Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

A Novel Digital Image Steganalysis Approach for Investigation

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 47 - Number 12
Year of Publication: 2012
Nanhay Singh
Bhoopesh Singh Bhati
R. S. Raw

Nanhay Singh, Bhoopesh Singh Bhati and R S Raw. Article: A Novel Digital Image Steganalysis Approach for Investigation. International Journal of Computer Applications 47(12):18-21, June 2012. Full text available. BibTeX

	author = {Nanhay Singh and Bhoopesh Singh Bhati and R. S. Raw},
	title = {Article: A Novel Digital Image Steganalysis Approach for Investigation},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {47},
	number = {12},
	pages = {18-21},
	month = {June},
	note = {Full text available}


In the electronic world, one of the most appropriate "hosts" for steganography are digital images. Digital photographs are a commonly shared, sent, and exchanged throughout the Internet in the form of email attachments or web postings. However, current steganographic software available on the market has poor support for high-capacity image steganography. Even worse, some steganographic software actually distorts or degrades the appearance of cover images and therefore exposes the steganographic transformation the image has undergone. In this paper, we propose an algorithm for investigate digital image by steganalysis which is extended version of Modified Kekre Algorithm.


  • H. B. Kekre, Archana Athawale and Pallavi N. Halarnkar 2009, "Polynomial Transformation To Improve Capacity Of Cover Image For Information Hiding In Multiple LSBs", International Journal of Engineering Research and Industrial Applications (IJERIA), Ascent Publications, Volume II, March 2009, Pune.
  • Chen, W. J. , Chang, C. C. and Le, T. H. N. 2010, "High Payload Steganography Mechanism Using Hybrid Edge Detector," Expert Systems with Applications (ESWA 2010), vol. 37, no. pp. 3292-3301, 4th April 2010.
  • H. B. Kekre, A. Athawale and P. N. Halarnkar 2009, "Performance Evaluation of Pixel Value Differencing and Kekre's Modified Algorithm for Information Hiding in Images". ACM International Conference on Advances in Computing, Communication and Control (ICAC3).
  • Hamid, A. M. , M. L. M. Kiah, et al. 2009 "Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis. " International Journal of Engineering and Technology (IJET).
  • L. M. Marvel, G. W. Hartwig, and C. Boncelet 2000, Compression-compatible fragile and semi-fragile tamper detection. In SPIE EI Photonics West, pages 131{139, San Jose, CA.
  • Hussain, M. 2010, "Pixel intensity based high capacity data embedding method" International Conference on Information and Emerging Technologies (ICIET), Pp. 1 - 5.
  • H. B. Kekre, Archana Athawale, Tanuja K. Sarode, Kalpana Sagvekar 2010, "Mixing Codebooks of LBG, KPE and KFCG Algorithms to Increase Capacity of Information Hiding", International Journal of Computer Applications, Number 3 - Article 4.
  • N. M. Nasrabadi and R. King 1988, "Image coding using vector quantization: A review," IEEE Trans. Commun. , vol. 36, no. 8, pp. 957–971, Aug. 1988.