A Robust Method to Detect Hidden Data from Digital Images

Abstract

Recently, numerous novel algorithms have been proposed in the fields of steganography and visual cryptography with the goals of improving security, reliability, and efficiency. Steganography detection is a technique to tell whether there are secret messages hidden in images. The performance of a steganalysis system is mainly determined by the method of feature extraction and the architecture selection of the classifier. In this paper, we present a new method Visual Pixel Detection VPD for extract data from a color or a grayscale images. Because the human eye can recognize the hidden information in the image after using this detection. The experimental results show that the proposed method provides a better performance on testing images in comparison with the existing method in attacking Steghide, Outguess and F5.

Share and Cite:

R. F. Mansour, W. F. Awwad and A. A. Mohammed, "A Robust Method to Detect Hidden Data from Digital Images," Journal of Information Security, Vol. 3 No. 2, 2012, pp. 91-95. doi: 10.4236/jis.2012.32011.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] C.-C. Thien and J.-C. Lin, “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, No. 12, 2003, pp. 2875-2881. doi:10.1016/S0031-3203(03)00221-8
[2] C.-K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, 2004, pp. 469-474. doi:10.1016/j.patcog.2003.08.007
[3] C.-C. Chang, J.-Y. Hsiao and C.-S. Chan, “Finding Optimal Least-Significant Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, No. 7, 2003, pp. 1583-1595. doi:10.1016/S0031-3203(02)00289-3
[4] C.-C. Thien and J.-C. Lin, “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, No. 12, 2003, pp. 2875-2881. doi:10.1016/S0031-3203(03)00221-8
[5] R.-Z. Wang, C.-F. Lin and J.-C. Lin, “Image Hiding by Optimal LSB Substitution and Genetic Algorithm,” Pattern Recognition, Vol. 34, No. 3, 2001, pp. 671-683. doi:10.1016/S0031-3203(00)00015-7
[6] C.-C. Chang, T.-S. Chen and L.-Z. Chung, “A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 12, 2002, pp. 123-138. doi:10.1016/S0020-0255(01)00194-3
[7] M. Iwata, K. Miyake and A. Shiozaki, “Digital Steganography Utilizing Features of JPEG Images,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E87-A, No. 4, 2004, pp. 929-936.
[8] H. Noda, J. Spaulding, M. N. Shirazi and E. Kawaguchi, “Application of Bit-Plane Decomposition Steganography to JPEG2000 Encoded Images,” IEEE Transactions on Signal Processing Letters, Vol. 9, No. 12, 2002, pp. 410-413. doi:10.1109/LSP.2002.806056
[9] T. Liu and Z.-D. Qiu, “A DWT-Based Color Image Steganography Scheme,” Proceedings of the International Conference on Signal Processing, Beijing, 26-30 August 2002, pp. 1568-1571. doi:10.1109/ICOSP.2002.1180096
[10] R. R. Ni and Q. Q. Ruan, “Embedding Information into Color Images Using Wavelet,” Proceedings of the International Conference on Computers, Communications, Control and Power Engineering of the IEEE TENCON, Beijing, 28-31 October 2002, pp. 598-601. doi:10.1109/TENCON.2002.1181346
[11] M.-H. Lin, Y.-C. Hu and C.-C. Chang, “Both Color and Gray Scale Secret Images Hiding in a Color Image,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 16, No. 6, 2002, pp. 697-713. doi:10.1142/S0218001402001903
[12] W.-S. Kim and R.-H. Park, “Color Image Palette Construction Based on the HSI Color System for Minimizing the Reconstruction Error,” Proceedings of the International Conference on Image Processing of the IEEE, Lausanne, 16-19 September 1996, pp. 1041-1044. doi:10.1109/ICIP.1996.561017
[13] J. Fridrich, “Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes,” Proceedings of the 6th International Conference on Information Hiding, Toronto, 23-25 May 2004, pp. 67-81. doi:10.1007/978-3-540-30114-1_6
[14] Y. Q. Shi, C. C. Chen and W. Chen, “A Markov Process Based Approach to Effective Attacking JPEG Steganography,” Proceedings of the 8th International Conference on Information Hiding, Alexandria, 10-12 July 2006, pp. 249-264.
[15] Z.-M. He, W. W. Y. Ng, P. P. K. Chan and D. S. Yeung, “Steganography Detection Using Localized Generalization Error Model,” Proceedings of the International Conference on Systems Man and Cybernetics of the IEEE SMC, Istanbul, 10-13 October 2010, pp. 1544-1549. doi:10.1109/ICSMC.2010.5642331

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.