedings of the International
Conference on Image Processing, vol. 3, pp. 641– 644, June 2002.
[9] J. Fridrich and M. Long. Steganalysis of LSB Encoding in Color Images.
Proceedings of the IEEE International Conference on Multimedia and
Expo (ICME), vol. 3, pp. 1279–1282, New York, NY, USA, July August
2000.
[10] A. Westfeld. F5 A Steganographic Algorithm. Lecture Notes in
Computer Science, vol. 2137, pp. 289–302, January 2001.
[11] I. Avcibas, N. Memon and B. Sankur. Steganalysis using Image Quality
Metrics. IEEE Transactions on Image Processing, vol. 12, no. 2, pp.
221–229, February 2003.
[12] I. Avcibas, N. Memon and B. Sankur. Image Steganalysis with Binary
Similarity Measures. Proceedings of the IEEE International Conference
on Image Processing, vol. 3, pp. 645–648, June 2002.
[13] N. Champakamala, K. Padmini, D.K. Radhika. Least Significant Bit
algorithm for image steganography. International Journal of Advance
Computer Technology, vol(3), N. 4, pages 34–38, 2013.
[14] N. Meghanathan and L. Nayak. Steganalysis Algorithms For Detecting
The Hidden Information In Image, Audio And Video Cover Media.
International Journal of Network Security & Its Application (IJNSA),
Vol.2, No.1, pp. 43–55, 2010.