Cargando…

Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors

In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, th...

Descripción completa

Detalles Bibliográficos
Autores principales: Battikh, Dalia, El Assad, Safwan, Hoang, Thang Manh, Bakhache, Bassem, Deforges, Olivier, Khalil, Mohamad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515277/
https://www.ncbi.nlm.nih.gov/pubmed/33267462
http://dx.doi.org/10.3390/e21080748
_version_ 1783586780173303808
author Battikh, Dalia
El Assad, Safwan
Hoang, Thang Manh
Bakhache, Bassem
Deforges, Olivier
Khalil, Mohamad
author_facet Battikh, Dalia
El Assad, Safwan
Hoang, Thang Manh
Bakhache, Bassem
Deforges, Olivier
Khalil, Mohamad
author_sort Battikh, Dalia
collection PubMed
description In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size.
format Online
Article
Text
id pubmed-7515277
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75152772020-11-09 Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors Battikh, Dalia El Assad, Safwan Hoang, Thang Manh Bakhache, Bassem Deforges, Olivier Khalil, Mohamad Entropy (Basel) Article In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size. MDPI 2019-07-30 /pmc/articles/PMC7515277/ /pubmed/33267462 http://dx.doi.org/10.3390/e21080748 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Battikh, Dalia
El Assad, Safwan
Hoang, Thang Manh
Bakhache, Bassem
Deforges, Olivier
Khalil, Mohamad
Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
title Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
title_full Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
title_fullStr Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
title_full_unstemmed Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
title_short Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
title_sort comparative study of three steganographic methods using a chaotic system and their universal steganalysis based on three feature vectors
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515277/
https://www.ncbi.nlm.nih.gov/pubmed/33267462
http://dx.doi.org/10.3390/e21080748
work_keys_str_mv AT battikhdalia comparativestudyofthreesteganographicmethodsusingachaoticsystemandtheiruniversalsteganalysisbasedonthreefeaturevectors
AT elassadsafwan comparativestudyofthreesteganographicmethodsusingachaoticsystemandtheiruniversalsteganalysisbasedonthreefeaturevectors
AT hoangthangmanh comparativestudyofthreesteganographicmethodsusingachaoticsystemandtheiruniversalsteganalysisbasedonthreefeaturevectors
AT bakhachebassem comparativestudyofthreesteganographicmethodsusingachaoticsystemandtheiruniversalsteganalysisbasedonthreefeaturevectors
AT deforgesolivier comparativestudyofthreesteganographicmethodsusingachaoticsystemandtheiruniversalsteganalysisbasedonthreefeaturevectors
AT khalilmohamad comparativestudyofthreesteganographicmethodsusingachaoticsystemandtheiruniversalsteganalysisbasedonthreefeaturevectors