CFP last date
20 May 2024
Reseach Article

Performance Evaluation of DCT and DWT Features for Blind Image Steganalysis using Neural Networks

by Manisha Saini, Rita Chhikara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 5
Year of Publication: 2015
Authors: Manisha Saini, Rita Chhikara
10.5120/19974-1868

Manisha Saini, Rita Chhikara . Performance Evaluation of DCT and DWT Features for Blind Image Steganalysis using Neural Networks. International Journal of Computer Applications. 114, 5 ( March 2015), 20-23. DOI=10.5120/19974-1868

@article{ 10.5120/19974-1868,
author = { Manisha Saini, Rita Chhikara },
title = { Performance Evaluation of DCT and DWT Features for Blind Image Steganalysis using Neural Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 5 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number5/19974-1868/ },
doi = { 10.5120/19974-1868 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:51:53.921004+05:30
%A Manisha Saini
%A Rita Chhikara
%T Performance Evaluation of DCT and DWT Features for Blind Image Steganalysis using Neural Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 5
%P 20-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we are comparing 72 DWT feature set with 274 DCT feature set on the basis of parameters MSE (Mean square error), Accuracy and time for Blind Image Steganalysis. Dataset is created consisting of cover images and stego images, which are obtained by using two steganography tools steghide and outguess. Extracted features are then fed to Neural network Back propagation classifier, to compare the performance. Experimental results show that DCT feature set has higher performance as compared to DWT feature set.

References
  1. Abbas Cheddad, JoanCondell, Kevin Curran, PaulMcKevitt ,"Digital image steganography: Survey and analysis of current methods", Signal Processing90 (2010)727–752.
  2. Arooj Nissar,A. H. Mir,"Classification of steganalysis techniques: A study", Digital Signal Processing 20 (2010) 1758–1770.
  3. Seyed Mansour Hashemipour, Mohammad Rahmati,"A DCT Statistics-Based Universal Image Steganalysis",2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
  4. http://www. tutorialspoint. com/dip/Image_Transformations. htm
  5. Shaker K. Ali , Zou Beijie, "Analysis and Classification of Remote Sensing by using Wavelet Transform and Neural Network", IEEE 2008 International Conference on Computer Science and Software Engineering.
  6. Archana Deshlahra,G. S. Shirnewar ,Dr. A. K. Sahoo,"A Comparative Study of DCT, DWT & Hybrid (DCT-DWT) Transform".
  7. Niels provos, www. outguess. org.
  8. Deepika Bansal, Rita Chhikara,"Performance Evaluation of Steganography Tools Using SVM and NPR Tool", 2014 Fourth International Conference on Advanced Computing & Communication Technologies.
  9. http://steghide. sourceforge. net/
  10. S. Hetzl, P. Mutzel, A graph-theoretic approach tosteganography, in: Ninth IFIP TC-6 TC-11 International Conference, Lecture Notes in Computer Science, vol. 3677, 2005, pp. 119–12.
  11. Tom´a?s Pevn´y, Jessica Fridrich, "Merging Markov and DCT Features for Multi-Class JPEG Steganalysis", The International Society for Optical Engineering, volume 6505, pp. 28-40, 2007.
  12. Hany Farid, "Detecting Hidden Messages Using Higher-order Statistical Models", Proc. IEEE Symp. Int'l Conf. on Image Processing (ICIP 2000), IEEE Press, Sep. 2002,pp. 905-908,doi:10. 1109/ICIP. 2002 1040098.
  13. S. Lyu, and H. Farid, "Steganalysis Using Higher-order Image Statistics",Trans. Information Forensics and Security,vol. 1,Jan. 2006,pp. 111-119,doi:10. 1. 1. 116. 1418.
  14. Yun Q. Shi, Guorong Xuan, Dekun Zo1, Jianjiong Gao,Chengyun Yang, Zhenping Zhang, Peiqi Chai, Wen Chen, Chunhua Chen, "Image Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-Error Image, and Neural Network",IEEE,2005.
  15. Yuan Liu, Li Huang, Ping Wang, Guodong Wang, "A Blind Image Steganalysis Based on Features from Three Domain"(2008 Chinese Control and Decision Conference (CCDC 2008)).
  16. Neural Network Pattern Recognition Tool
  17. Paul W. Mielke Jr, Kenneth J. Berry ,Christopher W. Landsea and William M. Gray , "Artificial Skill and Validation in Meteorological Forecasting ", American Meteorological Society (AMS).
  18. Syed Ali Khayam,"The Discrete Cosine Transform (DCT): Theory and Application". Department of
  19. Dai Zhonghua , Xiong Qi , Peng Yong and Gao Haihui,"Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Networ-kTechnology", IEEE, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

DCT DWT Neural network Outguess Steganography Steganalysis StegHide.