Академический Документы
Профессиональный Документы
Культура Документы
Asst. Prof. /MCA, Karpagam College of Engineering, Coimbatore 641032, Tamilnadu, India
Vice Chancellor, Anna University, Tirunelveli, Tamilnadu, India
3
Educational Advisor, Karpagam Group of Institutions, Coimbatore 641032, Tamilnadu, India
2
Abstract - The widespread use of Steganography inevitably leads to a need to detect hidden data. However, compared to
steganography, steganalysis is still in its infancy. Our goal is to establish a solid framework for steganalysis, and design
systems to detect state-of-the-art hiding systems. We are researching three two approaches to accomplish this: 1)
cryptography 2) Steganography 3) steganalysis. Steganography is used to hide the occurrence of communication. Today,
email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take
control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and
tamper-proof security. Email is insecure. This proposed will develop a steganalysis framework that will check the Email
content of corporate mails by improving the S-DES algorithm with the help of neural network approach. A new filtering
algorithm is also developed which will used to extract only the JPG images from the corporate emails. We anticipate that this
paper can also give a clear picture of the current trends in Steganography so that we can develop and improvise appropriate
steganalysis algorithms.
Keywords: Steganalysis, Steganography, Information Hiding, LSB, Stegdetect, Stego, Outguess
1.
Introduction
2.
Image Steganalysis
International Journal of Research and Reviews in Electrical and Computer Engineering (IJRRECE)
in the sense that it may be possible to prove that a particular
88 block of pixels could not have been produced by JPEG
decompression of any block of quantized coefficients. This
finding provides strong evidence that the block has been
modified. It is highly suspicious to find an image stored in a
lossless format that bears a strong fingerprint of JPEG
compression, yet is not fully compatible with any JPEG
compressed image. This can be interpreted as evidence for
steganography. Presented in the figure 1 is an example of a
hidden message inside a picture.
3.
93
compression algorithm.
Proposed Idea
4.
International Journal of Research and Reviews in Electrical and Computer Engineering (IJRRECE)
functions.
For these features which have more effected by data
hiding process, neural network will assign larger weight
coefficients and for these features which have less effected by
data hiding process, neural network will assign less weight
coefficients.
Let us denote the i-th DCT coefficient of the k-th block as
dk(i), 0 i 64, k = 1, , T, where T is the total number of
blocks in the image. In each block, all 64 coefficients are
further quantized to integers Dk(i) using the JPEG
quantization matrix Q .
The quantized coefficients Dk(i) are arranged in a zig-zag
manner and compressed using the Huffman coder. The
resulting compressed stream together with a header forms the
final JPEG file.
The decompression works in the opposite order. The
JPEG bit-stream is decompressed using the Huffman coder
and the quantized DCT coefficients Dk(i) are multiplied by
Q(i) to obtain DCT coefficients QDk, QDk(i) = Q(i)Dk(i) for
all k and i. Then, the inverse DCT is applied to QDk and the
result is rounded to integers in the range 0255.
Algorithm description:
1. Divide the image into a grid of 88 blocks, skipping
the last few rows or columns if the image dimensions
are not multiples of 8.
2. Arrange the blocks in a list and remove all saturated
blocks from the list (a block is saturated if it has at
least one pixel with a gray value 0 or 255). Denote the
total number of blocks as T.
3. Extract the quantization matrix Q from all T blocks as
described in Appendix A. If all the elements of Q are
ones, the image was not previously stored as JPEG and
our steganalytic method does not apply (exit this
algorithm). If more than one plausible candidate exists
for Q, the steps 46 need to be carried out for all
candidates and the results that give the highest number
of JPEG compatible blocks will be accepted as the
result of this algorithm.
4. For each block B calculate the quantity S (see equation
(3)).
5. If S>16, the block B is not compatible with JPEG
compression with quantization matrix Q. If S16, for
each DCT coefficient QDi' calculate the closest
multiples of Q(i), order them by their distance from
QDi', and denote them qp(i), p=1, . For those
combinations, for which the inequality (4) is satisfied,
check if expression (5) holds. If, for at least one set of
indices {p(1), , p(64)} the expression (5) is
satisfied, the block B is JPEG compatible, otherwise it
is not.
6. After going through all T blocks, if no incompatible
JPEG blocks are found, the conclusion is that our
steganalytic method did not find any evidence for
presence of secret messages. If, on the other hand,
there are some JPEG incompatible blocks, we can
attempt to estimate the size of the secret message,
locate the message-bearing pixels, and even attempt to
obtain the original cover image before secret message
embedding started.
94
5.
International Journal of Research and Reviews in Electrical and Computer Engineering (IJRRECE)
Training the network can be summarized as follows:
Apply input to the network.
Calculate the output.
Compare the resulting output with the desired output
for the given input. This is called the error.
Modify the weights for all neurons using the error.
Repeat the process until the error reaches an
acceptable value (e.g. error < 1%), which means that
the NN was trained successfully, or if we reach a
maximum count of iterations, which means that the
NN training was not successful.
The program trains the network using JPEG images that
are located in a folder. This folder must be in the following
format:
There must be one (input) folder that contains input
images [*.jpg].
Each image's name is the target (or output) value for
the network (the pixel values of the image are the
inputs, of course).
6.
Test Results
The cover image was taken from the image database. The
image was originally in JPEG format in 680x480 resolutions.
Since a BMP image was also required for the evaluation, a
second image in BMP format was generated using the same
JPEG image. Once both the cover images have been obtained,
the proposed method generates the secret code for both the
images were created. The encrypted image thus obtained was
steganographically concealed in the carrier image.
+ secretssecrets =
Cover file
steganography document
8.
95
Conclusion
References
[1]
7.
Discussion
International Journal of Research and Reviews in Electrical and Computer Engineering (IJRRECE)
experience (UG and PG) of over 44 years. The total number of
undergraduate and postgraduate projects guided by him for both Computer
Science and Engineering and Electrical and Electronics Engineering is
around 950. Formerly he was a Professor and Head for the departments EEE
and CSE, PSG College of technology, Coimbatore. Further he was a
coordinator for seven government funded projects. Dr. Sivanandam has coauthored 14 books. He has delivered around 100 special lectures of different
specializations in Summer/Winter schools and also in various Engineering
Colleges. He has guided 32 Ph.D. research works and at present 10 Ph.D.
research scholars are working under him. The total number of technical
publications credited to him in various National and International journals
and Conferences is around 750. He has chaired 12 International and 12
National Conferences. He is a member of various professional bodies like IE
(India), ISTE, CSI, ACS, SSI and IEEE. He is a Technical Advisor to
various reputed industries and reputed engineering Institutions. His research
areas include Modeling and Simulation, Neural Networks, Fuzzy Systems
and Genetic Algorithms, Pattern Recognition, Multi-dimensional System
Analysis, Linear and Non-Linear Control Systems, Signal and Image
Processing, Power Systems, Numerical Methods, Parallel algorithms, Data
mining and Database Security.
96