Skip to main content

An Edge-Based Image Steganography Method Using Modulus-3 Strategy and Comparative Analysis

  • Conference paper
  • First Online:
Computer Vision and Image Processing (CVIP 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1148))

Included in the following conference series:

Abstract

Steganography or “Covered Writing” is a security tool for hiding secret information inside any media or object of interest. It provides secure communication between the sender and the receiver. The spatial domain image steganography techniques such as the Least Significant Bit (LSB) substitution and edge-based hiding schemes have been vastly exploited in the literature. An improved LSB method using modulus-3 strategy can be found in the literature, which has the advantages of high embedding capacity and resistance against Subtractive Pixel Adjacency Matrix (SPAM) steganalysis. However, one drawback is that it hides data sequentially. The edge-based hiding techniques have the advantage that it can tolerate significant variations in edge pixels and fulfill all the requirements of the Human Vision System (HVS), but it has limited in embedding capacity. The proposed work is a reversible data hiding scheme that takes the advantages of both the edge-based algorithm and the novel modulus-3 hiding scheme. At first, we converted the message into ternary data, and then we applied the novel modulus-3 strategy to hide two ternary bits in the edge pixel of the image thereby taking the advantages of both modulus-3 strategy and edge-based hiding approach. We have implemented four edge detection algorithms like Laplacian, Canny, Sobel, and Prewitt to find four different edge areas from the cover image. For each edge area, we applied the modulus-3 strategy to hide the entire ternary message, and then, we made a comparative analysis based on the performance of four edge detectors, and finally, we concluded.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: a survey. Comput. Sci. Rev. 13–14(C), 95–113 (2014)

    Article  Google Scholar 

  2. Yang, J., Liu, K., Kang, X., Wong, E.K., Shi, Y.-Q.: Spatial image steganography based on generative adversarial network, no. 1, pp. 1–7 (2018)

    Google Scholar 

  3. Tang, W., Li, B., Tan, S., Barni, M., Huang, J.: CNN-based adversarial embedding for image steganography. IEEE Trans. Inf. Forensics Secur. 14(8), 2074–2087 (2019)

    Article  Google Scholar 

  4. Lee, Y.P., Lee, J.C., Chen, W.K., Chang, K.C., Su, I.J., Chang, C.P.: High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf. Sci. (Ny) 191, 214–225 (2012)

    Article  Google Scholar 

  5. Yang, C.H., Weng, C.Y., Tso, H.K., Wang, S.J.: A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84(4), 669–678 (2011)

    Article  Google Scholar 

  6. Liao, X., Wen, Q.Y., Zhang, J.: A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J. Vis. Commun. Image Represent. 22(1), 1–8 (2011)

    Article  Google Scholar 

  7. Swain, G., Lenka, S.K.: Steganography using two sided, three sided, and four sided side match methods. CSI Trans. ICT 1, 127–133 (2013). https://doi.org/10.1007/s40012-013-0015-3

    Article  Google Scholar 

  8. Hussain, M., Wahid, A., Wahab, A., Ho, A.T.S., Javed, N., Jung, K.: Rightmost digit replacement crossmark. Signal Process. Image Commun. 50, 44–57 (2017)

    Article  Google Scholar 

  9. Geetha, S., Kabilan, V., Chockalingam, S.P., Kamaraj, N.: Varying radix numeral system based adaptive image steganography. Inf. Process. Lett. 111(16), 792–797 (2011)

    Article  MathSciNet  Google Scholar 

  10. Hong, W., Chen, T.S., Luo, C.W.: Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. J. Syst. Softw. 85(5), 1166–1175 (2012)

    Article  Google Scholar 

  11. Li, Y.C., Yeh, C.M., Chang, C.C.: Data hiding based on the similarity between neighboring pixels with reversibility. Digit. Signal Process. A Rev. J. 20(4), 1116–1128 (2010)

    Article  Google Scholar 

  12. Zhao, Z., Luo, H., Lu, Z.M., Pan, J.S.: Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU Int. J. Electron. Commun. 65(10), 814–826 (2011)

    Article  Google Scholar 

  13. Ma, X., Pan, Z., Hu, S., Wang, L.: Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy. J. Vis. Commun. Image Represent. 28, 60–70 (2015)

    Article  Google Scholar 

  14. Tang, M., Hu, J., Song, W., Zeng, S.: Reversible and adaptive image steganographic method. AEU Int. J. Electron. Commun. 69(12), 1745–1754 (2013)

    Article  Google Scholar 

  15. INFOSEC: Security Awareness Statistics. https://resources.infosecinstitute.com/category/enterprise/securityawareness/security-awareness-fundamentals/security-awareness-statistics/#gref. Accessed 13 Aug 2019

  16. CSO: Top cybersecurity facts, figures and statistics for 2018. https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html. Accessed 13 Aug 2019

  17. VARONIS: 56 Must Know Data Breach Statistics for 2019. https://www.varonis.com/blog/data-breach-statistics. Accessed 13 Aug 2019

  18. Loan, N.A., Parah, S.A., Sheikh, J.A., Akhoon, J.A., Bhat, G.M.: Hiding electronic patient record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J. Biomed. Inform. 73, 125–136 (2017)

    Article  Google Scholar 

  19. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3), 469–474 (2004)

    Article  Google Scholar 

  20. Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognit. 36(12), 2875–2881 (2003)

    Article  Google Scholar 

  21. Yang, H., Sun, X., Sun, G.: A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering 18(4), 509–516 (2009)

    Google Scholar 

  22. Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)

    Article  Google Scholar 

  23. Li, X., Yang, B., Cheng, D., Zeng, T.: A generalization of LSB matching. IEEE Signal Process. Lett. 16(2), 69–72 (2009)

    Article  Google Scholar 

  24. Xu, W.L., Chang, C.C., Chen, T.S., Wang, L.M.: An improved least-significant-bit substitution method using the modulo three strategy. Displays 42, 36–42 (2016)

    Article  Google Scholar 

  25. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)

    Article  Google Scholar 

  26. Pevny, T., et al.: Steganalysis by subtractive pixel adjacency matrix to cite. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)

    Article  Google Scholar 

  27. Fabien a. p. petitcolas: Public-Domain Test Images for Homeworks and Projects. https://homepages.cae.wisc.edu/~ece533/images/

  28. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Santosh Kumar Tripathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tripathy, S.K., Srivastava, R. (2020). An Edge-Based Image Steganography Method Using Modulus-3 Strategy and Comparative Analysis. In: Nain, N., Vipparthi, S., Raman, B. (eds) Computer Vision and Image Processing. CVIP 2019. Communications in Computer and Information Science, vol 1148. Springer, Singapore. https://doi.org/10.1007/978-981-15-4018-9_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-4018-9_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-4017-2

  • Online ISBN: 978-981-15-4018-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics