DocumentCode :
2043078
Title :
Steganalysis: Using the blind deconvolution to retrieve the hidden data
Author :
Jidesh, P. ; George, Santhosh
Author_Institution :
Dept. of Math. & Comput. Sci., Nat. Inst. of Technol., Karnataka, Mangalore, India
Volume :
5
fYear :
2011
fDate :
8-10 April 2011
Firstpage :
68
Lastpage :
71
Abstract :
Steganography has gained a substantial attention due to its application in wide areas. Steganography as it literally mean is hiding the information (stego data) inside the data (communication data) so that the receiver can only extract the desired information from the data. Steganalysis is the reverse process of steganography in which the information about the original data is hardly available, from the received data the extractor needs to identify the original data. Since this belong to a class of inverse problems it is hard to find the approximate match of the original data from the received one. In most of the cases this will fall under the category of ill-posed problems. The stego-data that has been embedded into the communication data can be considered as linear bounded operator operating on the input data and the reverse process (the Steganalysis) can be thought like a deconvolution problem by which we can extract the original data. Here we are assuming the watermarking as a linear operation with a bounded linear operator K : X→Y where X and Y are spaces of Bounded Variation (BV). The forward problem (the Steganography) is a direct convolution and the reverse (backward) problem (steganalysis) is a de-convolution procedure. In this work we are embedding a Gaussian random variable array with zero mean and with a specific variance into the data and we show how the original data can be extracted using the regularization method. The results are shown to substantiate the ability of the method to perform steganalysis.
Keywords :
Gaussian processes; deconvolution; image watermarking; steganography; Gaussian random variable array; blind deconvolution; bounded variation; communication data; hidden data retrieval; regularization method; steganalysis; steganography; stego data; watermarking; Convolution; Data mining; Deconvolution; Image reconstruction; Kernel; Watermarking; Image Processing; Inverse Problems; Regularization; Steganalysis; Steganography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics Computer Technology (ICECT), 2011 3rd International Conference on
Conference_Location :
Kanyakumari
Print_ISBN :
978-1-4244-8678-6
Electronic_ISBN :
978-1-4244-8679-3
Type :
conf
DOI :
10.1109/ICECTECH.2011.5941958
Filename :
5941958
Link To Document :
بازگشت