Abstract
This paper provides a method of hiding sensitive information in digital image. In this paper, we introduce a chaotic edge based steganography techniques based on artificial neural network. First we find the edges of image using artificial neural network which is given by Jinan Gu et al. Secondly, the key based chaotic scheme is used to disperse the bits of the secret message randomly into edge pixel of the image to produce the stego image that take advantage of edge detection techniques. Finally the experiment results show the higher value of PSNR that indicate that there is no difference between the original and stego image. Therefore the proposed algorithms are dependent on the key which make it robust and can protect the secret data from stealing. The experimental results show the satisfactory performance of proposed method based on edge detection techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Alam, A. Jamil, A. Saldhi, M. Ahmad, Digital image authentication and encryption using digital signature, in International Conference on Advances in Computer Engineering and Applications (ICACEA), vol. 19–20 (March 2015), pp. 332–336. ISBN:978-1-4673-6911-4/15
Z. Li, X. Chen, X. Pan, X. Zeng, Lossless data hiding scheme based on adjacent pixel difference, in Proceedings of the International Conference on Computer Engineering and Technology, (2009), pp. 588–592
S. Islam, P. Gupta, Revisiting least two significant bits steganography, in Proceedings of the 8th International Conference on Intelligent Information Processing (ICIIP), Seoul, Republic of Korea, 1–3 April 2013, pp. 90–93
S. Alam, V. Kumar, W.A. Siddiqui, M. Ahmad, Key-dependent image steganography using edge detection, in International Conference on Advanced Computing & Communication Technologies, (2014), pp. 85–88
S. Alam, S.M. Zakariya, M.Q. Rafiq, Analysis of modified LSB approaches of hiding information in digital images, in International Conference on Computational Intelligence and Communication Systems, (IEEE, Hybrid Intelligent Systems, 2013), pp. 280–285. ISBN 978-1-4799-7633-1/14/2014
S. Islam, M.R. Modi, P. Gupta, Edge-based image steganography. EURASIP J. Inf. Secur. 2014, 8, (2014). http://jis.eurasipjournals.com/content/2014/1/8
M.R. Modi, S. Islam, P. Gupta, Edge based steganography on colored images, in 9th International Conference on Intelligent Computing (ICIC). Lecture Notes in Computer Science, vol. 7995 (Springer, Berlin, 2013), pp. 593–600
J.F. Canny, Finding edges and lines in images, Master’s thesis, MIT. AI Lab. TR-720 (1983)
W.J. Chen, C.C. Chang, T.H.N. Le, High payload steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37(4), 3292–3301 (2010)
Y.H. Kuo, C.S. Lee, C.C. Liu, A new fuzzy edge detection method for image enhancement, in Proceedings of the 6th IEEE International Conference on Fuzzy Systems, vol. 2, (1997), pp. 1069–1074
J. Gu, Y. Pan, H. Wang, Research on the improvement of image edge detection algorithm based on artificial neural network. Optik 126, 2974–2978 (2015)
J. Canny, A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. PAMI 8(6), 679–698 (1986)
R.M. May, Simple mathematical model with very complicated dynamics. Nature 261, 459–467 (1967)
S. Alam, S.M. Zakariya, N. Akhtar, Analysis of modified Triple-A steganography technique using fisher yates algorithm, in International Conference on Hybrid Intelligent Systems, (2014). ISBN 978-1-4799-7633-1/14/2014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Alam, S., Ahmad, T., Doja, M.N. (2017). A Novel Edge Based Chaotic Steganography Method Using Neural Network. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_48
Download citation
DOI: https://doi.org/10.1007/978-981-10-3156-4_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3155-7
Online ISBN: 978-981-10-3156-4
eBook Packages: EngineeringEngineering (R0)