• Title/Summary/Keyword: Recognition of stego images

Search Result 3, Processing Time 0.017 seconds

Recognizing F5-like stego images from multi-class JPEG stego images

  • Lu, Jicang;Liu, Fenlin;Luo, Xiangyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4153-4169
    • /
    • 2014
  • To recognize F5-like (such as F5 and nsF5) steganographic algorithm from multi-class stego images, a recognition algorithm based on the identifiable statistical feature (IDSF) of F5-like steganography is proposed in this paper. First, this paper analyzes the special modification ways of F5-like steganography to image data, as well as the special changes of statistical properties of image data caused by the modifications. And then, by constructing appropriate feature extraction sources, the IDSF of F5-like steganography distinguished from others is extracted. Lastly, based on the extracted IDSFs and combined with the training of SVM (Support Vector Machine) classifier, a recognition algorithm is presented to recognize F5-like stego images from images set consisting of a large number of multi-class stego images. A series of experimental results based on the detection of five types of typical JPEG steganography (namely F5, nsF5, JSteg, Steghide and Outguess) indicate that, the proposed algorithm can distinguish F5-like stego images reliably from multi-class stego images generated by the steganography mentioned above. Furthermore, even if the types of some detected stego images are unknown, the proposed algorithm can still recognize F5-like stego images correctly with high accuracy.

Two-level Information Hiding Method for the Transmission of Military Secret Images (군사용 비밀 영상 전송을 위한 이단계 정보은닉 기법)

  • Kim, In-Taek;Kim, Jae-Cheol;Lee, Yong-Kyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.482-491
    • /
    • 2011
  • The purpose of this study is to design and implement a 2-level secret information transmission system which can be used for information hiding of images transmitted over various IT communication media. To increase the robustness of the hiding power, we combined the steganography method which inserts secret object into cover object to hide the very fact of information hiding itself, and the preprocessing stage to encrypt the secret object before the stego-insertion stage. As a result, even when the stego-image is broken by an attacker, the secret image is protected by encryption. We implemented the 2-level image insertion and extraction algorithm by using C++ programming language. Experiment shows that the PSNR values of stego-images of ours exceed 30.00db which is the threshold of human recognition. The methodology of this study can be applied broadly to the information hiding and protection of the military secret images.

Experimental Comparison of CNN-based Steganalysis Methods with Structural Differences (구조적인 차이를 가지는 CNN 기반의 스테그아날리시스 방법의 실험적 비교)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.24 no.2
    • /
    • pp.315-328
    • /
    • 2019
  • Image steganalysis is an algorithm that classifies input images into stego images with steganography methods and cover images without steganography methods. Previously, handcrafted feature-based steganalysis methods have been mainly studied. However, CNN-based objects recognition has achieved great successes and CNN-based steganalysis is actively studied recently. Unlike object recognition, CNN-based steganalysis requires preprocessing filters to discriminate the subtle difference between cover images from stego images. Therefore, CNN-based steganalysis studies have focused on developing effective preprocessing filters as well as network structures. In this paper, we compare previous studies in same experimental conditions, and based on the results, we analy ze the performance variation caused by the differences in preprocessing filter and network structure.