Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31515
An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama


This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: Optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, Steganalysis Heuristic approach.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 906


[1] H. Gharsellaoui, M. Khalgui, S. Ben Ahmed. Preemptive Hard Real-time Scheduling of Reconfigurable OS Tasks on Multiprocessors Embedded Control Systems. PECCS - Proceedings of the 4th International Conference on Pervasive and Embedded Computing and Communication Systems, 192–197, Lisbon, Portugal, 7-9 January, 2014.
[2] H. Kekre, A. Athawale, T. Sarode, S. Thepade and K. Sagvekar. Steganography Using Dictionary Sort on Vector Quantized Codebook. International Journal of Computer Science and Security (IJCSS), vol. 4, no. 4, pp. 392–402, 2010.
[3] V. Michopoulos, L. Guan, G. Oikonomou, I. Phillips. DCCC6: Duty Cycle-aware congestion control for 6LoWPAN networks. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 278–283, 2012.
[4] D. Stinson. Cryptography: Theory and Practice. 2nd Edition, Chapman and Hall, CRC, 2002.
[5] N. Johnson and S. Jajodia. Steganalysis of Images Created using Current Steganography Software. Lecture Notes in Computer Science, vol. 1525, pp. 32–47, Springer Verlag, 1998.
[6] J. Fridrich, M. Goljan, D. Hogea and D. Soukal. Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length. ACM Multimedia Systems Journal, Special issue on Multimedia Security, vol. 9, no. 3, pp. 288–302, 2003.
[7] A. Westfeld and A. Pfitzmann. Attacks on Steganographic Systems. Proceedings of the 3rd International Workshop on Information Hiding, pp. 61–76, 1999.
[8] S. Dumitrescu, X. Wu and N. Memon. On Steganalysis of Random LSB Embedding in Continuous tone Images. Proceedings of the International Conference on Image Processing, vol. 3, pp. 641– 644, June 2002.
[9] J. Fridrich and M. Long. Steganalysis of LSB Encoding in Color Images. Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), vol. 3, pp. 1279–1282, New York, NY, USA, July August 2000.
[10] A. Westfeld. F5 A Steganographic Algorithm. Lecture Notes in Computer Science, vol. 2137, pp. 289–302, January 2001.
[11] I. Avcibas, N. Memon and B. Sankur. Steganalysis using Image Quality Metrics. IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221–229, February 2003.
[12] I. Avcibas, N. Memon and B. Sankur. Image Steganalysis with Binary Similarity Measures. Proceedings of the IEEE International Conference on Image Processing, vol. 3, pp. 645–648, June 2002.
[13] N. Champakamala, K. Padmini, D.K. Radhika. Least Significant Bit algorithm for image steganography. International Journal of Advance Computer Technology, vol(3), N. 4, pages 34–38, 2013.
[14] N. Meghanathan and L. Nayak. Steganalysis Algorithms For Detecting The Hidden Information In Image, Audio And Video Cover Media. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, pp. 43–55, 2010.