Nigeria was listed as a part of terrorist states by United States of America as a result of Islamic group (Boko Haram Sect) attacks and other activities in the nation. It has also been discovered that the group emplo...Nigeria was listed as a part of terrorist states by United States of America as a result of Islamic group (Boko Haram Sect) attacks and other activities in the nation. It has also been discovered that the group employs “steganographic” schemes as a secure means for transmitting their hidden information to each other via Internet and social networks. The group has killed thousands of people since their increased insurgency in July, 2009. These challenges have affected the nation’s foreign policies, political and social economic developments. This research addresses the challenges by employing forensic technique using blind steganalysis approach to detect the presence of the hidden messages in images. Image Quality Metric is employed for extracting the features, and logistic regression is trained as the classifier to predict the stego-images. We show the effectiveness of the method by conducting test and analysis with 319 images varying in size and style. The result shows that the performance of the method is better than other steganalysis methods.展开更多
In reversible data hiding, pixel value ordering is an up-to-the-minute research idea in the field of data hiding. Secret messages are embedded in the maximum or the minimum value among the pixels in a block. Pixel val...In reversible data hiding, pixel value ordering is an up-to-the-minute research idea in the field of data hiding. Secret messages are embedded in the maximum or the minimum value among the pixels in a block. Pixel value ordering helps identify the embeddable pixels in a block but suffers from fewer embedding payloads. It leaves many pixels in a block without implanting any bits there. The proposed scheme in this paper resolved that problem by allowing every pixel to conceive data bits. The method partitioned the image pixels in blocks of size two. In each block, it first orders these two pixels and then measures the average value. The average value is placed in the middle of these two pixels. Thus, the scheme extends the block size from two to three. After applying the embedding method of Weng <i><span>et al</span></i><span>., the implantation task removed the average value from the block to reduce its size again to two. These two alive pixels are called stego pixels, which produced a stego image. A piece of state information is produced during implanting to track whether a change is happening to the block’s cover pixels. This way, after embedding in all blocks, a binary stream of state information is produced, which has later been converted to decimal values. Thus, image data were assembled in a two-dimensional array. Considering the array as another image plane, Weng </span><i><span>et al</span></i><span>.’s method is again applied to embed further to produce another stego image. Model validation ensured that the proposed method performed better than previous work </span><span>i</span><span>n this field.</span>展开更多
MSU Stego Video is a public video steganographic tool, which has strong robustness and is regarded as a real video steganographic tool. In order to increase the detection rate, this paper proposes a new steganoalysis ...MSU Stego Video is a public video steganographic tool, which has strong robustness and is regarded as a real video steganographic tool. In order to increase the detection rate, this paper proposes a new steganoalysis method against MSU, which uses the chessboard character of MSU embedded video, proposes a down-sample block-based collusion method to estimate the original frame and checks the chessboard mode of the different frame between tested frame and estimated frame to detect MSU steganographic evidences. To reduce the error introduced by severe movement of the video content, a method that abandons severe motion blocks from detecting is proposed. The experiment results show that the false negative rate of the proposed algorithm is lower than 5%, and the false positive rate is lower than 2%. Our algorithm has significantly better performance than existing algorithms. Especially to the video that has fast motion, the algorithm has more remarkable performance.展开更多
文摘Nigeria was listed as a part of terrorist states by United States of America as a result of Islamic group (Boko Haram Sect) attacks and other activities in the nation. It has also been discovered that the group employs “steganographic” schemes as a secure means for transmitting their hidden information to each other via Internet and social networks. The group has killed thousands of people since their increased insurgency in July, 2009. These challenges have affected the nation’s foreign policies, political and social economic developments. This research addresses the challenges by employing forensic technique using blind steganalysis approach to detect the presence of the hidden messages in images. Image Quality Metric is employed for extracting the features, and logistic regression is trained as the classifier to predict the stego-images. We show the effectiveness of the method by conducting test and analysis with 319 images varying in size and style. The result shows that the performance of the method is better than other steganalysis methods.
文摘In reversible data hiding, pixel value ordering is an up-to-the-minute research idea in the field of data hiding. Secret messages are embedded in the maximum or the minimum value among the pixels in a block. Pixel value ordering helps identify the embeddable pixels in a block but suffers from fewer embedding payloads. It leaves many pixels in a block without implanting any bits there. The proposed scheme in this paper resolved that problem by allowing every pixel to conceive data bits. The method partitioned the image pixels in blocks of size two. In each block, it first orders these two pixels and then measures the average value. The average value is placed in the middle of these two pixels. Thus, the scheme extends the block size from two to three. After applying the embedding method of Weng <i><span>et al</span></i><span>., the implantation task removed the average value from the block to reduce its size again to two. These two alive pixels are called stego pixels, which produced a stego image. A piece of state information is produced during implanting to track whether a change is happening to the block’s cover pixels. This way, after embedding in all blocks, a binary stream of state information is produced, which has later been converted to decimal values. Thus, image data were assembled in a two-dimensional array. Considering the array as another image plane, Weng </span><i><span>et al</span></i><span>.’s method is again applied to embed further to produce another stego image. Model validation ensured that the proposed method performed better than previous work </span><span>i</span><span>n this field.</span>
基金Supported by the National Natural Science Foundation of China(60970114)Doctoral Fund of Ministry of Education of China(20110141130006)
文摘MSU Stego Video is a public video steganographic tool, which has strong robustness and is regarded as a real video steganographic tool. In order to increase the detection rate, this paper proposes a new steganoalysis method against MSU, which uses the chessboard character of MSU embedded video, proposes a down-sample block-based collusion method to estimate the original frame and checks the chessboard mode of the different frame between tested frame and estimated frame to detect MSU steganographic evidences. To reduce the error introduced by severe movement of the video content, a method that abandons severe motion blocks from detecting is proposed. The experiment results show that the false negative rate of the proposed algorithm is lower than 5%, and the false positive rate is lower than 2%. Our algorithm has significantly better performance than existing algorithms. Especially to the video that has fast motion, the algorithm has more remarkable performance.