Advertisement

Steganalysis Method for Detecting Embedded Coefficients of Discrete-Wavelet Image Transformation into High-Frequency Domains

  • Alexey V. SivachevEmail author
  • Daniil A. Bashmakov
  • Olga V. Mikhailishenko
  • Anatoliy G. Korobeynikov
  • Roland Rieke
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 971)

Abstract

The paper deals with a research aimed at providing the highest performance of detection of an embedding into a wavelet-domain image, in particular in LH and HL subbands, due to the combined use of several methods proposed by the authors. The paper discusses various methods for enhancing detection of the embedding into a wavelet-domain image as proposed by the authors for their possible combined use in order to ensure the best possible performance of detecting the embedding into a wavelet-domain image. These methods use the features of the wavelet’s transform, interrelations of various domains of the coefficients obtained by the wavelet transform of the image, or peculiar features or frequency domain of images. By the results of this research, a steganalysis method is proposed, based on the combined use of the above-described methods for increasing the steganalysis efficiency, which allows providing a better performance of detection of a wavelet-domain image embedding compared with existing methods of the steganalysis. The proposed methods of increasing the efficiency of steganalysis will improve the effectiveness of the steganalysis of information embedded in the LH and HL subbands by 4–7% in comparison with the already existing methods. The proposed method is based on combining them and allows you to get an additional increase in efficiency by 1–3%. The results of the given research can be useful for the experts, dealing with the information security problems while detecting and counteracting with the hidden data channel, based on the use of steganography, including in the mobile Internet. The obtained results can be used in the development of steganalysis systems.

Keywords

Steganography Stego image Steganalysis Binary classification The Haar wavelet Discrete wavelet transform (DWT) Image frequency domain Discrete cosine transformation (DCT) Discrete sine transformation (DST) 

Notes

Acknowledgements

This work was supported by Government of Russian Federation (Grant 08-08).

References

  1. 1.
  2. 2.
    Security foresignt: Steganography: BISA: Business information security association. http://bis-expert.ru/blog/660/56301
  3. 3.
    Evsyutin, O., Negacheva, E.: Steganographic embedding of information into digital images, compressed using block cellular automaton. Reports of Tomsk State University of Control Systems and Radioelectronics, no. 4(30), pp. 130–135 (2013)Google Scholar
  4. 4.
    Vyas, A., Dudul, S.: Study of image steganalysis techniques. Int. J. Adv. Res. Comput. Sci. 6(8), 7–11 (2015)Google Scholar
  5. 5.
    Kotenko, I., Saenko, I., Kushnerevich, A.: Parallel big data processing system for security monitoring in Internet of Things networks. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 8(4), 60–74 (2017)Google Scholar
  6. 6.
    Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.: Design technique for secure embedded devices: application for creation of integrated cyber-physical security system. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 7(2), 60–80 (2016)Google Scholar
  7. 7.
    Sivachev, A., Prokhozhev, N., Mikhaylichenko, O.: Improving of steganalysis accuracy by optimizing parameters of wavelet transformation methods. Sci. Tech. Newsl. Inf. Technol. Mech. Optics 1, 113–121 (2018)Google Scholar
  8. 8.
    Kolomeec, M., Chechulin, A., Pronoza, A., Kotenko, I.: Technique of data visualization: example of network topology display for security monitoring. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 7(1), 58–78 (2016)Google Scholar
  9. 9.
    Hashem, Y., Takabi, H., GhasemiGol, M., Dantu, R.: Inside the mind of the insider: towards insider threat detection using psychophysiological signals. J. Internet Serv. Inf. Secur. (JISIS) 6(1), 20–36 (2016)Google Scholar
  10. 10.
    Kumar, G., Jithin, R., Deepa, D.: Shankar feature based steganalysis using wavelet decomposition and magnitude statistics. In: Advances in Computer Engineering (ACE), pp. 298–300 (2010)Google Scholar
  11. 11.
    Farid, H.: Detecting Steganographic Messages in Digital Images. Technical report TR2001-412, Dartmouth College, Computer Science Department (2001)Google Scholar
  12. 12.
    Liu, C., Ouyang, C., Guo, M., Chen, H.: Image steganalysis based on spatial domain and DWT domain features. In: Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 01, pp. 329–331 (2010)Google Scholar
  13. 13.
    Shi, Y., et al.: Effective steganalysis based on statistical moments of wavelet characteristic function. In: IEEE Conference on Information Technology: Coding and Computation (ITCC05), Las Vegas, Nevada, USA (2005)Google Scholar
  14. 14.
    Sivachev, A., Prokhozhev, N., Mikhailichenko, O., Bashmakov, D.: Efficiency of steganalysis based on machine learning methods. Sci. Tech. Newsl. Inf. Technol. Mech. Opt. 17(3), 457–466 (2017)Google Scholar
  15. 15.
    Sivachev, A., Mikhaylichenko, O., Prokhozhev, N., Bashmakov, D.: Improved accuracy in DWT steganalysis by using the correlation between domains of bi-dimensional and single-dimensional decompositions. Cybern. Program. 2, 78–87 (2017)Google Scholar
  16. 16.
    Sivachev, A.: Increase of steganalysis efficiency of DWT image domain by analyzing the image domain frequency parameters. Cybern. Program. 2, 29–37 (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Saint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University)St. PetersburgRussia
  2. 2.Pushkov Institute of Terrestrial Magnetism, Ionosphere and Radio Wave Propagation of the Russian Academy of Sciences St.-Petersburg FilialSt. PetersburgRussia
  3. 3.Fraunhofer-Institute for Secure Information Technology SITDarmstadtGermany

Personalised recommendations