Line covering method and its applications in steganography and steganalysis

Image features are widely used in steganography and steganalysis. In steganography, image features are used to better understand the image, in order to achieve higher quality. In steganalysis, image features are used to show the changes caused by steganography. This paper presents a new method, line covering, to evaluate the smoothness of an image. A new image feature, smoothness based on line covering, is proposed and we discuss its applications in steganography and steganalysis. This feature can better show the smoothness features in different directions whereas many other image features ignore the direction of features. A steganalysis based on this feature is proposed which has high accuracy in detecting a histogram modification steganographic techniques. And it can easily control the false rejection rate and false acceptation rate. This paper also discusses its application in steganography, and how it can solve the problem of choosing a pairing direction in the steganography based on difference expans...

[1]  Giulia Boato,et al.  Reversible watermarking using prediction and Difference Expansion , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).

[2]  Kumar Parasuraman,et al.  Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[3]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[4]  J. Tian High capacity reversible data embedding and content authentication , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[5]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[6]  Xiao Zeng,et al.  Model Order Selection in Reversible Image Watermarking , 2010, IEEE Journal of Selected Topics in Signal Processing.

[7]  Dinu Coltuc,et al.  Very Fast Watermarking by Reversible Contrast Mapping , 2007, IEEE Signal Processing Letters.

[8]  Qingzhong Liu,et al.  Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[9]  Pierre Moulin,et al.  Analysis of Multiresolution Image Denoising Schemes Using Generalized Gaussian and Complexity Priors , 1999, IEEE Trans. Inf. Theory.

[10]  Adnan M. Alattar Reversible watermark using difference expansion of triplets , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[11]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[12]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.

[13]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[14]  Jun Tian,et al.  Reversible data-embedding with a hierarchical structure , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[15]  Tao Zhang,et al.  Detection of LSB Steganography based on Image Smoothness , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[16]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[17]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[18]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[19]  Ingemar J. Cox,et al.  Detection of ±1 LSB steganography based on the amplitude of histogram local extrema , 2008, 2008 15th IEEE International Conference on Image Processing.

[20]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[21]  Nien-Lin Hsueh,et al.  Lossless Data Hiding Based on Difference Expansion without a Location Map , 2008, 2008 Congress on Image and Signal Processing.

[22]  Jun Tian,et al.  Wavelet-based reversible watermarking for authentication , 2002, IS&T/SPIE Electronic Imaging.

[23]  Shadrokh Samavi,et al.  Steganalysis and payload estimation of embedding in pixel differences using neural networks , 2010, Pattern Recognit..

[24]  Adnan M. Alattar,et al.  Reversible watermark using difference expansion of quads , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[25]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .