IJIGSP Vol. 6, No. 8, 8 Jul. 2014
Cover page and Table of Contents: PDF (size: 318KB)
Full Text (PDF, 318KB), PP.19-24
Views: 0 Downloads: 0
Data Hiding, Steganography, Watermark, Cover Image Selection, Stego-image, Steganalysis
Steganography is the method of information hiding. Free selection of cover image is a particular preponderance of steganography to other information hiding techniques. The performance of steganographic system can be improved by selecting the reasonable cover image. This article presents two level unsupervised image classification algorithm based on statistical characteristics of the image which helps Sender to make reasonable selection of cover image to enhance performance of steganographic method based on his specific purpose. Experiments demonstrate the effect of classification in satisfying steganography requirements.
Seyyed Amin Seyyedi, Nick Ivanov,"Statistical Image Classification for Image Steganographic Techniques", IJIGSP, vol.6, no.8, pp.19-24, 2014. DOI: 10.5815/ijigsp.2014.08.03
[1]L. Huang, L. Tseng, and M. Hwang, “A Reversible Data Hiding Method by Histogram Shifting in High Quality Medical Images”, Journal of Systems and Software, Vol. 86, no. 3, pp. 716-727, 2013.
[2]A. Cheddad, J. Condell, K. Curran, and P.M. Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods”, Digital Signal Processing, Vol. 90, No.3, PP. 727-752, 2010.
[3]M. Mohananthini, and G.Yamuna, “A Robustness Image Watermarking Scheme Based Multiresolution Analysis”, International journal of Image, Graphics and Signal Processing, Vol.11, PP. 9-15, 2012.
[4]B. Li, J. He, J. Huang, and Y.Q. Shi, “Survey on Image Steganography and Steganalysis”, Journal of Information Hiding and Multimedia Signal Processing, Vol.2, No.2, PP. 142-172, 2011.
[5]A. Nissar, and A.H. Mir, “Classification of Steganalysis techniques”, Digital Signal Processing, Vol. 90, No. 6, PP. 1758-1770, 2010.
[6]D.C. Lou, and J.L. Liu, “Steganography method for secure communications”, Computers& Security, Vol. 21, No. 5, PP. 449-460, 2000.
[7]Z. Z. Kermani, and M. Jamzad, “A Robust Steganography Algorithm Based on Texture Similarity UsingGaborFilter”, In IEEE Symposium on Signal processing and Information Technology, PP. 578-582, 2005.
[8]H. Sajedi, and M. Jamzad, “Cover Selection Steganography Method Based on Similarity of Image Blocks”, In IEEE CIT, PP. 8-11, 2008.
[9]S.B. Sadkhan, A.M. Al-Barky, and N.N. Muhammad, “An Agent based Image Steganography using Information Theoretic Parameters”, MASAUM Journal of Computing, Vol. 1, No. 2, PP. 258-264, 2009.
[10]M. Kharrazi, Y.N. Sencar, and N. Memon, “Cover Selection for Steganographic Embedding”, In IEEE image processing, PP. 117:120, 2006.
[11]Y. Sun, and F. Lui, “Selecting Cover for Image Steganography by Correlation Coefficient”, In IEEE ETCS, PP. 159-162, 2010.
[12]J. Zollner, at el, “Modeling the Security of Steganographic Systems”, Information Hiding Workshop, PP.345-355, 1998.
[13]R. Roy, S. Changder, A. Sarkar and N.C Debnath, “Evaluating Image Steganography Techniques: Future Research Challenges”, In ComManTel, PP.21-24, 2013.
[14]S. Goel, A. Rana, and M. Kaur, “ADCT-based Robust Methodology for Image Steganography”, International journal of Image, Graphics and Signal Processing, Vol.11, PP. 23-34, 2013.
[15]W. Zhang, and Sh. Li, “Security Measurments of Steganographic System”, Applied Cryptography and Network Security Springer, Vol.3089, PP. 194-204, 2004.
[16]C. Cachin, “An Information theoretic Model for Steganography”, Information and Computation, Vol. 192, No. 1, PP. 41-56, 2004.
[17]http://exile.felk.cvut.cz/boss/BOSSFinal/index.php?mode=VIEW&tmpl=materials.
[18]http://decsai.ugr.es/cvg/dbimagenes/g512.php.
[19]http://homepages.cae.wisc.edu/~ece533/images/
[20]D. Ch. Wu and W.H. Tsi. A Steganographic Method for Images by Pixel-Value Differencing, Pattern Recognition Letters, Vol. 24, No. 9, PP. 1613-1626, 2003.
[21]B.L. Lai and L.W. Chang, “Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform”, Springer Advances in Image and Video Technology, PP. 1085-1093, 2006.
[22]S.A Seyyedi, and N. Ivanov, “High Payload and Secure Steganography Method Based on Block Partitioning and Integer Wavelet Transform”, International Journal of Security and Its Applications, under review.