# Introduction teganography is sometimes referred to as data hiding. Steganalysis technique is opposite to steganography. Steganalysis technique focuses on detecting the presence of hiding data. Steganalysis approaches are two types. Those are 1. Target approach 2. Blind steganalysis Target approaches provide high accurate detection and reliable results compare to previous other steganalysis techniques. Previously many number of steganalysis techniques are design. Those techniques are steganography detectors, rich model detection scheme, statistics based approach, and movement based approaches. All existing approaches are not efficient under detection and reliable results generation. In this paper design of new detection scheme using feature set. Feature set consist of different dimensions of input content. Combine of all dimensions of features display as a highly efficient detection results. Comparision study with other techniques also discuss in the remaining sections also. After completion of comparative study which technique is considerable that is also we can decide here. # II. # Related Work Counter technique of image stenography is known as steganalysis. It's identifies the artifacts that existing in stenography images. Steganalysis provides analysis results from hidden information. Different steganalysis approaches information described below here. Image stenography detectors contain two parts. Those two parts are image model and machine learning tool. Image model chosen training set of stego and cover images. Primary here we focus on detection accuracy from image model. Stenographic embedding operation image insensitive content converts into sensitive information. We can capture as many dependencies among individual image elements. Observation of all dependencies some of the disturbances are available here. Now here we can calculate the measurement features using spatial and frequency domain. These are DCT (Discrete Cosine Transform) coefficients. All domains of features we can extract with different iterations. Different iterations of features store into different matrices. Combine of all matrices display improved detection accuracy. This kind of process we can call as machine learning from all dimensions. Here one richer model of JPEG images has different number of sub models. 1. Here capture the DCT coefficients using parallel channels. 2. Joint operation applies on parallel channels DCT coefficients. 3. Finally improved DCT statistical coefficients values are displayed here. Statistical coefficients are useful for construction of image models and steganalysis. Steganalysis results are improved and enhanced in the form robustness and scalability. Finally again we observed some more accuracy related issues. Next other steganalysis approaches are introduced for increased statistical robustness values and scalability. New steganalysis approaches we can apply on low dimensional and high dimensional environment also. Collection of all dimensions features information and create feature set. After training operation on images using steganographic scheme next apply universal blind detection scheme. Here we can use optimal linear predictor for wavelet coefficients. All wavelet coefficients information collects and display statistical clustering results. Here we can apply threshold operation for separation of stego image from cover image. These kinds of operations are possible limited images database only. This method is not scale well and show low performance results. # Problem Statement Previous no single steganalysis technique is not work efficiently. Blindly all steganalysis techniques apply on stego images. All previous steganalysis techniques have take more time and resources. The main goal of this paper was to the performance analysis of three different steganalysis techniques. Using three steganalysis results next we can perform detection accuracy comparison results. We test on various test images and performance calculation performs based on detected area. Comparison was made based on the number of negatives, positives and misclassified results. IV. # Implementation Details Steganalysis techniques analyzed are listed below for detection of steganography images. Those techniques are 1. Discriminant analysis based Linear Discriminant Classification. 2. Support vector machines based classification. # Image scanning patterns In all above steganalysis techniques are using logic and features are same. Only the major difference is classification technique only. # Detection technique Procedure We shall present the new feature set for steganalysis on historical images. Feature set have scanning patterns, markov transition probability matrix, local and global calibrations and classification techniques. # a) Image Scanning Patterns Image is divided into non overlapping blocks. Scan of each and every block of row and column and other Hibert directions also. We can observe all possible paths of correlations information also its better. # b) Intra and Inter Block Features i. Intra Block Features We can extract intra block features and store into matrix. Matrix contains DCT coefficients content information. All adjacent coefficients update into matrix. Next apply markov chain operations calculate transition probability features. Here we can perform different orders of markov probability matrix value. # ii. Inter Block Features All orders of probability matrix features are rearrange then store into new matrix. Calculate the average of all orders transition probability value finally. Finally original image features set content display here. # c) Image Calibration Image calibration is used for accurate statistics. Decompress and finally we can display original image. # Global # Experimental Results Each approach has different features and working with different image databases, it's very complex. Following table have an aim to recapitulate the three approaches information. # Conclusion and Future Work We have proposed scanning patterns based approach for detection of JPEG steganography. Here we utilized feature set approaches for improving detection accuracy. Finally proposed approach compare with existing approaches. Proposed approach gives enhanced performance results, that's why proposed markov chain features approach is best 1![Fig. 1: Steganalysis Procedure Using higher order statistics in digital images detects stenographic images information. Here we can use quardrature mirror filters for separable of decomposition values in stenographic images. Here two types of separable filters are available. Those are vertical and horizontal filters. Filtering operation can perform subsequently. After filtering operation then we can calculate the statistics using mean, variance and skewness parameters. Finally here we can calculate error statistics also. Statistical features based detection gives effective steganalysis accuracy results compare to previous methods.After training operation on images using steganographic scheme next apply universal blind detection scheme. Here we can use optimal linear predictor for wavelet coefficients. All wavelet coefficients information collects and display statistical clustering results. Here we can apply threshold operation for separation of stego image from cover image. These kinds of operations are possible limited images database only. This method is not scale well and show low performance results.](image-2.png "Fig. 1 :") 2![Fig. 2 : probability detection ratio](image-3.png "Fig. 2 :") ![Journal of C omp uter S cience and T echnology Volume XV Issue III Version I Year ( ) G d) Classification procedure Extraction of features and calculate metrics of detection features information as a final output.](image-4.png "") 3![Fig. 3 : Block Feature Set Diagram V.](image-5.png "Fig. 3 :") 1 © 2015 Global Journals Inc. (US) ## Global Journals Inc. (US) Guidelines Handbook 2015 www.GlobalJournals.org * JessicaFridrich1 MiroslavGoljan1 Dorin Hogea2, Steganalysis of JPEG Images: Breaking the F5 Algorithm * Blind JPEG steganalysis based on multi-domain feature ZLi JChen XJiang XZeng X.-ZPan Journal of Zhejiang University (Engineering Science) 45 9 2011 in Chinese * A Markov Process Based Approach to Effective Attacking JPEG Steganography QYun SCChen WChen Proceedings of the IEEE international Conference on Multimedia & Expo 2005. Amstenlam the IEEE international Conference on Multimedia & Expo 2005. AmstenlamNetberlands 2005 s.n. * JPEG Image Steganalysis Utilizing both Intrablock and Interblock Correlations CChen YQShi IEEE international Symposium on Circuits and Systems Seattle, Washington, USA IEEE 2008 * Merging Markov and DCT features for multi-class JPEG steganalysis TPevny JFridrich Proceedings of the 8th information Hiding Workshop the 8th information Hiding WorkshopAlexandria, VA, USA Springer-Verlag 2007 * Calibration Revisited JKodovsky JFridrich Proceeding of the 11th ACM Multimedia Security Workshop eeding of the 11th ACM Multimedia Security Workshop 2009 * Calibration based universal JPEG steganalysis FHuang JHuang Science in china series F: Information sciences 2009 52 * Regional Correlation Based Blind Dection of JPEG Image Steganography KLi X.-JPing Journal of Information Engineering University 13 3 2012 in Chinese * Steganalysis by subtractive pixel adjacency matrix TPevny PBas JFridrich IEEE Transaction on Information Forensics and Security 5 2 2010 * LIBSVM: A library for Support Vector Machines CCChang CJLin