Key Technical Analysis on Steganography and Steganalysis
- DOI
- 10.2991/icmt-13.2013.68How to use a DOI?
- Keywords
- F5 stegaographic algorithm • steganographic system • matrix encoding • the BP neural network classifier
- Abstract
In this paper, we present F5 steganographic algorithm and its steganographic system, then we embed 35.5kb information (a txt document) into a 99.7kb JPEG image by using F5 steganographic system. The experimental result shows that when we choose k=3 which is based on utilization rate of the data(R), then the AC coefficients will be changed seldom while the information embedded in the image. The three domains method to steganalysis the stego-images is also analyzed in this paper. Extracting the three domains characteristics on the JPEG images to train the BP neural network classifier, we can set a threshold value to the BP neural network classifier to classify the JPEG images. The experimental results show the method using three domains offers a high accuracy to detect the image whether includes information or not.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Ge Huayong AU - Liu Hongqiang AU - Jin Zhaoyang PY - 2013/11 DA - 2013/11 TI - Key Technical Analysis on Steganography and Steganalysis BT - Proceedings of 3rd International Conference on Multimedia Technology(ICMT-13) PB - Atlantis Press SP - 549 EP - 554 SN - 1951-6851 UR - https://doi.org/10.2991/icmt-13.2013.68 DO - 10.2991/icmt-13.2013.68 ID - Huayong2013/11 ER -