Preview

steganalysis and image quality measures

Powerful Essays
Open Document
Open Document
2605 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
steganalysis and image quality measures
IJLTEMAS

VOLUME I ISSUE VII

2ICAE-2012 GOA

Steganalysis and Image Quality Measures
Neha Singh
Assoc. Prof., Department of Electronics and Communication Engineering
Institute of Engineering and Technology
Alwar, India
Abstract—Steganography is the art/ science of covert communication and steganalysis is the counter to it. Though the first goal of steganalysis is detection of hidden message, there can be additional goals such as disabling, extraction and
/or manipulating the original hidden message.
Detection of the secret message is enough to defeat the very purpose of steganography even if it is not extracted because detecting the existence of hidden data is enough if it needs to be destroyed.
The performance of steganalysis approach depends on identifying the appropriate Image
Quality Measures. A good objective quality measure should well reflect the distortion on the image due to embedding, blurring, noise and compression. A survey of Image Quality Measures used by the various reported Steganalysis techniques is presented in this paper.
KeywordsImage
Quality
Measures,
Steganography, Steganalysis, HVS based IQM,
Pixel based IQM.
I.

INTRODUCTION

Hiding information in digital content has a wide class of application and the techniques involved in such applications are collectively referred to as information hiding techniques [1]. Steganography refers to the art/science of embedding information in the digital images, aiming to convey messages secretly by concealing its very existence. Compared with the
Cryptography, modern steganography not only encrypts messages but also masks the very presence of the communication. A wide range of steganography techniques have been introduced which exploit spatial or transform domain characteristics of images to hide information. A survey of these techniques can be found in [2-7].
The message embedding into an image results in distortions which can be visible under human



References: EURASIP Journal on Applied Signal Processing, 2002:6, 613-621. Control, Automation, Robotics and Vision Conference, 2004. Trans.on Image Processing, Vol 12, No. 2, Feb, 2003. (2009); doi:10.1117/12.810507. Decomposition, Prediction-Error Image, and Neural Network‖ IEEE ICME, pp 269-272, 2005. Coding and Computing, Vol.1, 2005. Machines‖, Proc. Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp.35-45. in Pattern and Image Analysis, 2005, pp. 1-10.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    The spread should be displayed separately to each witness, again, based on NIJ guidelines (U.S. Department of Justice, 1999). The witnesses should view the spread without an interference or suggestion of which photo may contain the suspect. Inform the witnesses that they will be viewing photos that may or may not contain the suspect and that it is just as important to maintain innocence as it is to apply guilt.…

    • 516 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cvsa

    • 1030 Words
    • 5 Pages

    This paper will discuss the various methods and techniques that can be employed in an attempt to beat the polygraph.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    4. Images, like the ones you make with your digital camera, cannot be stored as…

    • 435 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    One thing that poped out to me was in the halo effect video was when he was talking about how the media only take a story about Christianity or some other religion when something dramatic happens. Sometimes our world leaders and celebrity feel like they have to apologize for what they believe in. In the second video it talks about how there are many different religions and all of them with different congregations because of this what they do effects the rest of the world. The way they are doing that is because the love of thy name is used in there religion. religion has such a big effect without religion being at least 1.3 trillion dollar business would be gone. This proves that the effect of religion is not intangible but measurable. In the halo effect video emphasize on the fact that people need to understand what faith groups actually do which help and valinteering and not fro themselves but for society. Many people think that if these faith groups or congregation stopped doing charity or valenturing the government…

    • 491 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Recently “webcam hacking” has become a major concern in our modern world. Similar to the telecsreens found in 1984, webcams have the capability of constantly monitoring computer users. According to The Guardian, “Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing.” It is evident that our technology has the capability to surveil computer users at any moment.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The image, Mariposa, on page 169 was created by Beatriz Milhazes. This image stands out and it leaves a positive vibe. I feel that this image represents me because it relates to my personality. This image is fun, exciting, and colorful. I am a fun, exciting person and I try to leave a positive effect on everyone that I meet. Also, this image relates to me because it has a lot going on in this image. I have a busy schedule between work and school.…

    • 85 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mask Analysis

    • 549 Words
    • 3 Pages

    In the story “Masks” Lucy Grealy is battling a lethal form of cancer but her struggle through the story is her self-confidence concerning her looks. As Lucy is growing up, the teasing and her self-consciousness about her physical appearance keep increasing.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Image Analysis

    • 486 Words
    • 2 Pages

    Every parent wants their child to be healthy. Though this is not always the case, the science behind genetic modification can improve the odds of that child being born healthy, as well as decrease the odds of the child developing diseases later in life.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Image Deconstruction

    • 312 Words
    • 2 Pages

    The logo in which I chose to deconstruct was the emblem belonging to Chicago Park District. Multiple elements of design can be found within this logo. The first element of design that caught my eye was the even balance found throughout the entire image. When this image is observed with an imaginary line splitting it in half, the viewer gets a strong sense of balance or symmetry in the image. Each side almost appears to be a clear reflection of the other. Everything from the tree and branches to the plants and water are balanced perfectly. The artist chose to use level edges to make everything flow effortlessly. While the image is very appealing to the eye, the design appears to suggest a constructive environment. It is more than likely that it is supposed to imitate the park district setting. Another element of design that stuck out to me was the weight aspect of the image. The border surrounding the words, as well as the border surrounding the image, includes weighted lines to create separations. The artist may have done this in order to ensure the focal point of the image would remain in the center. Something that I felt was done very uniquely, was the use of the line element throughout this design. It looks as if by the simple use of lines, the artist was able to create an illusion of buildings which may actually symbolize the stunning Chicago skyline. By angling lines, a new aspect of design was introduced to the image perspective. By proper placement, certain points of views suggest that some buildings are set back. In composition with the whole design, the buildings seem to be set back the furthest, out of every object included. The overall composition was designed effectively giving many examples of things that are recognized in the Chicago Park…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Professional Image Analysis

    • 2892 Words
    • 12 Pages

    It is expected that those persons whom work in the corporate world should uphold to the use of professional business etiquette. Professional business etiquette could apply to the way we look and speak publicly. Webster defines the term professional as" exhibiting a courteous, conscientious, and generally businesslike manner in the workplace". However, this definition implies a very generic perspective of the terms relevance as it applies to how we dress and how we speak. It is important in the corporate world, we maintain a professional image and that we speak professionally whether it…

    • 2892 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    This tells Linux to make a bit stream copy from the input "file" ("if") /dev/hda6 (which is the E partition of the hard drive), to the output "file" ("of") /mnt/usbdrive/murder.img (which is a file called murder.img on the usb drive disk). The "bs" sets the block size to approximately 4K, which is a good size for many moderate sized copying jobs.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Forensic Photography

    • 283 Words
    • 2 Pages

    Forensic photography is not just photography, the purpose of the pictures taken is not meant to capture the artistic ways of a crime scene. Forensic photography is a piece of evidence utilized as such in courts and investigations. The photographs taken at crime scenes must convey the information needed for others to be able to recreate the scene as if they were actually there. For this reason, there are techniques and processes in which forensic photographs must be taken.…

    • 283 Words
    • 2 Pages
    Good Essays