2020
DOI: 10.14232/actacyb.279174
|View full text |Cite
|
Sign up to set email alerts
|

An Information Theoretic Image Steganalysis for LSB Steganography

Abstract: Steganography hides the data within a media file in an imperceptible way. Steganalysis exposes steganography by using detection measures. Traditionally, Steganalysis revealed steganography by targeting perceptible and statistical properties which results in developing secure steganography schemes. In this work, we target LSB image steganography by using entropy and joint entropy metrics for steganalysis. First, the Embedded image is processed for feature extraction then analyzed by entropy and joint entropy wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…This section describes the steganalysis model with the proposed hybrid approach for reducing the dimensions of feature sets used in the detection process. The features based on entropy and mutual information have already been described in the previous section; see [7] for details of their implementation. The steganalysis process starts from the feature extraction step, but for experimental purposes, we include the embedding phase before the feature extraction phase, as shown in Fig.…”
Section: Proposed Steganalysis Methods Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…This section describes the steganalysis model with the proposed hybrid approach for reducing the dimensions of feature sets used in the detection process. The features based on entropy and mutual information have already been described in the previous section; see [7] for details of their implementation. The steganalysis process starts from the feature extraction step, but for experimental purposes, we include the embedding phase before the feature extraction phase, as shown in Fig.…”
Section: Proposed Steganalysis Methods Implementationmentioning
confidence: 99%
“…In addition, we have found information-theoreticentropy and mutual informationfeature sets quite distinctive for pixel-based steganography [7]. Therefore, in this work, we use entropy and a combination of SPAM and SRM features from the image sets, the details of their computations are included, respectively in [7] and [8].…”
Section: The Steganalysis Work-flowmentioning
confidence: 99%
See 1 more Smart Citation