Abstract
In this paper, we propose the steganalysis based on sequence synchronization analysis against chaos based spread spectrum image steganography (CSSIS). This method uses the correlation between the estimated chaotic sequences in two stegoimages to buildup synchronization measure, which can effectively detect the presence of CSSIS. Based on the analysis, a more secure method is presented, which is constructed on key transmission channel (KTC). This improved method uses the stochastic modulation to realize the steganography. It avoids the sequences synchronization fault in CSSIS by randomly choosing the parameters of chaotic map, which is proved by the experimental results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. IBM System Journal 35(3/4), 131–336 (1996)
Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8(8), 1075–1083 (1999)
Satish, K., Jayakar, T., Tobin, C., Madhavi, K., Murali, K.: Chaos Based Spread Spectrum Image Steganography. IEEE Transactions on Consumer Electronics 50(2), 578–590 (2004)
Chen, B., Wornell, G.W.: Quantization index modulation: A Class.of provably Good Methods for Digital Watermarking and information Embedding. IEEE Transaction on Information Theory 47(4), 1423–1443 (2001)
Hartung, F., Girod, B.: Watermarking of Uncompressed and Compressed Video. Signal Processing (Special issue on Watermarking) 66(3), 283–301 (1998)
Fridrich, J., Goljan, M.: Digital Image Steganography Using Stochastic Modulation. In: Proc. EI SPIE, Santa Clara, January 2003, pp. 191–202 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, G., Wang, J., Dai, Y., Wang, Z. (2005). On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3612. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539902_123
Download citation
DOI: https://doi.org/10.1007/11539902_123
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28320-1
Online ISBN: 978-3-540-31863-7
eBook Packages: Computer ScienceComputer Science (R0)