Abstract
Security of information is one of the important issues of digital communication. Steganography is one of the solutions to ensure secure data transmission over the network. In this paper, a novel secure edge based image steganography technique for 24-bit RGB images has been proposed. The proposed method first encrypts the secret data using encryption algorithm and then the edge pixels of the cover image is used for embedding the encrypted data in the order of strongest to weakest edge pixels depending on message length. To make interception of secret message difficult, XOR between the green component of pixel and mutually decided secret key has been used as location deciding factor among red and blue components of pixel. The performance evaluation shows that with this two level security, the proposed method can protect data from unauthorized access.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Saiful, I., Modi, M.R., Gupta, P.: Edge-based image steganography. EURASIP J. Inf. Secur. 8, 1–14 (2014)
Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern recognit. 37, 469–474 (2004)
Ker, A.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) 6th International Workshop on Information Hiding. LNCS, vol. 3200, pp. 97–115. Springer, Berlin (2004)
Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Sig. Process. Lett. 12(6), 441–444 (2005)
Mielikainen, J.: LSB matching revisited. IEEE Sig. Process. Lett. 13(5), 285–287 (2006)
Sarreshtedari, S., Akhaee, M.A.: One-third probability embedding: a new±1 histogram compensating image least significant bit steganography scheme. IET Image Process. 8(2), 78–89 (2014)
Sun, H.M., Wang, K.H., Liang, C.C., Kao, Y.S.: A LSB substitution compatible steganography. In: TENCON IEEE Region 10 Conference, pp. 1–3 (2007)
Ker, A.D.: Steganalysis of embedding in two least-significant bits. IEEE Trans. Inf. Forensics Secur. 2(1), 46–54 (2007)
Zhang, X.: Efficient data hiding with plus-minus one or two. IEEE Sig. Process. Lett. 17(7), 635–638 (2010)
Hempstalk, K.: Hiding behind corners: using edges in images for better steganography. In: Proceedings of Computing Women’s Congress, Hamilton, New Zealand (2006)
Singh, K.M., Singh, L.S., Singh, A.B., Devi, K.S.: Hiding secret message in edges of the image. In: Proceedings of the International Conference on Information and Communication Technology, pp. 238–241 (2007)
Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)
Zhang, X., Wang, S.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn. Lett. 25(3), 331–339 (2004)
Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)
Khodaei, M., Faez, K.: New adaptive steganographic method using least significant-bit substitution and pixel-value differencing. IET Image Process. 6(6), 677–686 (2012)
Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)
Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7(1), 176–184 (2012)
Hernandez, J.R., Amado, M., Perez-Gonzalez, F.: DCT-Domain water-marking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9, 55–68 (2000)
Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proceedings of the ICASSP, Seattle, WA, vol. 5 (1998)
Patnaik, L.M., Chowdary, C.R., Raja, K.B., Venugopal, K.R.: A secure image steganography using LSB, DCT and compression techniques on raw images. In: International Conference on Intelligent Sensing and Information Processing, pp. 170–176 (2005)
Cheng, Q., Huang, T.S.: An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans. Multimedia 3(3), 273–284 (2001)
Quisquater, J.J., Couvreur, C.: Fast decipherment algorithm for RSA public-key cryptosystem. Electron. Lett. 18(21), 905–907 (1982)
Canny, J.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. 6, 679–698 (1986)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Seeja, K.R., Rana, J., Priya, S., Ahuja, L. (2018). A Novel Edge Based Image Steganography Technique. In: Abraham, A., Cherukuri, A., Madureira, A., Muda, A. (eds) Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016). SoCPaR 2016. Advances in Intelligent Systems and Computing, vol 614. Springer, Cham. https://doi.org/10.1007/978-3-319-60618-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-60618-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60617-0
Online ISBN: 978-3-319-60618-7
eBook Packages: EngineeringEngineering (R0)