Title :
Selecting a reliable steganography method
Author :
Sajedi, Hedieh ; Jamzad, Mansour
Author_Institution :
Dept. of Comput. Eng., Sharif Univ. of Technol., Tehran, Iran
Abstract :
Due to the various contents of images, the stego images produced by a steganography method may have different levels of undetectability against steganalyzers. In other words, a steganography method may cause less detectable statistical artifacts on some images compared to other images. In this paper, we analyze different features of images to find the similarity between proper cover images for each steganography method. Similarity between images is modeled in form of fuzzy if-then rules using an evolutionary algorithm. Subsequently for hiding secret data in a cover image, we suggest a reliable steganography method that results in an undetectable stego image against most recently reported steganalysis methods. Experimental results show the efficiency of the proposed method in improving the security of stego images.
Keywords :
evolutionary computation; feature extraction; fuzzy set theory; image processing; security of data; steganography; data hiding; evolutionary algorithm; fuzzy if-then rules; statistical artifacts; steganalysis method; steganograph; stego images; Algorithm design and analysis; Data security; Discrete cosine transforms; Evolutionary computation; Feature extraction; Fuzzy sets; Image analysis; Quantization; Reliability engineering; Steganography;
Conference_Titel :
Multimedia Computing and Information Technology (MCIT), 2010 International Conference on
Conference_Location :
Sharjah
Print_ISBN :
978-1-4244-7001-3
DOI :
10.1109/MCIT.2010.5444848