A formulation of conditional states on steganalysis approach

In this paper, we present a consolidated formulation of conditional states from the perspective of steganalysis approach. It has been identified that the conditional states used in steganalysis approach include hypothesis testing, gaussion distribution, hidden markov model and vector analysis space. The main objective of this paper is to find the best approach to fit in using mathematical formulation for steganalytic system based on these conditional states. It is found that there is a boundary of solution between the steganalytic system and analyzed message.

[1]  Rajarathnam Chandramouli,et al.  Current trends in steganalysis: a critical survey , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[2]  Bin Zhang,et al.  Audio Content-based Highlight Detection Using Adaptive Hidden Markov Model , 2006, Sixth International Conference on Intelligent Systems Design and Applications.

[3]  Jessica J. Fridrich,et al.  Stochastic approach to secret message length estimation in ±k embedding steganography , 2005, IS&T/SPIE Electronic Imaging.

[4]  Patrick Bouthemy,et al.  A HMM-Based Method for Recognizing Dynamic Video Contents from Trajectories , 2007, 2007 IEEE International Conference on Image Processing.

[5]  Roshidi Din,et al.  The capability of image in hiding a secret message , 2006 .

[6]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[7]  Duong Van Hieu,et al.  Image Preprocessing and Trajectory Feature Extraction based on Hidden Markov Models for Sign Language Recognition , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[8]  Nasir D. Memon,et al.  A Distribution Detection Framework for Watermark Analysis , 2000 .

[9]  Nasir D. Memon,et al.  A distributed detection framework for Steganalysis , 2000, MULTIMEDIA '00.

[10]  Rajarathnam Chandramouli,et al.  Active steganalysis of sequential steganography , 2003, IS&T/SPIE Electronic Imaging.

[11]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[12]  Xingming Sun,et al.  An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[13]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[14]  Azman Samsudin,et al.  Computational intelligence in steganalysis environment , 2008 .

[15]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[16]  Rajarathnam Chandramouli,et al.  Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.

[17]  Kun Yue,et al.  An adaptive Markov model for text categorization , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.

[18]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[19]  Maxim Sidorov,et al.  Hidden Markov models and steganalysis , 2004, MM&Sec '04.

[20]  Azman Samsudin,et al.  A conceptual framework for natural language steganalysis , 2011 .

[21]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[22]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[23]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[24]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[25]  Xing Li,et al.  A novel steganography method based on modifying quantized spectrum values of MPEG/audio layer III , 2007 .

[26]  Ramamurti Chandramouli,et al.  Active steganalysis of spread spectrum image steganography , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[27]  Stephen Clark,et al.  Linguistic Steganography Using Automatically Generated Paraphrases , 2010, NAACL.

[28]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[29]  Hassan Mathkour,et al.  An improved steganalysis approach for breaking the F5 algorithm , 2008 .

[30]  Azman Samsudin,et al.  Intelligent steganalytic system: application on natural language environment , 2009 .

[31]  Nan Jiang A Novel Analysis Method of Information Hiding , 2008, 2008 Congress on Image and Signal Processing.