Kaustubh Choudhary - Academia.edu (original) (raw)

Papers by Kaustubh Choudhary

Research paper thumbnail of Implementation, Detection and Prevention of Stegomalware

Research paper thumbnail of Introduction on Bias Correction Methods

Research paper thumbnail of Identification of Steganographic Signatures in Stego Images Generated By Distributing Stego Algorithms Using Suspicion Value

IOSR Journal of Computer Engineering, 2012

Research paper thumbnail of Novel Approach to Image Steganalysis (A Step against Cyber Terrorism)

IOSR Journal of Computer Engineering, 2012

Research paper thumbnail of Properties of Images in LSB Plane

IOSR Journal of Computer Engineering, 2012

Research paper thumbnail of Mathematical Modeling of Image Steganographic System

IOSR Journal of Computer Engineering, 2012

Image based steganography is a dangerous technique of hiding secret messages in the image in such... more Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based on invisible communication and this technique strives to hide the very presence of the message itself from the observer. As a result it becomes the most preferred tool to be used by Intelligence Agencies, Terrorist Networks and criminal organizations for securely broadcasting, dead-dropping and communicating information over the internet by hiding secret information in the images. In this paper a mathematical model is designed for representing any such image based steganographic system. This mathematical model of any stego system can be used for determining vulnerabilities in the stego system as well as for steganalysing the stego images using same vulnerabilities. Based on these mathematical foundations three steganographic systems are evaluated for their strengths and vulnerabilities using MATLAB ©Image Processing Tool Box.

Research paper thumbnail of Properties of Images in LSB Plane

Research paper thumbnail of Novel Approach to Image Steganalysis (A Step against Cyber Terrorism)

Research paper thumbnail of Image Steganography and Global Terrorism

This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan... more This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims to generate interest among the scientific community about Image steganography so that experts from multiple disciplines may join hands for devising better steganalysis techniques against the global terrorism. In this paper a basic digital image is analyzed and based on this analysis an LSB based steganographic algorithm is designed. Using this algorithm a software is developed and its performance is compared with various other steganographic tools available on the internet. The result of this comparison explains us why steganography is so much preferred by terrorists. Various images and image related tables used in this paper are generated using MATLAB © Simulation Environment.

Research paper thumbnail of Mathematical Approach to Image Steganography and Steganalysis

Image based Steganography is the most preferred tool used by Terrorists and criminal organization... more Image based Steganography is the most preferred tool used by Terrorists and criminal organizations for securely broadcasting, deaddropping and communicating information over the internet by hiding secret information in the images. Steganalysis is the technique of identifying such images which are although innocent in appearance but are still carrying any secret information. In this paper a mathematical model is designed for representing any such image based steganographic system. This mathematical model of any stego system can be used for determining vulnerabilities in the stego system as well as for steganalysing the stego images using same vulnerabilities. Based on these mathematical foundations three steganographic systems are evaluated for their strengths and vulnerabilities using MATLAB ©Image Processing Tool Box.

Research paper thumbnail of Fast, Efficient and Reliable Approach to Spatial Domain Image Steganalysis

Image Steganography is a technique frequently used by Terrorists and Criminal organizations for s... more Image Steganography is a technique frequently used by Terrorists and Criminal organizations for securely broadcasting, dead-dropping and communicating information over the internet by hiding the secret information in the Images. Steganalysis of Image is quite difficult due to lack of Efficient Algorithms, High rates of False Alarms and above all the High Computation Costs of Analyzing Images. In this paper a Fast, Efficient and Foolproof technique is devised for steganlysing any image which hides information using Spatial Domain Transformation Steganography. The results shown in the paper are obtained using programs written in MATLAB © Image Processing Tool Box.

Research paper thumbnail of Properties of Images in LSB Plane (A Steganalystic Perspective)

Kaustubh Choudhary AbstractEach pixel of an Image (assuming 24 bit BMP) is stored in the three 8 ... more Kaustubh Choudhary AbstractEach pixel of an Image (assuming 24 bit BMP) is stored in the three 8 bits corresponding to three colors. Bit Plane Slicing is the technique of breaking image into 8 planes corresponding to 8 different bit positions. The bit plane image corresponding to the plane of the most significant bit (MSB) has the maximum contribution to the total image and forms the majority of the visually significant image data and planes corresponding to other lower bit positions contribute only the subtle details of the image. And the bit-plane image corresponding to the LSB of the RGB value has the minimum contribution of only 1 out of total of 255 Intensity level to the total image. In spite of this the LSB Plane of the image is not insignificant. In fact it is used in Image Steganography for hiding secret information in the images. Image based Steganography is a potent tool used by Terrorists and Criminal organizations for securely broadcasting, dead-dropping and communicati...

Research paper thumbnail of Quick Identification of Stego Signatures in Images Using Suspicion Value (Special Reference to Concentrating Stego Algorithms)

IOSR Journal of Computer Engineering, 2012

Steganography is a technique of hiding secret messages in the image in such a way that no one apa... more Steganography is a technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. Image Steganography is frequently used by Terrorists and criminal organizations for securely broadcasting, dead-dropping and communicating the secret information over the internet by hiding it in the Images. As a result it becomes the most preferred tool for achieving secure CIA (Confidentiality, Integrity and Availability) compliant communication network capable of penetrating deep inside the civilian population. Steganalysis of Image (Identification of Images containing Hidden Information) is a challenging task due to lack of Efficient Algorithms, High rates of False Alarms and most importantly due to the High Computation Costs involved in Analyzing the Images. In this paper a computationally fast mathematical algorithm is designed for analyzing any stego-image generated using Spatial Domain Steganographic Algorithms and assigning it a Suspicion Value. This Suspicion Value is a number associated with the image and is bigger for those images which contain information and smaller for innocent images. Based on this Suspicion Value it can be decided whether the given image must be interrogated thoroughly (thorough interrogation of an image requires large amount of computation time but reliably and conclusively identifies the hidden information using various steganalytic techniques) or not. This fast stego-identifier algorithm can be used for quick filtering of the suspicious images flowing through the web servers, routers, layer three switches and any other electronic media. Based on this algorithm the suspicion values of various cover and stego-images generated by three different steganographic algorithms are computed and evaluated. All the graphs and tables are generated using MATLAB ©Image Processing Tool Box.

Research paper thumbnail of Implementation, Detection and Prevention of Stegomalware

Research paper thumbnail of Introduction on Bias Correction Methods

Research paper thumbnail of Identification of Steganographic Signatures in Stego Images Generated By Distributing Stego Algorithms Using Suspicion Value

IOSR Journal of Computer Engineering, 2012

Research paper thumbnail of Novel Approach to Image Steganalysis (A Step against Cyber Terrorism)

IOSR Journal of Computer Engineering, 2012

Research paper thumbnail of Properties of Images in LSB Plane

IOSR Journal of Computer Engineering, 2012

Research paper thumbnail of Mathematical Modeling of Image Steganographic System

IOSR Journal of Computer Engineering, 2012

Image based steganography is a dangerous technique of hiding secret messages in the image in such... more Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based on invisible communication and this technique strives to hide the very presence of the message itself from the observer. As a result it becomes the most preferred tool to be used by Intelligence Agencies, Terrorist Networks and criminal organizations for securely broadcasting, dead-dropping and communicating information over the internet by hiding secret information in the images. In this paper a mathematical model is designed for representing any such image based steganographic system. This mathematical model of any stego system can be used for determining vulnerabilities in the stego system as well as for steganalysing the stego images using same vulnerabilities. Based on these mathematical foundations three steganographic systems are evaluated for their strengths and vulnerabilities using MATLAB ©Image Processing Tool Box.

Research paper thumbnail of Properties of Images in LSB Plane

Research paper thumbnail of Novel Approach to Image Steganalysis (A Step against Cyber Terrorism)

Research paper thumbnail of Image Steganography and Global Terrorism

This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan... more This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims to generate interest among the scientific community about Image steganography so that experts from multiple disciplines may join hands for devising better steganalysis techniques against the global terrorism. In this paper a basic digital image is analyzed and based on this analysis an LSB based steganographic algorithm is designed. Using this algorithm a software is developed and its performance is compared with various other steganographic tools available on the internet. The result of this comparison explains us why steganography is so much preferred by terrorists. Various images and image related tables used in this paper are generated using MATLAB © Simulation Environment.

Research paper thumbnail of Mathematical Approach to Image Steganography and Steganalysis

Image based Steganography is the most preferred tool used by Terrorists and criminal organization... more Image based Steganography is the most preferred tool used by Terrorists and criminal organizations for securely broadcasting, deaddropping and communicating information over the internet by hiding secret information in the images. Steganalysis is the technique of identifying such images which are although innocent in appearance but are still carrying any secret information. In this paper a mathematical model is designed for representing any such image based steganographic system. This mathematical model of any stego system can be used for determining vulnerabilities in the stego system as well as for steganalysing the stego images using same vulnerabilities. Based on these mathematical foundations three steganographic systems are evaluated for their strengths and vulnerabilities using MATLAB ©Image Processing Tool Box.

Research paper thumbnail of Fast, Efficient and Reliable Approach to Spatial Domain Image Steganalysis

Image Steganography is a technique frequently used by Terrorists and Criminal organizations for s... more Image Steganography is a technique frequently used by Terrorists and Criminal organizations for securely broadcasting, dead-dropping and communicating information over the internet by hiding the secret information in the Images. Steganalysis of Image is quite difficult due to lack of Efficient Algorithms, High rates of False Alarms and above all the High Computation Costs of Analyzing Images. In this paper a Fast, Efficient and Foolproof technique is devised for steganlysing any image which hides information using Spatial Domain Transformation Steganography. The results shown in the paper are obtained using programs written in MATLAB © Image Processing Tool Box.

Research paper thumbnail of Properties of Images in LSB Plane (A Steganalystic Perspective)

Kaustubh Choudhary AbstractEach pixel of an Image (assuming 24 bit BMP) is stored in the three 8 ... more Kaustubh Choudhary AbstractEach pixel of an Image (assuming 24 bit BMP) is stored in the three 8 bits corresponding to three colors. Bit Plane Slicing is the technique of breaking image into 8 planes corresponding to 8 different bit positions. The bit plane image corresponding to the plane of the most significant bit (MSB) has the maximum contribution to the total image and forms the majority of the visually significant image data and planes corresponding to other lower bit positions contribute only the subtle details of the image. And the bit-plane image corresponding to the LSB of the RGB value has the minimum contribution of only 1 out of total of 255 Intensity level to the total image. In spite of this the LSB Plane of the image is not insignificant. In fact it is used in Image Steganography for hiding secret information in the images. Image based Steganography is a potent tool used by Terrorists and Criminal organizations for securely broadcasting, dead-dropping and communicati...

Research paper thumbnail of Quick Identification of Stego Signatures in Images Using Suspicion Value (Special Reference to Concentrating Stego Algorithms)

IOSR Journal of Computer Engineering, 2012

Steganography is a technique of hiding secret messages in the image in such a way that no one apa... more Steganography is a technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. Image Steganography is frequently used by Terrorists and criminal organizations for securely broadcasting, dead-dropping and communicating the secret information over the internet by hiding it in the Images. As a result it becomes the most preferred tool for achieving secure CIA (Confidentiality, Integrity and Availability) compliant communication network capable of penetrating deep inside the civilian population. Steganalysis of Image (Identification of Images containing Hidden Information) is a challenging task due to lack of Efficient Algorithms, High rates of False Alarms and most importantly due to the High Computation Costs involved in Analyzing the Images. In this paper a computationally fast mathematical algorithm is designed for analyzing any stego-image generated using Spatial Domain Steganographic Algorithms and assigning it a Suspicion Value. This Suspicion Value is a number associated with the image and is bigger for those images which contain information and smaller for innocent images. Based on this Suspicion Value it can be decided whether the given image must be interrogated thoroughly (thorough interrogation of an image requires large amount of computation time but reliably and conclusively identifies the hidden information using various steganalytic techniques) or not. This fast stego-identifier algorithm can be used for quick filtering of the suspicious images flowing through the web servers, routers, layer three switches and any other electronic media. Based on this algorithm the suspicion values of various cover and stego-images generated by three different steganographic algorithms are computed and evaluated. All the graphs and tables are generated using MATLAB ©Image Processing Tool Box.