Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 614))

Included in the following conference series:

Abstract

Security of information is one of the important issues of digital communication. Steganography is one of the solutions to ensure secure data transmission over the network. In this paper, a novel secure edge based image steganography technique for 24-bit RGB images has been proposed. The proposed method first encrypts the secret data using encryption algorithm and then the edge pixels of the cover image is used for embedding the encrypted data in the order of strongest to weakest edge pixels depending on message length. To make interception of secret message difficult, XOR between the green component of pixel and mutually decided secret key has been used as location deciding factor among red and blue components of pixel. The performance evaluation shows that with this two level security, the proposed method can protect data from unauthorized access.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saiful, I., Modi, M.R., Gupta, P.: Edge-based image steganography. EURASIP J. Inf. Secur. 8, 1–14 (2014)

    Google Scholar 

  2. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern recognit. 37, 469–474 (2004)

    Article  MATH  Google Scholar 

  3. Ker, A.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) 6th International Workshop on Information Hiding. LNCS, vol. 3200, pp. 97–115. Springer, Berlin (2004)

    Chapter  Google Scholar 

  4. Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Sig. Process. Lett. 12(6), 441–444 (2005)

    Article  Google Scholar 

  5. Mielikainen, J.: LSB matching revisited. IEEE Sig. Process. Lett. 13(5), 285–287 (2006)

    Article  Google Scholar 

  6. Sarreshtedari, S., Akhaee, M.A.: One-third probability embedding: a new±1 histogram compensating image least significant bit steganography scheme. IET Image Process. 8(2), 78–89 (2014)

    Article  Google Scholar 

  7. Sun, H.M., Wang, K.H., Liang, C.C., Kao, Y.S.: A LSB substitution compatible steganography. In: TENCON IEEE Region 10 Conference, pp. 1–3 (2007)

    Google Scholar 

  8. Ker, A.D.: Steganalysis of embedding in two least-significant bits. IEEE Trans. Inf. Forensics Secur. 2(1), 46–54 (2007)

    Article  Google Scholar 

  9. Zhang, X.: Efficient data hiding with plus-minus one or two. IEEE Sig. Process. Lett. 17(7), 635–638 (2010)

    Article  Google Scholar 

  10. Hempstalk, K.: Hiding behind corners: using edges in images for better steganography. In: Proceedings of Computing Women’s Congress, Hamilton, New Zealand (2006)

    Google Scholar 

  11. Singh, K.M., Singh, L.S., Singh, A.B., Devi, K.S.: Hiding secret message in edges of the image. In: Proceedings of the International Conference on Information and Communication Technology, pp. 238–241 (2007)

    Google Scholar 

  12. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)

    Article  MATH  Google Scholar 

  13. Zhang, X., Wang, S.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn. Lett. 25(3), 331–339 (2004)

    Article  Google Scholar 

  14. Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)

    Article  Google Scholar 

  15. Khodaei, M., Faez, K.: New adaptive steganographic method using least significant-bit substitution and pixel-value differencing. IET Image Process. 6(6), 677–686 (2012)

    Article  Google Scholar 

  16. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)

    Article  Google Scholar 

  17. Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7(1), 176–184 (2012)

    Article  Google Scholar 

  18. Hernandez, J.R., Amado, M., Perez-Gonzalez, F.: DCT-Domain water-marking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9, 55–68 (2000)

    Article  Google Scholar 

  19. Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proceedings of the ICASSP, Seattle, WA, vol. 5 (1998)

    Google Scholar 

  20. Patnaik, L.M., Chowdary, C.R., Raja, K.B., Venugopal, K.R.: A secure image steganography using LSB, DCT and compression techniques on raw images. In: International Conference on Intelligent Sensing and Information Processing, pp. 170–176 (2005)

    Google Scholar 

  21. Cheng, Q., Huang, T.S.: An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans. Multimedia 3(3), 273–284 (2001)

    Article  Google Scholar 

  22. Quisquater, J.J., Couvreur, C.: Fast decipherment algorithm for RSA public-key cryptosystem. Electron. Lett. 18(21), 905–907 (1982)

    Article  Google Scholar 

  23. Canny, J.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. 6, 679–698 (1986)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. R. Seeja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Seeja, K.R., Rana, J., Priya, S., Ahuja, L. (2018). A Novel Edge Based Image Steganography Technique. In: Abraham, A., Cherukuri, A., Madureira, A., Muda, A. (eds) Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016). SoCPaR 2016. Advances in Intelligent Systems and Computing, vol 614. Springer, Cham. https://doi.org/10.1007/978-3-319-60618-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60618-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60617-0

  • Online ISBN: 978-3-319-60618-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics