Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
Solved

# F5 steganography algorithm

Posted on 2004-08-02
Medium Priority
4,880 Views
I need to detect how much the difference in an image (JPEG only) after I insert a steganography in it. I'm using F5 algorithm to insert the steganography. Now I want determine the image quality.
Can anyone explain me the error detection method using Root Mean Square (RMS)?
0
Question by:drakuli
[X]
###### Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

• Help others & share knowledge
• Earn cash & points
• 5
• 2
• 2

LVL 4

Expert Comment

ID: 11706898
To find RMS error,you take the point by point difference between the original image and the filtered image, square each value, compute the mean, then take the square root. Then you have your rms error value.
0

LVL 3

Expert Comment

ID: 11720485
Interesting article on wht RMSE and MSE are not very good! http://white.stanford.edu/html/teo/pdm/pdm.html
0

LVL 1

Author Comment

ID: 11733504
Guys, can you be more specific?

>> exploitedj >>> square each value
value of what????
0

LVL 4

Accepted Solution

exploitedj earned 1000 total points
ID: 11744329
You have two images, the original and a filtered one, you want to diff the two images. Square the value of each pixel after diffing to get your error values. Get a mean value of these squared errors. Root the value of the mean of squared errors.
You can use Bdiff to get the binary diff
0

LVL 1

Author Comment

ID: 11791231
Ok. Please wait a moment. I'm still confused. I'll make a response again later...
0

LVL 1

Author Comment

ID: 11909839
guys, can you please tell me how to get a sample code for this?
0

LVL 1

Author Comment

ID: 12004403
Well, since it seemed that no one interested to further answer my question, I'll close this question in 4 days.
0

LVL 3

Assisted Solution

ID: 12004526
0

LVL 1

Author Comment

ID: 12013114
Thanx for everyone here. Exploitedj gave me the logic and fatlad gave me the sample code. So I think both of you deserve the points. Thanx guys.
0

## Featured Post

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
I don't pretend to be an expert at this, but I have found a few things that are useful. I hope that sharing them here will help others, so they will not have to face some rather hard choices. Since I felt this to be a topic of enough importance andâ€¦
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threatâ€¦
Nobody understands Phishing better than an anti-spam company. Thatâ€™s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With companâ€¦
###### Suggested Courses
Course of the Month6 days, 2 hours left to enroll