Skip to main content

Active Warden Attack on Steganography Using Prewitt Filter

  • Conference paper
  • First Online:
Proceedings of the International Conference on Soft Computing Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 398))

Abstract

Digital Steganography is a method used to embed secret message in digital images. Attackers make use of steganographic method for the purpose of transmitting malicious messages. In this paper, we proposed active warden method by using Prewitt filter on the input image to highlight the edge locations. Then the Discrete Spring Transform (DST) is applied on the filtered image to relocate the pixel location so that secret message cannot be recovered. This method is a generic method since it is independent of the steganography algorithms used and it does not require any training sets. We have compared our results with the existing system which used Sobel filter and curve length method. Our experimental results concluded that Prewitt was able to destroy the message to larger extent than by using Sobel filter and curve length method. Bit error rate (BER) and PSNR was used to measure the performance of our system. Our method was able to preserve the perceptual quality of the image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cheddad A, Condell J, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90:727–752

    Article  MATH  Google Scholar 

  2. Dumitrescu S, Xiaolin W, Wang Z (2003) Detection of LSB steganography via sample pair analysis. Sig Process IEEE Trans 51:1995–2007

    Article  MATH  Google Scholar 

  3. Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings on multimedia and security: new challenges. ACM, pp 27–30

    Google Scholar 

  4. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. Inf Forensics Secur IEEE Trans 7:868–882

    Article  Google Scholar 

  5. Qi Q, Sharp A, Yang Y, Peng D, Sharif H (2014) Steganography attack based on discrete spring transform and image geometrization. In: Wireless communications and mobile computing conference (IWCMC). IEEE, pp 554–558

    Google Scholar 

  6. Sharp A, Qi Q, Yang Y, Peng D, Sharif H (2013) A novel active warden steganographic attack for next-generation steganography. In: 9th international conference on wireless communications and mobile computing (IWCMC). IEEE, pp 1138–1143

    Google Scholar 

  7. Sharp A, Qi Q, Yang Y, Peng D, Sharif H (2014) Frequency domain discrete spring transformed: a novel frequency domain steganographic attack. In: 9th International symposium on communication systems, networks & digital signal processing (CSNDSP). IEEE, pp 972–976

    Google Scholar 

  8. Qi Q, Sharp A, Peng D, Yang Y, Sharif H (2013) An active audio steganography attacking method using discrete spring transform. In: 24th international symposium on personal indoor and mobile radio communications (PIMRC). IEEE, pp 3456–3460

    Google Scholar 

  9. Gonzalez RC, Woods RE (2009) Digital image processing. Pearson Education, India

    Google Scholar 

  10. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626

    Article  MATH  Google Scholar 

  11. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. Secur Priv IEEE 1:32–44

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. P. Amritha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Amritha, P.P., Induja, K., Rajeev, K. (2016). Active Warden Attack on Steganography Using Prewitt Filter. In: Suresh, L., Panigrahi, B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, vol 398. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2674-1_56

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2674-1_56

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2672-7

  • Online ISBN: 978-81-322-2674-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics