DeepAI AI Chat
Log In Sign Up

Usage of analytic hierarchy process for steganographic inserts detection in images

by   S. V. Belim, et al.

This article presents the method of steganography detection, which is formed by replacing the least significant bit (LSB). Detection is performed by dividing the image into layers and making an analysis of zero-layer of adjacent bits for every bit. First-layer and second-layer are analyzed too. Hierarchies analysis method is used for making decision if current bit is changed. Weighting coefficients as part of the analytic hierarchy process are formed on the values of bits. Then a matrix of corrupted pixels is generated. Visualization of matrix with corrupted pixels allows to determine size, location and presence of the embedded message. Computer experiment was performed. Message was embedded in a bounded rectangular area of the image. This method demonstrated efficiency even at low filling container, less than 10%. Widespread statistical methods are unable to detect this steganographic insert. The location and size of the embedded message can be determined with an error which is not exceeding to five pixels.


A new adaptive method for hiding data in images

LSB method is one of the well-known steganography methods which hides th...

The Capacity of Anonymous Communications

We consider the communication scenario where K transmitters are each con...

Digital Cardan Grille: A Modern Approach for Information Hiding

In this paper, a new framework for construction of Cardan grille for inf...

Very fast watermarking by reversible contrast mapping

Reversible contrast mapping (RCM) is a simple integer transform that app...

Adjacent-Bits-Swapped Polar codes: A new code construction to speed up polarization

The construction of polar codes with code length n=2^m involves m layers...

A steganographic approach based on the chaotic fractional map and in the DCT domain

A steganographic method based on the chaotic fractional map and in the D...

Securing LSB embedding against structural steganalysis

This work explores the extent to which LSB embedding can be made secure ...