Abstract

The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence of hidden messages inside digital medium. This paper focuses on universal image steganalysis method which uses RGB to HSI colour model conversion. Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. The developed Universal Steganalysis algorithm is tested in stego-image database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-image sources available on the internet it lacks in the information such as how many rows has been infected by the steganography algorithms, how many bits have been modified and which channel has been affected. These parameters are important for Steganalysis algorithms and it helps to rate its efficiency. Proposed Steganalysis using Colour Model has been tested with our Image Database and the results were affirmative.

Highlights

  • Steganography is the practice of concealing the very presence of message during communication [1]

  • The proposed Steganalysis method along with Stego-Image Generator (SIG) tool was implemented using MATLAB 7 for bmp and png images were taken as input

  • Images generated from our own Stego-Image Generator (SIG) tool was given as input

Read more

Summary

INTRODUCTION

Steganography is the practice of concealing the very presence of message during communication [1]. The technique which is used to identify the images which is hands of terrorist that contains the secret message is called as Steganalysis. Steganography can be best explained through prisoner’s problem Alice wishes to send a secret message to Bob by hiding information in a clean image. Wendy could perform one or several scan to decide if the message from Alice to Bob contains any secret information. Wendy can take a conservative approach and modify all the messages from Alice to Bob irrespective of whether any information is hidden by Alice or not. In this case, Wendy is called an active warden.

STEGANALYSIS
Stego-Image Tool
Steganalysis Method
ARCHITECTURE OF PROPOSED STEGANALYSIS METHOD
Steganalysis using HSI Colour Model
EXPERIMENTAL RESULTS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.