IJCNIS Vol. 8, No. 8, 8 Aug. 2016
Cover page and Table of Contents: PDF (size: 839KB)
Full Text (PDF, 839KB), PP.39-46
Views: 0 Downloads: 0
Steganography, Eight-Queen’s problem, sample pair steganalysis, RS steganalysis, Least Significant Bit (LSB) embedding, pseudo randomization, Detectability
There are many steganalysis methods, which can estimate length of a message embedded in least significant bits. It may be embedded either in spatial domain or in frequency domain. The well known approaches are Chi – Square test, RS steganalysis and Sample Pair steganalysis. Many commercial steganographic programs are based on LSB method. It is important to ensure undetectablity of a hidden message in a carrier. We present an analysis of steganographic security on data hiding approach using eight queen solutions. In this approach, relationship between message bytes and 8-queen solutions is embedded in the cover. Further, we propose a new approach to adjust the statistical properties of the cover image in such a way that the steganalyst may not be able to detect the presence of hidden message. The proposed approach is tested using steganalysis tool STEGEXPOSE and the experimental results found are within acceptable range.
Abhishek Bansal, Sunil K. Muttoo, Vinay Kumar, "Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.8, pp.39-46, 2016. DOI:10.5815/ijcnis.2016.08.05
[1]Akgün, M., Kavak, P., & Demirci, H. (2008). New results on the key scheduling algorithm of RC4. In Progress in Cryptology-INDOCRYPT 2008, Springer Berlin Heidelberg, pp 40-52.
[2]Bansal A., Muttoo S. K., Kumar V. (2015), “Secure Data Hiding Along Randomly Selected Closed Knight Tour”, International Journal of Applied Security Research, Taylor & Francis, vol. 10 no. 1 (In Press).
[3]Bansal A., Muttoo S. K., Kumar V., (2014) Data Hiding approach based on Eight-Queens Problem and Pixel Mapping Method, International Journal of Signal Processing, Vol.7 No. 5, pp 47-58.
[4]Bell, Jordan and Stevens, Brett,(2009), ‘A survey of known results and research area for n-queens’,Discrete mathematics, Vol. 309, No. 1, pp 1-31.
[5]Boehm, B. (2014). StegExpose-A Tool for Detecting LSB Steganography.arXiv preprint arXiv:1410.6656.
[6]Chan, C. K., & Cheng, L. M. (2004). ‘Hiding data in images by simple LSB substitution’. Pattern recognition, 37(3), pp. 469-474.
[7]Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), pp. 727-752.
[8]Dumitrescu, S., Wu, X., & Memon, N. (2002, June). On steganalysis of random LSB embedding in continuous-tone images. In Image Processing. 2002. Proceedings. 2002 International Conference on IEEE, Vol. 3, pp. 641-644.
[9]Fridrich, J., Goljan, M., & Du, R. (2001, October). Reliable detection of LSB steganography in color and grayscale images. In Proceedings of the 2001 workshop on Multimedia and security: new challenges, ACM, New York, NY, USA, pp. 27-30.
[10]Ker, A. D. (2004, June). Quantitative evaluation of pairs and RS steganalysis. In Electronic Imaging 2004, International Society for Optics and Photonics, pp. 83-97
[11]Ker, Andrew D., (2007), “Steganalysis of embedding in two least-significant bits. “Information Forensics and Security, IEEE Transactions on vol. 2. No.1, pp. 46-54.
[12]Kumar, S., & Muttoo, S. K. (2009, November). Distortionless data hiding based on Slantlet transform. In Multimedia Information Networking and Security, 2009. MINES'09. International Conference on IEEE, Vol. 1, pp. 48-52.
[13]Kumar, S., & Muttoo, S. K. (2011). Steganography based on contourlet transform. International Journal of Computer Science and Information Security, 9(6), 215.
[14]Kumar, S., & Muttoo, S. K. (2013). A comparative study of image steganography in wavelet domain. International Journal of Computer Science and Mobile Computing, 2(2), pp. 91-101.
[15]Luo, X., Liu, F., & Lu, P. (2007). A LSB steganography approach against pixels sample pairs steganalysis. International Journal of Innovative Computing, Information and Control (IJICIC), 3(3), pp. 575-588.
[16]M. Reichling, (1987) , “A simplified solution of the n queens problem”, Inform. Process. Lett. 25, pp. 253-255.
[17]Madachy, J. S. (1979). Madachy's Mathematical Recreations. Dover Publications.
[18]Muttoo S. K., Kumar V and Bansal A, (2012) “Secure Data Hiding Using Eight Queens Solutions”, International Journal of Information Security & Privacy, USA, Vol. 6, pp 55-70.
[19]Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. Security & Privacy, IEEE, 1(3), pp 32-44.
[20]S. Dumitrescu, Wu Xiaolin and Zhe Wang, (2003), “Detection of LSB steganography via Sample Pair
Analysis”, In LNCS, vol. 2578, Springer-Verlang, New York, pp. 355-372.
[21]Steinhaus H., (1999), “Mathematical Snapshots”, 3rd Ed. New York: Dover, pp. 29-30.
[22]V. Kumar, Bansal A., Muttoo S. K., (2014), “Data Hiding Method Based on Inter-block difference in Eight queens Solutions and LSB Substitution”, International Journal of Information Security & Privacy, USA, Vol. 8, no. 2, pp. 42-52.