SlideShare a Scribd company logo
2
Most read
3
Most read
Steganalysis
By Om Shivam
Btech CSE+LLB(Hons) Cyber LAW
4th year
University of petroleum and energy studies
Image Steganalysis
Algorithm are two types:-
(1) Specific
For the specific type of stegnographic algorithm.
(2) Generic
This is the valid for all type of stegnographic algorithm.
Specific Image Steganalysis Algorithm
Image steganography algorithms are more often based on embedding
mechanism called least significant bit (LSB) embedding
Each pixel is represented as 24-Bitmap value composed of 3 byte
representing the R,G and B values for the three primary colors red, green
and blue respectively.
Higher RGB values for pixel implies lager intensity for instance , a pixel p
represented as FF FF FF16 as it is composed of all these primary color so this
is white.
In we make use of LSB as there is minor change in pixels which is not
perceptible of human eye like FE FE FE16 would make color darker by the
1/256 factor.
Several Formats
(1) GIF (Graphic interface formats)
(2) BMP( Bitmap)
(3) JPEG(Joint photographic Exchange Group)
Each formate behaves differently when a message is embedded in it.
Palette Image Steganalysis
It is for the primary used for the GIF images
Gif property
It support 8 bit pixel of the color of the pixel referenced from the palette
table of up to 256 distinct colors mapped to the 24 bit RGB color space.
What are changes happens in Steganography?
• Message embedding brings great change in the palette color of the pixels.
How Steganalysis applies to GIF?
The Steganalysis of a gif stego image is conducted by performing a statistical
analysis of the palette table vis-à-vis the image and the detection is made when
when there is an appreciable change in entropy ( a measure of the variation in the
in the palette colors) the change in entropy is maximal when the embedded
message is of maximum length.
Raw image Steganalysis
It is basically used for BMP images that are characterized by a loseless LSB
planes.
Here LSB embedding on image causes flipping of the grey scale values.
The embedding of the hidden message is going to result in the average of
frequency occurrence of the pixel with two Grey scale values.
For ex:- One image has 20 pixel with one grey scale values and other 40
pixel with the other grey scale value. The pixel around to be 30 pixel.
Steganalysis of BMP
Dumitrescu proposed the algorithm, algorithm assumes that an image to be
made up of horizontally adjacent pixels and classifies the set of all such pixel
pairs(a,b) into four subsets depending on whether a and b are odd and even.
whether a<b, a>b , or a=b
What happens when the BMP image is embedded?
The pixel values get modified when the message embedding is done in the
LSB planes leading to the membership modification across the four subsets.
The statistical analyses on the change in the membership of the pixels in the
stego image leads to the detection of the length of the hidden message.
For JPEG formats
Two well known steganography algorithm for hidden secret messages in
jpeg images are
1. F5 algorithm
2. Outguess algorithm
F5 Algorithm
It uses matrix embedding to embed bits in the DCT( Discrete Cosine Transform)
coefficients in order to minimize the number of changes to a message.
F5 mutates the histogram of DCT coefficients.
Frendrich proposes a technique for unaltered histogram to find the number of
changes and length of secret message.
The process involves cropping the images into four column and then applying
quantization table to recompress the image. The resulting DCT will image close ot
the original one.
Frendrich also proposed for the outguess algorithm
What outguess algorithm do
It is basically in random walk embed the message bits in the LSB of some of the
DCT coefficients
The other DCT Coefficients are then adjusted to keep the original histogram intact.
Here the nature of the discontinues in the DCT coefficients is widely
employed to gauge the size of hidden message.
Generic image Steganalysis Algorithm
Here we focus on the features that are monotonic and changes statistically
as a result of message embedding.
Avivas use a set of image quality metrics(IQM) to develop a discriminator
algorithm that differentiates cover image from stego images.
Here it is rather for analysing the image quality and performance of the
algorithm it is used for the Steganalysis.
The ANOVA( Analysis of the variance is used to test to rank the IQM based
on their F scores and identify the embedding message.
The main motive of employing this method is to detect the distortion at
different level of sensitivity
For example
The means square values for the human visual system (HVS) weighted errors
demonstrate more sensitivity to pure blur
While the gradient measure responds to change in the texture and image
periphery.
Avicas proposes another approach that analyses the seventh and eight bit of
the planes of an image measure their binary similarity
Audio steganography algorithm
1. Low bit encoding
2. Phase coding
3. Spread spectrum coding
4. Echo data hiding
Low bit encoding
Here the secret message is embedded on the least significant bits of each
sample.
Phase coding
It is based on the facts that the phase component of sounds are not as
perceptible to the human ears as noise is
This lead to the inaudible encoding in terms of signal to perceived noise
ratio and the secret message is send in the audio signal.
Spread Spectrum coding
Ss randomly spread the bits of secret data message across the frequency
spectrum of the audio signal.
Echo hiding
Echo into the discrete audio signal
Here for successful hiding three parameters of the echo need to be altered
Amplitude, decay rate and delay time(off set) from the original signal
Audio Steganalysis algorithm
Zeng proposed algorithm to detect the phase coding steganography based
on the analysis of phase discontinues and to detect echo stegnogarph based
on the statistical moments of peak frequency
A statistical analysis of the phase difference in each audio segment can be
used to monitor the change
Video Steganalysis
This technique applies to frame to frame budia created framework based on
Steganalysis of Gaussian spread spectrum
These are two essential blocks
(1) Water marking attack stage to eliminate the cover media from possibly
watermarked stego media.
(2) A pattern recognition stage for the detection of stegnographic activity.

More Related Content

PDF
Steganography and steganalysis
PPTX
Steganography
PPTX
steganography
PPT
Steganography
PPTX
Steganography
PPTX
SEMINAR ON staganography
PPTX
Steganography
Steganography and steganalysis
Steganography
steganography
Steganography
Steganography
SEMINAR ON staganography
Steganography

What's hot (20)

PPT
Steganography.
PPTX
PPT steganography
PPTX
CMACs and MACS based on block ciphers, Digital signature
PPTX
Steganography
PPTX
VIDEO STEGANOGRAPHY
PDF
Presentation On Steganography
PDF
Steganography
PPTX
Steganography and its techniques
PPTX
Image steganography
PPTX
Image Steganography using LSB
PPT
Steganography
PPTX
Image steganography and cryptography
PPTX
Steganography
PPT
Steganography - The art of hiding data
PPT
Steganography
PPTX
Steganography presentation
PPT
Digital watermarking
PPTX
Digital watermarking
PPT
block ciphers
PPT
Network security cryptographic hash function
Steganography.
PPT steganography
CMACs and MACS based on block ciphers, Digital signature
Steganography
VIDEO STEGANOGRAPHY
Presentation On Steganography
Steganography
Steganography and its techniques
Image steganography
Image Steganography using LSB
Steganography
Image steganography and cryptography
Steganography
Steganography - The art of hiding data
Steganography
Steganography presentation
Digital watermarking
Digital watermarking
block ciphers
Network security cryptographic hash function
Ad

Similar to Steganalysis ppt (20)

PDF
Steganalysis Using Colour Model Conversion
PDF
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
PDF
K03502056061
PPTX
Stegnaogarphy and stegnalysis
PPTX
Steganography and Steganalysis
PPT
SteganalysisPres
PDF
A Survey of Image Steganography
PPT
SasuriE ajal
PDF
K0815660
PDF
Reference-free differential histogram-correlative detection of steganography:...
PDF
37 c 551 - reduced changes in the carrier of steganography algorithm
PDF
Minimum image disortion of reversible data hiding
PDF
N043020970100
PDF
Analysis of image steganalysis techniques to defend against statistical attac...
PDF
Analysis of image steganalysis techniques to defend against statistical attac...
PDF
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
PDF
Customized and Secure Image Steganography Through Random Numbers Logic.
PDF
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
PDF
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
PDF
Detecting Original Image Using Histogram, DFT and SVM
Steganalysis Using Colour Model Conversion
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
K03502056061
Stegnaogarphy and stegnalysis
Steganography and Steganalysis
SteganalysisPres
A Survey of Image Steganography
SasuriE ajal
K0815660
Reference-free differential histogram-correlative detection of steganography:...
37 c 551 - reduced changes in the carrier of steganography algorithm
Minimum image disortion of reversible data hiding
N043020970100
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
Customized and Secure Image Steganography Through Random Numbers Logic.
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
Detecting Original Image Using Histogram, DFT and SVM
Ad

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
KodekX | Application Modernization Development
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Programs and apps: productivity, graphics, security and other tools
KodekX | Application Modernization Development
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
Mobile App Security Testing_ A Comprehensive Guide.pdf

Steganalysis ppt

  • 1. Steganalysis By Om Shivam Btech CSE+LLB(Hons) Cyber LAW 4th year University of petroleum and energy studies
  • 2. Image Steganalysis Algorithm are two types:- (1) Specific For the specific type of stegnographic algorithm. (2) Generic This is the valid for all type of stegnographic algorithm.
  • 3. Specific Image Steganalysis Algorithm Image steganography algorithms are more often based on embedding mechanism called least significant bit (LSB) embedding Each pixel is represented as 24-Bitmap value composed of 3 byte representing the R,G and B values for the three primary colors red, green and blue respectively. Higher RGB values for pixel implies lager intensity for instance , a pixel p represented as FF FF FF16 as it is composed of all these primary color so this is white. In we make use of LSB as there is minor change in pixels which is not perceptible of human eye like FE FE FE16 would make color darker by the 1/256 factor.
  • 4. Several Formats (1) GIF (Graphic interface formats) (2) BMP( Bitmap) (3) JPEG(Joint photographic Exchange Group) Each formate behaves differently when a message is embedded in it.
  • 5. Palette Image Steganalysis It is for the primary used for the GIF images Gif property It support 8 bit pixel of the color of the pixel referenced from the palette table of up to 256 distinct colors mapped to the 24 bit RGB color space. What are changes happens in Steganography? • Message embedding brings great change in the palette color of the pixels.
  • 6. How Steganalysis applies to GIF? The Steganalysis of a gif stego image is conducted by performing a statistical analysis of the palette table vis-à-vis the image and the detection is made when when there is an appreciable change in entropy ( a measure of the variation in the in the palette colors) the change in entropy is maximal when the embedded message is of maximum length.
  • 7. Raw image Steganalysis It is basically used for BMP images that are characterized by a loseless LSB planes. Here LSB embedding on image causes flipping of the grey scale values. The embedding of the hidden message is going to result in the average of frequency occurrence of the pixel with two Grey scale values. For ex:- One image has 20 pixel with one grey scale values and other 40 pixel with the other grey scale value. The pixel around to be 30 pixel.
  • 8. Steganalysis of BMP Dumitrescu proposed the algorithm, algorithm assumes that an image to be made up of horizontally adjacent pixels and classifies the set of all such pixel pairs(a,b) into four subsets depending on whether a and b are odd and even. whether a<b, a>b , or a=b What happens when the BMP image is embedded? The pixel values get modified when the message embedding is done in the LSB planes leading to the membership modification across the four subsets. The statistical analyses on the change in the membership of the pixels in the stego image leads to the detection of the length of the hidden message.
  • 9. For JPEG formats Two well known steganography algorithm for hidden secret messages in jpeg images are 1. F5 algorithm 2. Outguess algorithm
  • 10. F5 Algorithm It uses matrix embedding to embed bits in the DCT( Discrete Cosine Transform) coefficients in order to minimize the number of changes to a message. F5 mutates the histogram of DCT coefficients. Frendrich proposes a technique for unaltered histogram to find the number of changes and length of secret message. The process involves cropping the images into four column and then applying quantization table to recompress the image. The resulting DCT will image close ot the original one. Frendrich also proposed for the outguess algorithm What outguess algorithm do It is basically in random walk embed the message bits in the LSB of some of the DCT coefficients The other DCT Coefficients are then adjusted to keep the original histogram intact.
  • 11. Here the nature of the discontinues in the DCT coefficients is widely employed to gauge the size of hidden message.
  • 12. Generic image Steganalysis Algorithm Here we focus on the features that are monotonic and changes statistically as a result of message embedding. Avivas use a set of image quality metrics(IQM) to develop a discriminator algorithm that differentiates cover image from stego images. Here it is rather for analysing the image quality and performance of the algorithm it is used for the Steganalysis. The ANOVA( Analysis of the variance is used to test to rank the IQM based on their F scores and identify the embedding message. The main motive of employing this method is to detect the distortion at different level of sensitivity
  • 13. For example The means square values for the human visual system (HVS) weighted errors demonstrate more sensitivity to pure blur While the gradient measure responds to change in the texture and image periphery. Avicas proposes another approach that analyses the seventh and eight bit of the planes of an image measure their binary similarity
  • 14. Audio steganography algorithm 1. Low bit encoding 2. Phase coding 3. Spread spectrum coding 4. Echo data hiding
  • 15. Low bit encoding Here the secret message is embedded on the least significant bits of each sample. Phase coding It is based on the facts that the phase component of sounds are not as perceptible to the human ears as noise is This lead to the inaudible encoding in terms of signal to perceived noise ratio and the secret message is send in the audio signal.
  • 16. Spread Spectrum coding Ss randomly spread the bits of secret data message across the frequency spectrum of the audio signal. Echo hiding Echo into the discrete audio signal Here for successful hiding three parameters of the echo need to be altered Amplitude, decay rate and delay time(off set) from the original signal
  • 17. Audio Steganalysis algorithm Zeng proposed algorithm to detect the phase coding steganography based on the analysis of phase discontinues and to detect echo stegnogarph based on the statistical moments of peak frequency A statistical analysis of the phase difference in each audio segment can be used to monitor the change
  • 18. Video Steganalysis This technique applies to frame to frame budia created framework based on Steganalysis of Gaussian spread spectrum These are two essential blocks (1) Water marking attack stage to eliminate the cover media from possibly watermarked stego media. (2) A pattern recognition stage for the detection of stegnographic activity.