A Study of Different Steganalysis Methods

Authors(2) :-Arohi Patel, Milin Patel

Steganography and steganalysis got a lot of consideration from media and law requirement. Steganography is specialty of mystery correspondence and steganalysis is the craft of identifying shrouded messages installed in computerized media. Steganalysis originates from steganography. In this paper we are thinking about the strategies for steganalysis that are helpful for the concealing the information. This audit paper gives some thought regarding the steganalysis and its strategies. I---n this paper, we examined the techniques and classifier of the steganalysis. Discrete cosine transformation and discrete wavelet transformation and discrete Fourier transformation are the principle change systems. In addition, we concentrating on DCT and DWT mix change. WE contemplated Support vector machine and artificial neural system as classifier.

Authors and Affiliations

Arohi Patel
Computer Engineering Department, Sardar Patel Institute of Technology, Vasad, Gujarat, India
Milin Patel
Computer Engineering Department, Sardar Patel Institute of Technology, Vasad, Gujarat, India

Steganalysis, Feature Extraction, DCT, DWT, DFT, SVM, ANN

  1. Madhavi B. Desai, S.V. Patel, “Performance Analysis of Image Steganalysis against MessagSize, Message Type and Classification Methods”, 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT) Rajarshi Shahu College of Engineering, Pune India. Dec 2-3, 2016
  2. Changxin Liu, Chunjuan Ouyang “Image Steganalysis Based on Spatial Domain and DWT Domain Features” 2010 IEEE Department of Computer Science Jinggangshan University Ji’an, Jiangxi, China {jalcx,oycj001}@163.com
  3. Anupama K. Ingale “Universal Steganalysis using DWT and Entropy Features” Information Technology Department Rajarambapu Institute of Technology Sangli, India
  4. Jingxin Hong*, Jun Hu, Hengwei Zhang, “A Study on Pre-processing Method for Steganalysis Feature Extraction”, 2016 IEEE.
  5. Sunaina Verma “Steganalysis using Difference Image Histogram”, IEEE 2016 P.G. Dept. of Computer Science B.B.K.D.A.V. College, Amritsar-143001 (Pb) India
  6. Marcelinus Henry Menori, Rinaldi Munir, ” Blind Steganalysis for Digital Images using Support Vector Machine Method”, 2016 International Symposium on Electronics and Smart Devices (ISESD) November 29-30, 2016.
  7. Yun Q. Shi, Guorong Xuan, “Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-ErrorImage, and Neural Network”, 2005 IEEE.8].Swaroop Kumar Pedda Reddy B.E Bangalore University, INDIA, 2001,” Steganalysis Techniques: A Comparative Study”, Pedda Reddy, Swaroop Kumar, "Steganalysis Techniques: A comparative Study" (2007). University of New Orleans Theses and Dissertations. Paper 562.
  8. Mr. Falesh M. Shelke1, Miss. Ashwini A. Dongre2, Mr Pravin D. Soni3, “Comparison of different techniques for Steganography in images”, International Journal of Application or Innovation in Engineering & Management (IJAIEM)
  9. Aron Chandrababu, “Using an Artificial Neural Network to Detect the Presence of Image Steganography”, International Journal of Application or Innovation in Engineering & Management (IJAIEM)
  10. Angelos Tzotsos, “A Support Vector Machine Approach For Object Based Image Analysis”, Laboratory of Remote Sensing, Department of Surveying, School of Rural and Surveying Engineering, National Technical University of Athens, Greece – tzotsos@gmail.com

Publication Details

Published in : Volume 3 | Issue 2 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 118-123
Manuscript Number : CSEIT1831188
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Arohi Patel, Milin Patel, "A Study of Different Steganalysis Methods", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 2, pp.118-123, January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT1831188

Article Preview

Follow Us

Contact Us