FExtract Result
FExtract Result
constructed feature spaces (image models). Understanding the principles for design of feature
spaces and their intrinsic properties is therefore of a great importance for steganalysts’ success.
competition for a better model – the user tries to embed undetectably within her model while
the attacker tries to identify those relationships among cover coefficients that have been
neglected by the user and incorporates them into a new model. Developments in
steganography and steganalysis are thus strongly interrelated and the modern feature space
Steganalysis is widely known to have one of three attack types. The targeted steganalysis
attack scenario is when the attacker attempts to detect a specific steganographic algorithm
employed between the two users. This is commonly known as targeted attack, as the attack is
targeted to the given stegosystem. A small number of features may be sufficient for a
satisfactory detection performance. Such features, however, would unlikely perform well on a
different steganographic scheme. The blind steganalysis attack scenario is when the attacker
goal is to design a feature set that would be capable of detecting a wide range of
steganographic algorithms. The universal steganalysis attack scenario is another term that often
appears in the literature. However, the universal steganalysis attack scenario goal is to construct
a detector that would be able to detect all possible stegosystems, including those previously
unseen.
· Mean-Squared Error (MSE)
This section will illustrates the effect of background and edges in images. As a concept the
NN detect the pixels variations as embedded hidden message. When detecting the hidden
messages near the edges, the edges may be miss analyzed as ASCII characters that leads to
errors. Figure 515 shows low mean squared error for background images of 0.33 at epoch 0,
which means that it needs lower time and process capability to reach the final results.
Figure 515: Low mean squared error for the high background images.
On the other hand, the high edges images shows high mean squared error of 0.57 at
epoch 3 in Figure 516. High edges images needs higher time and process capability to reach the
final results.
Figure 516: High mean squared error for the high edges images.
Moreover, edges images gives higher errors compared to background images as shown in
Figure 517 and Figure 518. Edges gives a peak of 17 while the background shows a peak of 13
instances.
· Encoding Time
As mentioned in the previous section, the background images requires less time and
processing capability to reach its final results compared to the high details images (i.e. edges).
Figure 519 shows the comparison between the (a) background image extraction time of 3
Figure 519: extracting time comparision between background and edge images
· Errors Types
In order to find the error types, we compare the test text file before embedding as shown
As shown from the previous two figures, the error in test text can be classified in one of
three types. These errors are multiple spaces, new lines and insertion of random characters like
“ ï»? ”. The multiple spaces are due to the wide background around the embedded characters.
The new lines are due to randomization of embedding characters positions within the image.
The random characters insertion are due to miss edge estimation which is incepted as error
within the extracted text file. However, the proposed algorithm is immune to missing of