Detecting Original Image Using Histogram, DFT and SVM
#1

Abstract
Information hiding for covert communication is rapidlygaining momentum. With sophisticated techniques beingdeveloped in steganography, steganalysis needs to beuniversal. In this paper we propose Universal Steganalysisusing Histogram, Discrete Fourier Transform and SVM(SHDFT). The stego image has irregular statisticalcharacteristics as compare to cover image. Using Histogramand DFT, the statistical features are generated to train One-Class SVM to discriminate the cover and stego image.SHDFT algorithm is found to be efficient and fast since thenumber of statistical features is less compared to theexisting algorithm.Keywords: Universal Steganalysis, Cover-Medium, Payload,Redundant Bits, Total Cover Capacity, Histogram, DFT,SVM.
I. INTRODUCTION
Since long time ago, surreptitious communicationand exchange of information is well known. There arenumerous illustrations depicting covertness used incommunication. Steganography, water marking,cryptography are some of the techniques used for hidinginformation [1]. There are several mediums for hidinginformation, such as digital images, text, audio, webpages, video, etc. Steganography is a skill and disciplineof embedding a secret payload into a cover medium. Theredundant bits in the cover medium are identified andreplaced with the payload. The intent of steganography isensuring that the presence of hidden message isundetectable. The different techniques used forembedding of data are Least Significant Bit (LSB),Discrete Cosine Transform (DCT), Discrete WaveletTransform (DWT), Spread Spectrum (SS) and Palettetechnique. There are software tools available over theInternet for embedding the payload in digital images andvideos viz., S-Tools, J-Steg, Outguess, F5 and Steghide.The steganography is being used by criminals andterrorists to exchange information regarding their illegalactivities. The government and other standardorganizations are using steganalysis to restrain theseillegal activities. Steganalysis is to discover andrecognize the extent of a hidden message and can beeither blind (universal) or non-blind (embeddingspecific). In case of universal technique, the embeddingscheme is unknown; so attempt is made to detect theexistence of hidden data. Whereas in embedding specific,the embedding technique is known; therefore payloadsize is estimated. There are Steganalysis Tools availablefreely or as commercial software. The Stegdetect Tool,detects Jsteg, Jphide, invisible secrets, Outguess, F5,camouflage Steganographic schemes in JPEG images.The Tools developed using the Chi-Square analysis,performs a statistical attack to detect hidden data in BMPimages.The success of steganography depends on variousaspects such as the algorithm used for embedding,compression algorithm used and alteration of imageproperties. LSB is most commonly used technique forimage steganography, which uses bitwise methods tomanipulate LSB of the cover image. The minute changesof LSB are imperceptible to human eye and the methodof hiding information in LSB can be analogized byadding noise to the image. Reliable algorithms forcompression used in Steganography are Windows Bitmap(BMP), Graphics Interchange Format (GIF) and JointPhotographic Experts Group (JPEG), to ensure thehidden information is not lost after transformation.Lossless compression algorithms such as BMP and GIFformats are chosen for LSB techniques in whichmodifications are usually made in spatial domain. JPEGis losy compression algorithm where data hiding isusually done in frequency domain.General Steganalysis method has not been developedsince every Steganographic method utilizes differentmethods of embedding the payload. In classicalSteganographic schemes, the security lies in theconcealment of the encoding technique whereas themodern schemes adopt Kerchoff’s Principle ofCryptography, and hence the security depends on thesecret key that is used to encode the payload.There are several Classifiers being used for patternrecognition: Bayesian Multi-Variate, Fischer LinearDiscriminant (FLD), Neural Network (NN), and SupportVector Machines (SVM). SVM is based on statisticallearning theory which is highly dependent upon thekernel functions viz., Gaussian Radial Basis Function,Polynomial, Exponential Radial Basis Function, Multi-Layer Perceptron, Splines, BSplines, Additive Kernelsand Tensor Product are used for mapping features. SVMcan be classified as One-Class and Multi-Class. In OneACEEEInternational Journal on Signal and Image Processing Vol 1, No. 1, Jan 201018ISSN 2152-5056 © 2010 ACEEEDOI: 01.ijsip.01.01.04Class SVM, only the features of cover images arerequired for classification of cover and stego imagewhereas in Multi-Class SVM, the features of both thecover and stego-images are required for discriminatingthe cover and stego image. Owing to simple geometry,SVMs are used more predominantly than NeuralNetworks. Biggest limitation of SVM is choosing of thekernel function, speed and size, both in training andtesting.Contribution: In this paper, we have proposedSHDFT Universal Steganalysis Method. Histogram andDiscrete Fourier Transform of color images are computedto obtain the PDF moments. In addition, the energy of theimage is considered. The non-linear Classifier SupportVector Machine is used for classification of cover andstego image.


Download full report
http://academypublisherijrte/vol01/no01/ijrte0101367371.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dc ups original seminar reports, dft crash project, convolution using dft and idft, circular convolution using dft, hhh original name, original report on vacuum braking system seminar topicroject definition, advantages of fft over dft ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 2 5,217 19-06-2018, 06:10 PM
Last Post: KavyaIyengar
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 23,572 26-08-2016, 03:46 PM
Last Post: anasek
  image processing projects electronics seminars 7 32,461 05-09-2015, 11:47 AM
Last Post: seminar report asees
  Brain Tumour Detection Using Water shedding and basic Image Processing Techniques smart paper boy 2 3,073 01-08-2015, 02:53 PM
Last Post: seminar report asees
  IMAGE CAPTURE AUTOMATED TOLL GATE smart paper boy 3 2,983 11-07-2015, 01:43 PM
Last Post: Guest
  VEHICLE POSITION TRACKING USING GPS AND GSM RECIEVER WITH LICENCE Electrical Fan 5 9,737 22-06-2014, 12:34 AM
Last Post: Guest
  SECURE ATM BY IMAGE PROCESSING seminar class 6 9,887 06-04-2014, 05:49 PM
Last Post: Guest
  DESIGN AND IMPLEMENTATION OF RADIX-4 BOOTH MULTIPLIER USING VHDL project computer science technology 8 24,949 12-11-2013, 05:36 AM
Last Post: Guest
  ANTI THEFT ALERT AND AUTO ARRESTING SYSTEM FOR MUSEUMS AND JEWELRY SHOPS project report helper 11 14,586 12-08-2013, 09:57 AM
Last Post: computer topic
  Modeling and Testing of a Digital Distance Relay Using MATLAB/SIMULINK smart paper boy 6 4,037 09-08-2013, 10:56 AM
Last Post: computer topic

Forum Jump: