Detecting LSB Matching by Applying Calibration Technique for Difference Image

Size: px
Start display at page:

Download "Detecting LSB Matching by Applying Calibration Technique for Difference Image"

Transcription

1 Detecting LSB atching by Applying Calibration Technique for Difference Image iaolong Li Institute of Computer Science & Technology Peking University 87, Beijing, P. R. China Tieyong Zeng CLA, ENS Cachan, CNRS, UniverSud 6 Avenue du President Wilson, F-93 Cachan, France zeng@cmla.enscachan.fr Bin Yang Institute of Computer Science & Technology Peking University 87, Beijing, P. R. China yangbin@icst.pku.edu.cn ABSTRACT In this paper, we investigate the calibration technique used in steganalysis of LSB matching. Instead of working on the original image, we propose to calculate the calibration-based detectors (e.g. Calibrated HCF CO) on the difference image, which is defined as the difference of the adjacent pixels of an image. The theoretical reliability of the new detectors is carefully studied. oreover, several practical observations for enhancing the detectability are also given. The extensive experimental results clearly illustrate that the new detectors outperform the previous. Indeed, the new ones perform well even when the embedding rate is low. Categories and Subject Descriptors D.. [Software Engineering]: Software Architectures information hiding General Terms Security Keywords Steganalysis, LSB atching, Calibration, Difference Image. INTRODUCTION The goal of steganography is to embed a message within an innocuous looking cover data so that casual inspection of the resulting medium will not reveal the presence of the message. On the contrary, the purpose of steganalysis is to detect whether the observed data contains secret message. Correspondance author. This work was supported by National Key Technology R&D Program of China under contract No.6BAHA. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. &Sec 8, September 3, 8, Oxford, United Kingdom. Copyright 8 AC /8/9...$5.. The scope of more advanced steganalysis also includes the feature (e.g. length) estimation and even recovering the secret message. Generally, a cover data might appear as digital image, audio, video and text, etc. In this paper, we consider digital image as cover data and concentrate our efforts on the steganalytic techniques. Least significant bit (LSB) replacement and LSB matching are two widely-used steganographic schemes [, ]. The embedding process of LSB replacement is rather simple: first, converting the secret data into a stream of bits; then, choosing cover pixels in a pseudo-random order generated by a shared secret key; and finally, replacing the LSB of each selected cover pixel by the correspondent secret data bit. For LSB matching, it is a minor modification of LSB replacement: if the secret data bit does not match the LSB of the cover image, then is randomly either added to or subtracted from the cover pixel value. Some recent works [, 5, 8] have shown that LSB replacement can be easily detected even when the embedding rate (secret data bits embedded per pixel) is very low. However, the study on steganalysis of LSB matching is just in the early stage. Note that, in LSB replacement, cover pixels with even value are either unchanged or increased by, while the inverse is true for odd-valued pixels. This embedding asymmetry has been considered as the starting point for almost all the steganalytic methods of LSB replacement. Nevertheless, the situation of LSB matching is different. For any fixed pixel value, the probability of increasing or decreasing is equal and thus symmetric. Therefore, the usual steganalytic methods of LSB replacement can not directly used for LSB matching and the later is proved much harder to detect. In [3], Harmsen et al. proposed a steganalytic method based on the so-called HCF CO for the detection of additive noise based steganography. In [7], Ker pointed out that this method performs rather well for detecting LSB matching in RGB color images, but it is not reliable for gray-scale images. Indeed, for gray-scale images, although the HCF CO decreases after LSB matching embedding, its ranges for cover and stego image are heavily overlapped. Hence, the HCF CO can not distinguish well between the cover and the stego for gray-scale images. In order to overcome this shortcoming, [7] proposed an approach based on the calibration (downsample) technique, which is proved much more effective. The main idea of [7] is that the procedure of downsample can reduce the embedding noise. Furthermore,

2 in [6], Ker explained theoretically why the calibration technique is useful for detecting LSB matching. In [9], Li et al. further investigated the calibration technique and proposed to downsample only for non-oscillating pixels. They considered the ratio of the histogram s discrete Fourier transform (DFT) coefficients of the image to the corresponding coefficients of the downsampled image, and utilized a linear combination of these ratios as a detector. Experimental results have shown that, as compared to the method in [7], the detectors in [9] are more reliable, especially for uncompressed images. We also remark that, besides the above mentioned target detectors for LSB matching, there exists also the universal detectors which are intended to detect a wide range of steganographic algorithms, including previously unknown methods. For instance, the WA (wavelet absolute moment) detector proposed in [] is reported to outperform Ker s detectors in [7]. Usually, the universal detectors extract the features in certain domain and then apply the SV (support vector machine) or FLD (Fisher linear discriminant) to built -class classifier. In the literature, the calibration-based detectors are few steganalytic detectors which are able to give theoretical proof (as opposed to empirical demonstrations) of their correctness. In this paper, we investigate the calibration technique used in steganalysis of LSB matching. We propose to calculate the calibration-based detectors (e.g. Calibrated HCF CO) on the difference image, which is defined as the difference of adjacent pixels of an image. In Section, we give a brief introduction to the previous works [3, 7, 6, 9] for detecting LSB matching. In Section 3, we theoretically discuss the calibration-based detectors which are calculated on the difference image. Then in Section, extensive experimental results are reported. As compared to the previous works, the results illustrate the excellent performance of the new detectors. Finally, we conclude our discussion in Section 5.. PREVIOUS CALIBRATION-BASED DE- TECTORS Let I be a gray-scale image, h be the histogram of I and b h be the DFT of h. In [3], Harmsen et al. called b h the histogram characteristic function (HCF) of I and defined the center of mass of the HCF (HCF CO) as: k= C(I) = k b h(k) k= b h(k) (N = 56). () Note that the symbols used here are slightly different from [3]. Let I c be a gray-scale image, I s be its stego image by LSB matching with embedding rate α, h c and h s are their histograms. As a consequence of LSB matching embedding, we know that h s is a regularization of h c: h s = f α h c, () where the convolutional kernel f α is the distribution of embedding noise: f α() = α, fα() = fα( ) = α. (3) It follows that, in the DFT domain, ch s(k) = c f α(k) b h c(k) = ` α sin (kπ/n) b hc(k). () By Eq.() and the discrete Čebyšev inequality (Chap., []), we can get C(I s) C(I c). This illustrates that after LSB matching embedding, the HCF CO will decrease. Based on this observation, [3] proposed to use HCF CO as a detector to distinguish the cover and the stego image. ore precisely, for an image I, we first calculate C(I), and then classify the cover and the stego image according to C(I) T or C(I) < T, where T is a predefined threshold. [7] modified this detector. Let e I be the downsampled image of I, where its pixel value is given by ei i,j = (I i,j + I i+,j + I i,j+ + I i+,j+)/. (5) Experimental results have shown that, for cover image I, we have C(I) C( I). e However, C(I) < C( I) e holds for most stego images subjected to LSB matching. Therefore, [7] proposed to use C(I)/C( I) e as a dimensionless detector and showed experimentally that this detector is much more reliable than C(I). Here, the downsampled image serves as a calibration of the full-sized image for CO. In [6], Ker explained why the downsample technique is useful for detecting LSB matching. We summarize his idea in the following theorem (see [9] for details of the proof). Theorem. Suppose that, Y, Y,..., Y is a sequence of independent discrete random variables, is uniformly distributed on {,,..., } and Y i satisfies: P (Y i = ) = α/ and P (Y i = ) = P (Y i = ) = α/, where α ], ] is a constant. Then, we have j P + k j i= P Yi g (α), t = ; = t = g (α), t = ±, where g (α) = mλ m, λ m = P Y i = m. (6) i= oreover, when >, we have g (α) < α. Let I e c ( I e s, resp.) be the downsampled image of I c (I s, resp.). Now, we assume that the sum of four cover pixels {(i + i, j + j ) I c : i, j {, }} is uniformly distributed for mod. Then, by taking = in Thm., we can conclude that: Is e can be regarded as the stego image of I e c by LSB matching with embedding rate g (α) < α, the procedure of downsample reduces the difference between the cover and the stego image. oreover, as a consequence, the histograms of I e c and I e s: hc e and h f s, satisfy fh s = f eα e h c, (7) where eα = g (α) and the function f eα is defined in Eq.(3) (α is replaced by eα). [7] called the detector C (I)/C ( I) e as Calibrated HCF CO and proposed another two detectors based on two-dimensional histogram: Adjacency HCF CO and Calibrated Adjacency HCF CO. In [9], Li et al. proposed some improvements for Calibrated HCF CO and Calibrated Adjacency HCF CO. Let s introduce some notations first. For an image I, let d(k, I) = b h(k) / b e h(k), (8) where e h is the histogram of the downsampled image e I, b e h is the DFT of e h. Then, as a consequence of Eq.() and Eq.(7), we can get: d(k, I s) = α sin (kπ/n) eα sin d(k, Ic), (kπ/n)

3 which yields that: d(k, I s) d(k, I c). (9) Therefore, same as the HCF CO, the ratio d(k, I) decreases after LSB matching embedding. Then, to avoid the instability of d(k, I) in high-frequency (i.e. when k is large), [9] considered the cut-off of d(k, I): d (k, I) = min{d(k, I), } and use the following quantity as a detector: D (I) = k= s kd (k, I) k= s, () k where s k are weighted parameters. Note that, as a immediate consequence of Eq.(9), we have D (I s) D (I c), which provides a theoretical reliability for the detector defined in Eq.(). oreover, [9] suggested to downsampling only for smooth pixels. Precisely, they defined a subset ps(i) of the image I: ps(i) = {S i,j : D i,j < T }, where S i,j = {(i + i, j + j ) I : i, j {, }} is the set of four connected pixels, T is a predefined threshold and D i,j = I i,j I i,j+ + I i,j+ I i+,j+ + I i+,j+ I i+,j + I i+,j I i,j describes the oscillation for four connected pixels S i,j. Their idea is that the pixels with smaller oscillation will less change the histogram (for cover image) under the downsample procedure, and thus the better performance of detection is expected. Then, the final detector proposed in [9] is that D ps (I) = D(ps(I)). ore precisely, we first choose ps(i) for a certain threshold T ; then we downsampling ps(i) and calculate d(k, ps(i)) according to Eq.(8) (note that the image I is replaced by ps(i)); finally, we get the detector D (ps(i)) by Eq.(). In [9], the authors also considered the twodimensional histogram based detector D ps (I), we omit the detailed presentation due to the limitation of the space. 3. THE NEW ETHOD Considering the difference image I d, which is defined as the difference of adjacent pixels of a gray-scale image I: I d i,j = I i,j I i+,j + 55, () where the pixel value of I d varies form to 5. Our idea is that the difference image I d will well present the embedding noise as compared to the original image I when the image is wrapped by LSB matching, since the distribution of pixel value of I d is rather concentrated and the maximal modification changes from (for original image) to (for difference image) after embedding. Note that the key point of the calibration-based detector is that the procedure of downsample will reduce the embedding noise. Hence, we will investigate the change of histogram (from cover to stego) for the downsampled image of I d. First, we point out that the cover pixel value Ii,j d changes to (Ii,j d + s + t) after LSB matching embedding (with embedding rate α), where s and t are two independent random variables with distribution function f α (which is defined in Eq.(3)). Then we have: h d s = f α f α h d c, () where h d c (h d s, resp.) is the histogram of I d c (I d s, resp.), I d c (I d s, resp.) is the difference image of the cover (stego, resp.) image I c (I s, resp.). Now, we define the downsampled image (noted by e I d ) of I d as: ei d i,j = (I d i,j + I d i,j+)/. (3) Then, we give the following theorem before a further discussion. Theorem. Suppose that, Y, Y,..., Y is a sequence of independent discrete random variables, is uniformly distributed on {,,..., } and Y i satisfies: P (Y i = ) = α/ and P (Y i = ) = P (Y i = ) = α/, where α ], ] is a constant. Let j P + µ t = P i= Yi Then, we have g (α), µ = µ µ = µ k = t. () g (α) where the function g (α) is defined in Eq.(6). g (α), Proof. We decompose P i= Yi as a sum of two terms ( P i= Yi) + (P i=+ Yi), then by the definition of λm in Eq.(6) for m, it is easy to get: µ = µ = = m s+t + s+t + s+t=+m λ sλ t (s + t )λ sλ t st λsλt P, stλ sλ t = mλm s= t= which yields that µ = µ (g (α)/). Similarly, we can get: where µ = µ = F (s, t)λ sλ t + λ F (s, t) = s= t= j max(s, t), s + t ; min(s, t), s + t >. mλ m, Observing that λ + P λm =, by Eq.(6), we have: g (α) µ = = λ + s= s= t= t= g (α) λ m F (s, t)λ sλ t + λ a s,tλ sλ t, mλ m mλ m mλ m where a s,t = (s + t F (s, t)) st. Note that a s,t = a s, t = a s, t = a s,t, then when is odd (the

4 even case is similar), the above equation can be rewritten as g (α) g (α) µ = aa N a T, N = ( )/, where a = (λ λ, λ λ,..., λ N λ N ), A N = (a s,t) s,t N is symmetric. oreover, we can verify that: ««BN A N = + B A N, B N = + C N N, where B N = (b s,t) s,t N, b s,t = max{s, t}, C N = (c s,t) s,t N, c s,t = when s, t < N and c s,t = when s = N or t = N. Then, by the semi-positivity of C N, we can prove inductively that the matrix A N and B N are semipositive. This completes the proof. Let f h d c ( f h d s, resp.) be the histogram of e I d c ( e I d s, resp.), where e I d c ( e I d s, resp.) is the downsampled image of I d c (I d s, resp.) as defined in Eq.(3). Then, under the assumption that the sum of two pixels (I d c ) i,j + (I d c ) i,j+ is uniformly distributed for mod, and by taking = in Thm., we can get fh d s = e f α f h d c, (5) where e f α(t) = µ t, and µ t is defined in Eq.(). Now, by taking = in Thm. and Thm., we have µ = µ < It follows that α and µ = µ < α α. ef α(t) < (f α f α)(t), t {±, ±}. (6) Then reviewing Eq.(), Eq.(5) and Eq.(6), we can conclude that, as compared to the original (non downsampled) image, the probability of the pixel value p changing to (p+t) is reduced in the downsampled case, where t {±, ±}. In other words, the procedure of downsample reduces the embedding noise, for difference image. Furthermore, in the DFT domain, we have and ch d s(k) = (α α ) sin θ α sin θ ch d c (k), cfh d s(k) = ` µ sin θ µ sin θ c fh d c (k), where θ = kπ/n. Here, the value of N is 5 (instead of 56) since the histogram of difference image is defined on [, 5]. Then, same as Eq.(9), we have d d (k, I s) d d (k, I c), (7) where d d (k, I) = h cd (k) / c hd f(k). Eq.(7) guarantees the theoretical reliability of the detector defined in Eq.() for difference image, i.e. I is replaced by I d when we calculate the detector by Eq.(). After the above theoretical analysis, we now present some examples to show that the application of calibration-based detectors on difference image can significantly improve the detection performance. We also remark that the above theoretical analysis also holds for the sum image I s defined as: I s i,j = I i,j + I i+,j... 3 uncompressed images embedding rate is compressed images embedding rate is.. Figure : The ROC curves for the Calibrated HCF CO which is calculated on the difference image (solid), the sum image (dotted) and the original image (dashed), respectively. Nevertheless, the detection performance of the detectors carried on sum image is much worse than the one using difference image. Let s see Fig., which shows the comparison of Calibrated HCF CO calculated on three different types (difference, sum and original) of image: ) Detector C(I d )/C( I ed ) (solid), which is calculated on difference image, i.e. we first obtain I d by Eq.(), then the resampled image ei d by Eq.(3) and the HCF COs C(I d ), C( I ed ) by Eq.(). Note that here the value of Nin Eq.() is 5 instead of 56. This detector will be denoted by F d in the upcoming section. ) Detector C(I s )/C( I es ) (dotted), which is calculated on sum image and will be denoted by F s in the upcoming section. 3) Detector C(I)/C( I) e (dashed), which is the original Calibrated HCF CO proposed in [7]. From Fig., we can clearly see that the detector based on difference image is much better than its original version and the one applying for the sum image.. EPERIENTAL RESULTS First, we would like to point out two important observations. ) As the natural images are somewhat contin-

5 uous and the difference image describes the variation between adjacent pixels, hence the histogram of the difference image should be concentrated in an interval around 55. Experiments suggest that we can take this interval as [55 8, ]. Then, a natural idea is that we can calculate the histogram as below, for k {,,..., 56}: h d (k) = {(i, j) : I d (i, j) = 7 + k}, (8) and then normalize h d. Now, note that h d is defined on [, 56], then when we calculate the HCF CO by Eq.(), the value of N is 57. ) When calculating the calibration based detectors for diffrence image, the application of lowfrequency DFT coefficients usually leads to a better performance, e.g. we might use the first 6 DFT coefficients ch d (k) for HCF CO in Eq.(), instead of 8 (or, in other words, we might replace the upper index N/ by N/ for the sum). The comparison experiments illustrating this phenomena will be reported below. Next, we describe the image sets used in our experiments. ) Image Set (IS-): same as [7], we downloaded 3 images from the USDA NRCS Photo Gallery. For testing, we resampled each of them to the /3 of the original size (the size of the result images are about 7 5) and converted each image to gray-scale. ) Image Set (IS-): this set contains 5 images with good quality. These images were collected from several types of digital cameras and then resampled to make all the images with the size from to 8 8 and changed to gray-scale. 3) Image Set 3 (IS- 3): JPEG version of IS- with quality factor 9. ) Image Set (IS-): JPEG version of IS- with quality factor 75. For experiments, we consider the following detectors: Detector A: Calibrated HCF CO [7]. Detector B: Adjacency HCF CO [7]. Detector C: Calibrated Adjacency HCF CO [7]. Detector D: the detector D ps (I) defined in [9] with s k = k and the threshold T =. Detector E: the detector D ps (I) defined in [9] with s k,k = and the threshold T =. Detector F d : the detector C(I d )/C( I ed ). Detector F s : the detector C(I s )/C( I es ). Detectors G 6, G 8, G ps 6, Gps 8 : the detectors C(Id )/C( I ed ) (for G 6 and G 8) or C(ps(I d ))/C( ps(i d )) (for G ps 6 and G ps 8 ). Here we use Eq.(8) to calculate the histogram, the index 6 or 8 of the detectors means to calculate the HCF CO in Eq.() by taking the first 6 or 8 DFT coefficients, respectively, the index ps means to get the detector by using the technique of pixel selection proposed in [9], i.e. we choose a subset ps(i d ) of image I d as follows: ps(i d ) = n I d i,j, I d i,j+ : I d i,j I d i,j+ < T where T is a predefined threshold (we choose T = 3 in our tests), then we consider ps(i d ) as an image and calculate the detectors G ps 6 or Gps 8. Detectors H 6, H 8, H ps 6, Hps 8 : the detectors D(Id ) (for H 6 and H 8) or D (ps(i d )) (for H ps 6 and Hps 8 ) defined in Eq.() with s k = k. Here we use Eq.(8) to calculate the histogram, and the meaning of index 6, 8 or ps is identical as the detector G. Now, let s see Table. and Table., they show the false positive rate when the false negative rate is.5, which can o, Table : False-positive rate at which false-negative rate is.5, for uncompressed images. E-R means embedding rate. Image Set IS- IS- IS- IS- IS- IS- E-R Det. A [7] Det. B [7] Det. C [7] Det. D [9] Det. E [9] Det. F d Det. F s Det. G Det. G Det. H Det. H be regarded as a measure of performance for steganalytic detectors []. For each column (indicating a fixed image set), we underline three smallest values which stand for three best detectors for this image set. From the two tables, we can see that: ) F d is better than F s. This emphasizes the advantage of difference image, as compared to sum image. ) The difference image based detectors F d, G 6, G 8, G ps 6 and H 6, H 8, H ps 6 are better than the detectors A E, especially when the embedding rate is low. 3) The pixel selection technique can improve the performance of the detectors which use low-frequency DFT coefficients (for instance, we can compare G 6 with G ps 6, H6 with Hps 6 ), but it is useless for the detectors using all the DFT coefficients (note that the DFT coefficients are symmetric). ) When the embedding rate is low, the utilization of low-frequency DFT coefficients is useful. 5) The best two detectors are G ps 6 and Hps 6, which combine several techniques such as the application of difference image, the procedure of pixel selection and the utilization of low-frequency DFT coefficients. 6) The HCF CO based detector G ps 6 is slightly better than H ps 6, which uses the linear combination of the ratios for the corresponding DFT coefficients. Finally, to better illustrate the excellent performance of the new detectors, we present the comparisons of the ROC curves in Fig. for the following detectors: Detector G ps 6 (solid), Detector H ps 6 (dotted), Detector A: Calibrated HCF CO (dashed), Detector D: D ps (I) (dashdot). Here, the detectors A and D are ineffective while both the detectors G ps 6 and Hps 6 perform rather well. 5. CONCLUSIONS This paper investigated the calibration-based detectors calculated on the difference image to detect LSB matching. Combining techniques of pixel selection and utilizing lowfrequency DFT coefficients, the new detectors outperform the previous ones and are capable of detecting LSB matching in gray-scale image even when the embedding rate is low,

6 Table : False-positive rate at which false-negative rate is.5, for compressed images. E-R means embedding rate. Image Set IS-3 IS-3 IS-3 IS- IS- IS- E-R Det. A [7] Det. B [7] Det. C [7] Det. D [9] Det. E [9] Det. F d Det. F s Det. G Det. G Det. H Det. H uncompressed images (IS ) embedding rate is compressed images (IS 3) embedding rate is... Figure : The ROC curves for different detectors: G ps 6 (solid), Hps 6 (dotted), Calibrated HCF CO (dashed) and D ps (I) (dashdot). especially for compressed images. Our opinion is that the calibration (or, in other words, self-reference) technique is very useful for steganalysis, though this study is just in the initial stage. The more philosophical calibration techniques are expected in the future works. For instance, noting that the difference image is closely related to the Haar wavelet coefficients, a natural extension of our work is to considering the calibration technique in the transform domain. oreover, the combination of the calibration based detectors with SV or FLD also might be a valuable experimental task. 6. ACKNOWLEDGENTS We would like to thank the two anonymous reviewers for their helpful comments on this paper. 7. REFERENCES [] J. Fridrich,. Goljan, and R. Du. Detecting LSB steganography in color and gray-scale images. IEEE ultimedia, 8(): 8, October December. []. Goljan, J. Fridrich, and T. Holotyak. New blind steganalysis and its implications. In Security, Steganography, and Watermarking of ultimedia Contents VIII, volume 67 of Proc. SPIE, pages 3, 6. [3] J. J. Harmsen and W. A. Pearlman. Steganalysis of additive noise modelable information hiding. In Security and Watermarking of ultimedia Contents V, volume 5 of Proc. SPIE, pages 3, 3. [] A. D. Ker. Quantitative evaluation of Pairs and RS steganalysis. In Security, Steganography, and Watermarking of ultimedia Contents VI, volume 536 of Proc. SPIE, pages 83 97,. [5] A. D. Ker. A general framework for structural steganalysis of LSB replacement. In Proc. of the 7th International Workshop on Information Hiding, volume 377 of Springer LNCS, pages 96 3, 5. [6] A. D. Ker. Resampling and the detection of LSB matching in color bitmaps. In Security, Steganography, and Watermarking of ultimedia Contents VII, volume 568 of Proc. SPIE, pages 5, 5. [7] A. D. Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett., (6):, June 5. [8] A. D. Ker. A fusion of maximum likelihood and structural steganalysis. In Proc. of the 9th International Workshop on Information Hiding, volume 567 of Springer LNCS, pages 9, 7. [9]. Li, T. Zeng, and B. Yang. A further study on steganalysis of LSB matching by calibration. Accepted by IEEE ICIP 8, to appear. [] D. itrinovic, J. Pecaric, and A. Fink. Classical and New Inequalities in Analysis. Kluwer. Academic Publishers, Dordrecht, The Netherlands, 993. [] F. A. P. Petitcolas, R. J. Anderson, and. G. Kuhn. Information hiding - A survey. Proc. of the IEEE, 87(7):6 78, July 999. [] T. Sharp. An implementation of key-based digital signal steganography. In Proc. of the th International Workshop on Information Hiding, volume 37 of Springer LNCS, pages 3 6,.

The Square Root Law of Steganographic Capacity

The Square Root Law of Steganographic Capacity The Square Root Law of Steganographic Capacity ABSTRACT Andrew D. Ker Oxford University Computing Laboratory Parks Road Oxford OX1 3QD, UK adk@comlab.ox.ac.uk Jan Kodovský Dept. of Electrical and Computer

More information

Fisher Information Determines Capacity of ε-secure Steganography

Fisher Information Determines Capacity of ε-secure Steganography Fisher Information Determines Capacity of ε-secure Steganography Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt,

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

ROC Curves for Steganalysts

ROC Curves for Steganalysts ROC Curves for Steganalysts Andreas Westfeld Technische Universität Dresden Institut für Systemarchitektur 01062 Dresden mailto:westfeld@inf.tu-dresden.de 1 Introduction There are different approaches

More information

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University

More information

Steganalysis with a Computational Immune System

Steganalysis with a Computational Immune System DIGITAL FORENSIC RESEARCH CONFERENCE Steganalysis with a Computational Immune System By Jacob Jackson, Gregg Gunsch, Roger Claypoole, Gary Lamont Presented At The Digital Forensic Research Conference DFRWS

More information

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton,

More information

Detection of LSB Steganography via Sample Pair Analysis

Detection of LSB Steganography via Sample Pair Analysis 1 Detection of LSB Steganography via Sample Pair Analysis Sorina Dumitrescu, Xiaolin Wu and Zhe Wang Department of Electrical and Computer Engineering McMaster University Hamilton, Ontario, Canada L8S

More information

2. Definition & Classification

2. Definition & Classification Information Hiding Data Hiding K-H Jung Agenda 1. Data Hiding 2. Definition & Classification 3. Related Works 4. Considerations Definition of Data Hiding 3 Data Hiding, Information Hiding Concealing secret

More information

MPSteg-color: a new steganographic technique for color images

MPSteg-color: a new steganographic technique for color images MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it

More information

STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE

STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE 2th European Signal Processing Conference EUSIPCO 22) Bucharest, Romania, August 27-3, 22 STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE Rémi Cogranne, Cathel Zitzmann,

More information

NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION

NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION Sos S. Agaian 1 and Juan P. Perez 2 1NSP Lab, The University of Texas at San Antonio, Electrical Engineering Department,

More information

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Lifang Yu, Yao Zhao 1, Rongrong Ni, Ting Li Institute of Information Science, Beijing Jiaotong University, BJ 100044, China Abstract

More information

Quantitative Steganalysis of LSB Embedding in JPEG Domain

Quantitative Steganalysis of LSB Embedding in JPEG Domain Quantitative Steganalysis of LSB Embedding in JPEG Domain Jan Kodovský, Jessica Fridrich September 10, 2010 / ACM MM&Sec 10 1 / 17 Motivation Least Significant Bit (LSB) embedding Simplicity, high embedding

More information

Optimized Feature Extraction for Learning-Based Image Steganalysis

Optimized Feature Extraction for Learning-Based Image Steganalysis Optimized Feature Extraction for Learning-Based Image Steganalysis Ying Wang, Student Member, IEEE, and Pierre Moulin, Fellow, IEEE Abstract The purpose of image steganalysis is to detect the presence

More information

Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory

Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory Rémi Cogranne, Member, IEEE, ICD - ROSAS - LM2S Troyes University of Technology - UMR 6281, CNRS 12, rue Marie Curie

More information

Research Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

Research Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2010, Article ID 876946, 6 pages doi:10.1155/2010/876946 Research Article Improved Adaptive LSB Steganography Based

More information

New Steganographic scheme based of Reed- Solomon codes

New Steganographic scheme based of Reed- Solomon codes New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;

More information

IEEE COPYRIGHT AND CONSENT FORM

IEEE COPYRIGHT AND CONSENT FORM Manual section 8.1.1B: "Statements and opinions given in work published by the IEEE are the expression of the authors." [ ] Please check this box ifyou do not wish to have video/audio recordings made ofyour

More information

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit 06 International Conference on Mathematical, Computational and Statistical Sciences and Engineering (MCSSE 06) ISBN: 978--60595-396-0 QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant

More information

Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis

Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis Xiaofeng Li 1, Xiangwei Kong 1, Bo Wang 1, Yanqing Guo 1,Xingang You 2 1 School of Information and Communication Engineering Dalian

More information

Steganalysis of ±k Steganography based on Noncausal Linear Predictor

Steganalysis of ±k Steganography based on Noncausal Linear Predictor INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL ISSN 1841-9836, 9(5):623-632, October, 2014. Steganalysis of ±k Steganography based on Noncausal Linear Predictor K.M. Singh, Y.J. Chanu, T.

More information

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,

More information

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts Jan Kodovský and Jessica Fridrich Department of ECE, Binghamton University, NY, USA {fridrich,jan.kodovsky}@binghamton.edu

More information

Imperfect Stegosystems

Imperfect Stegosystems DISSERTATION DEFENSE Imperfect Stegosystems Asymptotic Laws and Near-Optimal Practical Constructions Tomá² Filler Dept. of Electrical and Computer Engineering SUNY Binghamton, New York April 1, 2011 2

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

Stego key searching for LSB steganography on JPEG decompressed image

Stego key searching for LSB steganography on JPEG decompressed image . RESEARCH PAPER. SCIENCE CHINA Information Sciences March 2016, Vol. 59 032105:1 032105:15 doi: 10.1007/s11432-015-5367-x Stego key searching for LSB steganography on JPEG decompressed image Jiufen LIU

More information

Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients

Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Thanh Hai Thai, Rémi Cogranne, Florent Retraint ICD - ROSAS - LMS - Troyes University of Technology - UMR 68, CNRS Troyes - France

More information

MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich

MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu

More information

Hiding Data in a QImage File

Hiding Data in a QImage File Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has

More information

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

This is a repository copy of The effect of quality scalable image compression on robust watermarking. This is a repository copy of The effect of quality scalable image compression on robust watermarking. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/7613/ Conference or Workshop

More information

Fast and Automatic Watermark Resynchronization based on Zernike. Moments

Fast and Automatic Watermark Resynchronization based on Zernike. Moments Fast and Automatic Watermark Resynchronization based on Zernike Moments Xiangui Kang a, Chunhui Liu a, Wenjun Zeng b, Jiwu Huang a, Congbai Liu a a Dept. of ECE., Sun Yat-Sen Univ. (Zhongshan Univ.), Guangzhou

More information

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a

More information

Perturbed Quantization Steganography

Perturbed Quantization Steganography Perturbed Quantization Steganography Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 13902-6000 001 607 777 2577 fridrich@binghamton.edu Miroslav Goljan SUNY Binghamton Department of

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

STEGANOGRAPHIC CAPACITY OF LOCALLY UNIFORM MARKOV COVERS

STEGANOGRAPHIC CAPACITY OF LOCALLY UNIFORM MARKOV COVERS STEGANOGRAPHIC CAPACITY OF LOCALLY UNIFORM MARKOV COVERS Valeriy Voloshko Research Institute for Applied Problems of Mathematics and Informatics Minsk, BELARUS e-mail: ValeraVoloshko@yandex.ru Abstract

More information

Adaptive Steganography and Steganalysis with Fixed-Size Embedding

Adaptive Steganography and Steganalysis with Fixed-Size Embedding Adaptive Steganography and Steganalysis with Fixed-Size Embedding Benjamin Johnson ae, Pascal Schöttle b, Aron Laszka c, Jens Grossklags d, and Rainer Böhme b a Cylab, Carnegie Mellon University, USA b

More information

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Anindya Sarkar and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

Improving Selection-Channel-Aware Steganalysis Features

Improving Selection-Channel-Aware Steganalysis Features Improving Selection-Channel-Aware Steganalysis Features Tomáš Denemark and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, {tdenema1,fridrich}@binghamton.edu, Pedro Comesaña-Alfaro, Department

More information

Integer Least Squares: Sphere Decoding and the LLL Algorithm

Integer Least Squares: Sphere Decoding and the LLL Algorithm Integer Least Squares: Sphere Decoding and the LLL Algorithm Sanzheng Qiao Department of Computing and Software McMaster University 28 Main St. West Hamilton Ontario L8S 4L7 Canada. ABSTRACT This paper

More information

Logarithmic quantisation of wavelet coefficients for improved texture classification performance

Logarithmic quantisation of wavelet coefficients for improved texture classification performance Logarithmic quantisation of wavelet coefficients for improved texture classification performance Author Busch, Andrew, W. Boles, Wageeh, Sridharan, Sridha Published 2004 Conference Title 2004 IEEE International

More information

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding Learning outcomes Palettes and GIF CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Learn how images are represented using a palette Get an overview of hiding techniques in

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

Scale-Invariance of Support Vector Machines based on the Triangular Kernel. Abstract

Scale-Invariance of Support Vector Machines based on the Triangular Kernel. Abstract Scale-Invariance of Support Vector Machines based on the Triangular Kernel François Fleuret Hichem Sahbi IMEDIA Research Group INRIA Domaine de Voluceau 78150 Le Chesnay, France Abstract This paper focuses

More information

Capacity-Approaching Codes for Reversible Data Hiding

Capacity-Approaching Codes for Reversible Data Hiding Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang 1,2,BiaoChen 1, and Nenghai Yu 1, 1 Department of Electrical Engineering & Information Science, University of Science and Technology

More information

Fully smoothed L1-TV energies : properties of the optimal solutions, fast minimization and applications. Mila Nikolova

Fully smoothed L1-TV energies : properties of the optimal solutions, fast minimization and applications. Mila Nikolova Fully smoothed L1-TV energies : properties of the optimal solutions, fast minimization and applications Mila Nikolova CMLA, ENS Cachan, CNRS 61 Av. President Wilson, F-94230 Cachan, FRANCE nikolova@cmla.ens-cachan.fr

More information

ML Detection of Steganography

ML Detection of Steganography ML Detection of Steganography Mark T Hogan, Neil J Hurley, Guénolé CM Silvestre, Félix Balado and Kevin M Whelan Department of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland ABSTRACT

More information

PCA & ICA. CE-717: Machine Learning Sharif University of Technology Spring Soleymani

PCA & ICA. CE-717: Machine Learning Sharif University of Technology Spring Soleymani PCA & ICA CE-717: Machine Learning Sharif University of Technology Spring 2015 Soleymani Dimensionality Reduction: Feature Selection vs. Feature Extraction Feature selection Select a subset of a given

More information

ECE 661: Homework 10 Fall 2014

ECE 661: Homework 10 Fall 2014 ECE 661: Homework 10 Fall 2014 This homework consists of the following two parts: (1) Face recognition with PCA and LDA for dimensionality reduction and the nearest-neighborhood rule for classification;

More information

Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue

Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue Matthias Kirchner Institute for System Architecture Technische Universität Dresden 162 Dresden, Germany matthias.kirchner@inf.tu-dresden.de

More information

Test Generation for Designs with Multiple Clocks

Test Generation for Designs with Multiple Clocks 39.1 Test Generation for Designs with Multiple Clocks Xijiang Lin and Rob Thompson Mentor Graphics Corp. 8005 SW Boeckman Rd. Wilsonville, OR 97070 Abstract To improve the system performance, designs with

More information

Error Spectrum Shaping and Vector Quantization. Jon Dattorro Christine Law

Error Spectrum Shaping and Vector Quantization. Jon Dattorro Christine Law Error Spectrum Shaping and Vector Quantization Jon Dattorro Christine Law in partial fulfillment of the requirements for EE392c Stanford University Autumn 1997 0. Introduction We view truncation noise

More information

STEGANOGRAPHY is the practice and study of techniques

STEGANOGRAPHY is the practice and study of techniques INFOCOMMUNICATIONS JOURNAL Modeling Content-Adaptive Steganography with Detection Costs as a Quasi-Zero-Sum Game Aron Laszka, Member, IEEE, Ádám Máté Földes, Member, IEEE, Abstract Recently, content-adaptive

More information

Quantitative Structural Steganalysis of Jsteg

Quantitative Structural Steganalysis of Jsteg Quantitative Structural Steganalysis of Jsteg Jan Kodovský and Jessica Fridrich, Member, IEEE Abstract Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding

More information

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number Applied Mathematics Volume 013, Article ID 189706, 8 pages http://dx.doi.org/10.1155/013/189706 Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

More information

Maximum Achievable Gain of a Two Port Network

Maximum Achievable Gain of a Two Port Network Maximum Achievable Gain of a Two Port Network Ali Niknejad Siva Thyagarajan Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2016-15 http://www.eecs.berkeley.edu/pubs/techrpts/2016/eecs-2016-15.html

More information

Information Storage Capacity of Crossbar Switching Networks

Information Storage Capacity of Crossbar Switching Networks Information Storage Capacity of Crossbar Switching etworks ABSTRACT In this work we ask the fundamental uestion: How many bits of information can be stored in a crossbar switching network? The answer is

More information

Vector Quantization and Subband Coding

Vector Quantization and Subband Coding Vector Quantization and Subband Coding 18-796 ultimedia Communications: Coding, Systems, and Networking Prof. Tsuhan Chen tsuhan@ece.cmu.edu Vector Quantization 1 Vector Quantization (VQ) Each image block

More information

Quantization Index Modulation using the E 8 lattice

Quantization Index Modulation using the E 8 lattice 1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:

More information

ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION

ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION D. SIMITOPOULOS, A. OIKONOMOPOULOS, AND M. G. STRINTZIS Aristotle University of Thessaloniki Electrical

More information

arxiv: v1 [cs.cr] 18 Jul 2009

arxiv: v1 [cs.cr] 18 Jul 2009 Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,

More information

Steganalysis in JPEG

Steganalysis in JPEG Steganalysis in JPEG CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2007 Dr Hans Georg Schaathun Steganalysis in JPEG Spring 2007 1 / 24 Learning Outcomes learn additional

More information

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid

More information

Lecture 5. Ideal and Almost-Ideal SG.

Lecture 5. Ideal and Almost-Ideal SG. Lecture 5. Ideal and Almost-Ideal SG. Definition. SG is called ideal (perfect or unconditionally undetectable ISG),if its detection is equivalently to random guessing of this fact even with the use of

More information

Multimedia Networking ECE 599

Multimedia Networking ECE 599 Multimedia Networking ECE 599 Prof. Thinh Nguyen School of Electrical Engineering and Computer Science Based on lectures from B. Lee, B. Girod, and A. Mukherjee 1 Outline Digital Signal Representation

More information

On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms

On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms [Extended Abstract] Tobias Storch Department of Computer Science 2, University of Dortmund, 44221 Dortmund,

More information

NOISE can sometimes improve nonlinear signal processing

NOISE can sometimes improve nonlinear signal processing 488 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 2, FEBRUARY 2011 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member, IEEE, and Bart Kosko, Fellow,

More information

Image Compression. 1. Introduction. Greg Ames Dec 07, 2002

Image Compression. 1. Introduction. Greg Ames Dec 07, 2002 Image Compression Greg Ames Dec 07, 2002 Abstract Digital images require large amounts of memory to store and, when retrieved from the internet, can take a considerable amount of time to download. The

More information

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai. Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information

More information

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST IGOR BELI^, ALEKSANDER PUR NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST There are several problems where it is very important to know whether the tested data are distributed according to the

More information

HOSVD Based Image Processing Techniques

HOSVD Based Image Processing Techniques HOSVD Based Image Processing Techniques András Rövid, Imre J. Rudas, Szabolcs Sergyán Óbuda University John von Neumann Faculty of Informatics Bécsi út 96/b, 1034 Budapest Hungary rovid.andras@nik.uni-obuda.hu,

More information

AS A TECHNIQUE that embeds the secret message

AS A TECHNIQUE that embeds the secret message IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 7, JULY 2013 2775 Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression Weiming Zhang,

More information

Case Studies of Logical Computation on Stochastic Bit Streams

Case Studies of Logical Computation on Stochastic Bit Streams Case Studies of Logical Computation on Stochastic Bit Streams Peng Li 1, Weikang Qian 2, David J. Lilja 1, Kia Bazargan 1, and Marc D. Riedel 1 1 Electrical and Computer Engineering, University of Minnesota,

More information

HARMONIC WAVELET TRANSFORM SIGNAL DECOMPOSITION AND MODIFIED GROUP DELAY FOR IMPROVED WIGNER- VILLE DISTRIBUTION

HARMONIC WAVELET TRANSFORM SIGNAL DECOMPOSITION AND MODIFIED GROUP DELAY FOR IMPROVED WIGNER- VILLE DISTRIBUTION HARMONIC WAVELET TRANSFORM SIGNAL DECOMPOSITION AND MODIFIED GROUP DELAY FOR IMPROVED WIGNER- VILLE DISTRIBUTION IEEE 004. All rights reserved. This paper was published in Proceedings of International

More information

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image

More information

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER 17th European Signal Processing Conference (EUSIPCO 29) Glasgow, Scotland, August 24-28, 29 EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMA AREA UNER THE CURVE FOR THE HAMMING ISTANCE CASSIFIER Chun Chen,

More information

Digital Watermark Detection in Visual Multimedia Content

Digital Watermark Detection in Visual Multimedia Content Digital Watermark Detection in Visual Multimedia Content PhD Thesis Defense Peter Meerwald Dept. of Computer Sciences, University of Salzburg September 2010 Watermarking Watermarking is a technology to

More information

Total Ordering on Subgroups and Cosets

Total Ordering on Subgroups and Cosets Total Ordering on Subgroups and Cosets Alexander Hulpke Department of Mathematics Colorado State University 1874 Campus Delivery Fort Collins, CO 80523-1874 hulpke@math.colostate.edu Steve Linton Centre

More information

Can the sample being transmitted be used to refine its own PDF estimate?

Can the sample being transmitted be used to refine its own PDF estimate? Can the sample being transmitted be used to refine its own PDF estimate? Dinei A. Florêncio and Patrice Simard Microsoft Research One Microsoft Way, Redmond, WA 98052 {dinei, patrice}@microsoft.com Abstract

More information

Detection of Content Adaptive LSB Matching (a Game Theory Approach)

Detection of Content Adaptive LSB Matching (a Game Theory Approach) Detection of Content Adaptive LSB Matching (a Game Theory Approach) Tomáš Denemark and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA ABSTRACT This paper is an attempt to analyze the interaction

More information

Reducing Delay Uncertainty in Deeply Scaled Integrated Circuits Using Interdependent Timing Constraints

Reducing Delay Uncertainty in Deeply Scaled Integrated Circuits Using Interdependent Timing Constraints Reducing Delay Uncertainty in Deeply Scaled Integrated Circuits Using Interdependent Timing Constraints Emre Salman and Eby G. Friedman Department of Electrical and Computer Engineering University of Rochester

More information

Image Recognition Using Modified Zernike Moments

Image Recognition Using Modified Zernike Moments Sensors & Transducers 204 by IFSA Publishing S. L. http://www.sensorsportal.com Image Recognition Using Modified ernike Moments Min HUANG Yaqiong MA and Qiuping GONG School of Computer and Communication

More information

Low Complexity Features for JPEG Steganalysis Using Undecimated DCT

Low Complexity Features for JPEG Steganalysis Using Undecimated DCT 1 Low Complexity Features for JPEG Steganalysis Using Undecimated DCT Vojtěch Holub and Jessica Fridrich, Member, IEEE Abstract This article introduces a novel feature set for steganalysis of JPEG images

More information

Reduced-Error Constant Correction Truncated Multiplier

Reduced-Error Constant Correction Truncated Multiplier This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.*, No.*, 1 8 Reduced-Error Constant Correction Truncated

More information

Detection of Content Adaptive LSB Matching (a Game Theory Approach)

Detection of Content Adaptive LSB Matching (a Game Theory Approach) Detection of Content Adaptive LSB Matching (a Game Theory Approach) Tomáš Denemark, Jessica Fridrich / 5 Content-adaptive steganography Every pixel is changed with probability β i = exp( λρ i) + exp( λρ

More information

Watermark Extraction Optimization Using PSO Algorithm

Watermark Extraction Optimization Using PSO Algorithm Research Journal of Applied Sciences, Engineering and Technology 5(12): 3312-3319, 2013 ISS: 2040-7459; e-iss: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: June 09, 2012 Accepted: July 18,

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Finite nilpotent metacyclic groups never violate the Ingleton inequality Author(s) Stancu, Radu; Oggier,

More information

Wavelet de-noising for blind source separation in noisy mixtures.

Wavelet de-noising for blind source separation in noisy mixtures. Wavelet for blind source separation in noisy mixtures. Bertrand Rivet 1, Vincent Vigneron 1, Anisoara Paraschiv-Ionescu 2 and Christian Jutten 1 1 Institut National Polytechnique de Grenoble. Laboratoire

More information

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution 650 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 4, APRIL 2001 Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution Srdjan Stanković, Member, IEEE,

More information

Detecting Doubly Compressed JPEG Images by Factor Histogram

Detecting Doubly Compressed JPEG Images by Factor Histogram APSIPA ASC 2 Xi an Detecting Doubly Compressed JPEG Images by Factor Histogram Jianquan Yang a, Guopu Zhu a, and Jiwu Huang b a Shenzhen Institutes o Advanced Technology, Chinese Academy o Sciences, Shenzhen,

More information

Introduction to Computer Vision. 2D Linear Systems

Introduction to Computer Vision. 2D Linear Systems Introduction to Computer Vision D Linear Systems Review: Linear Systems We define a system as a unit that converts an input function into an output function Independent variable System operator or Transfer

More information

A Statistical Analysis of Fukunaga Koontz Transform

A Statistical Analysis of Fukunaga Koontz Transform 1 A Statistical Analysis of Fukunaga Koontz Transform Xiaoming Huo Dr. Xiaoming Huo is an assistant professor at the School of Industrial and System Engineering of the Georgia Institute of Technology,

More information

A New Unsupervised Event Detector for Non-Intrusive Load Monitoring

A New Unsupervised Event Detector for Non-Intrusive Load Monitoring A New Unsupervised Event Detector for Non-Intrusive Load Monitoring GlobalSIP 2015, 14th Dec. Benjamin Wild, Karim Said Barsim, and Bin Yang Institute of Signal Processing and System Theory of,, Germany

More information

Face recognition Computer Vision Spring 2018, Lecture 21

Face recognition Computer Vision Spring 2018, Lecture 21 Face recognition http://www.cs.cmu.edu/~16385/ 16-385 Computer Vision Spring 2018, Lecture 21 Course announcements Homework 6 has been posted and is due on April 27 th. - Any questions about the homework?

More information

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING By Spandana Bodapati Bachelor of Science Jawaharlal Nehru Technological University Hyderabad, India 200 Submitted to the Faculty of the Graduate

More information

Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization

Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization Aleksey Zhuvikin #1, Valery Korzhik #2, Guillermo Morales-Luna 3 1 arxiv:1608.02291v1 [cs.mm] 8 Aug 2016 # Department of Secured Communication

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M Kurkoski University of Electro-Communications Tokyo, Japan kurkoski@iceuecacjp Abstract A construction using the E8 lattice and Reed-Solomon

More information

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena Multimedia Security Mauro Barni University of Siena : summary Optimum decoding/detection Additive SS watermarks Decoding/detection of QIM watermarks The dilemma of de-synchronization attacks Geometric

More information

Advanced statistical methods for data analysis Lecture 1

Advanced statistical methods for data analysis Lecture 1 Advanced statistical methods for data analysis Lecture 1 RHUL Physics www.pp.rhul.ac.uk/~cowan Universität Mainz Klausurtagung des GK Eichtheorien exp. Tests... Bullay/Mosel 15 17 September, 2008 1 Outline

More information