Usage of analytic hierarchy process for steganographic inserts detection in images

12/25/2018
by   S. V. Belim, et al.
0

This article presents the method of steganography detection, which is formed by replacing the least significant bit (LSB). Detection is performed by dividing the image into layers and making an analysis of zero-layer of adjacent bits for every bit. First-layer and second-layer are analyzed too. Hierarchies analysis method is used for making decision if current bit is changed. Weighting coefficients as part of the analytic hierarchy process are formed on the values of bits. Then a matrix of corrupted pixels is generated. Visualization of matrix with corrupted pixels allows to determine size, location and presence of the embedded message. Computer experiment was performed. Message was embedded in a bounded rectangular area of the image. This method demonstrated efficiency even at low filling container, less than 10%. Widespread statistical methods are unable to detect this steganographic insert. The location and size of the embedded message can be determined with an error which is not exceeding to five pixels.

READ FULL TEXT
research
09/20/2017

A new adaptive method for hiding data in images

LSB method is one of the well-known steganography methods which hides th...
research
04/23/2023

Images Within Images? A Multi-image Paradigm with Novel Key-Value Graph Oriented Steganography

Steganographic methods have been in the limelight of research and develo...
research
03/25/2018

Digital Cardan Grille: A Modern Approach for Information Hiding

In this paper, a new framework for construction of Cardan grille for inf...
research
07/05/2007

Very fast watermarking by reversible contrast mapping

Reversible contrast mapping (RCM) is a simple integer transform that app...
research
02/09/2022

Adjacent-Bits-Swapped Polar codes: A new code construction to speed up polarization

The construction of polar codes with code length n=2^m involves m layers...
research
08/28/2019

A steganographic approach based on the chaotic fractional map and in the DCT domain

A steganographic method based on the chaotic fractional map and in the D...

Please sign up or login with your details

Forgot password? Click here to reset