14 May 2018 Topological data analysis as image steganalysis technique
Author Affiliations +
Abstract
Image Steganography is the technique of hiding sensitive data (secrete message) inside cover images in a way that no suspicion occurs to attackers, while steganalysis is the technique of detecting the embedded data by unauthorized persons. As a first step of detecting hidden data, distinguishing between original (Images without secrete message) and Stego (Images contain secrete message) is important. In this paper we design and propose a novel scheme based on the emerging field of Topological Data Analysis (TDA) concept of persistent homological (PH) invariants (e.g. No. of connected components), associated with certain image features. Selected group of Uniform Local Binary Pattern (LBP), which is a texture descriptor, codes representing the image features used to construct a sequence of simplicial complexes (SC) from an increasing sequence of distance thresholds (T). We calculate the corresponding non-increasing sequence of homological invariants which shows the speed at which the constructed sequence of SCs terminates. This approach is sensitive to differentiate original images from stego images. We test this approach on three different embedding techniques which are Traditional Least Significant Bits (TLSB) embedding technique, spatial Universal Wavelet Relative Distortion (S-UNIWARD) and LSB-Witness embedding technique together with a large number of images chosen randomly from large database of images. Preliminary results show that the PH sequence defines a discriminates criterion for steganalysis purpose with over 90% classification accuracy.
Conference Presentation
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Rasber D. Rashid, Rasber D. Rashid, Aras Asaad, Aras Asaad, Sabah Jassim, Sabah Jassim, } "Topological data analysis as image steganalysis technique", Proc. SPIE 10668, Mobile Multimedia/Image Processing, Security, and Applications 2018, 106680J (14 May 2018); doi: 10.1117/12.2309767; https://doi.org/10.1117/12.2309767
PROCEEDINGS
9 PAGES + PRESENTATION

SHARE
RELATED CONTENT


Back to Top