LSB and DCT steganographic detection using compressive sensing

During the last years, a large number of information in digital form has been exchanged all over the world. Several techniques have been developed in order to protect the users' privacy of digital content. Steganography is one of them. Its use dates back for many centuries, yet it has been used profoundly in the last decades, as the proper mathematical background has been developed along with the need of the music and lm industries. One aspect of this development is the use of DRM (Digital Right

[1]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .

[2]  Karen O. Egiazarian,et al.  Video denoising by sparse 3D transform-domain collaborative filtering , 2007, 2007 15th European Signal Processing Conference.

[3]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[4]  S Rakesh,et al.  Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping , 2012 .

[5]  Wei Sun,et al.  Detect LSB Steganography with Bit Plane Randomness Tests , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[6]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[7]  Gilbert L. Peterson,et al.  Detecting Steganography Using Multi-Class Classification , 2007, IFIP Int. Conf. Digital Forensics.

[8]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[9]  Xiaolin Wu,et al.  A new framework of LSB steganalysis of digital media , 2005, IEEE Transactions on Signal Processing.

[10]  C.E. Shannon,et al.  Communication in the Presence of Noise , 1949, Proceedings of the IRE.

[11]  Sorina Dumitrescu,et al.  LSB steganalysis based on high-order statistics , 2005, MM&Sec '05.

[12]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[13]  Karen O. Egiazarian,et al.  Image denoising with block-matching and 3D filtering , 2006, Electronic Imaging.

[14]  Henry Chu,et al.  Soft computing approach to steganalysis of LSB embedding in digital images , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..

[15]  Jessica J. Fridrich,et al.  New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.

[16]  Andrew D. Ker Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.

[17]  B. M. Imran,et al.  An efficient steganographic technique based on chaotic maps and adpative PPM embedding , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.

[18]  Tomás Pevný,et al.  From Blind to Quantitative Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[19]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[20]  Chia-Chen Lin,et al.  HighCapacity Data Hiding Scheme for DCT-based Images , 2010, J. Inf. Hiding Multim. Signal Process..

[21]  Constantinos Patsakis,et al.  A DCT Steganographic Classifier Based on Compressive Sensing , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[22]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[23]  J. Fridrich,et al.  Attacking the OutGuess , 2002 .

[24]  R. Marks Introduction to Shannon Sampling and Interpolation Theory , 1990 .

[25]  William A. Pearlman,et al.  Kernel Fisher discriminant for steganalysis of JPEG hiding methods , 2004, IS&T/SPIE Electronic Imaging.

[26]  Constantinos Patsakis,et al.  LSB Steganographic Detection Using Compressive Sensing , 2011 .

[27]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[28]  Karen O. Egiazarian,et al.  Image restoration by sparse 3D transform-domain collaborative filtering , 2008, Electronic Imaging.

[29]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[30]  E. Candès,et al.  Stable signal recovery from incomplete and inaccurate measurements , 2005, math/0503066.

[31]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[32]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[33]  Alessandro Foi,et al.  JOINT IMAGE SHARPENING AND DENOISING BY 3 D TRANSFORM-DOMAIN COLLABORATIVE FILTERING , 2007 .

[34]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[35]  S. Frick,et al.  Compressed Sensing , 2014, Computer Vision, A Reference Guide.

[36]  Qingzhong Liu,et al.  Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[37]  Bin Li,et al.  Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels , 2007, 2007 IEEE International Conference on Image Processing.

[38]  Josef Pieprzyk,et al.  Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis , 2010, ISPEC.

[39]  Rajarathnam Chandramouli,et al.  Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.

[40]  Alessandro Foi,et al.  Image Denoising by Sparse 3-D Transform-Domain Collaborative Filtering , 2007, IEEE Transactions on Image Processing.

[41]  Gregg H. Gunsch,et al.  Blind Stenanography Detection Using a Computational Immune System: A Work in Progress , 2003, Int. J. Digit. EVid..

[42]  Tomás Pevný,et al.  Novelty detection in blind steganalysis , 2008, MM&Sec '08.

[43]  Qingzhong Liu,et al.  Building resilient classifiers for LSB matching steganography , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[44]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .