Abstract
Steganography or “Covered Writing” is a security tool for hiding secret information inside any media or object of interest. It provides secure communication between the sender and the receiver. The spatial domain image steganography techniques such as the Least Significant Bit (LSB) substitution and edge-based hiding schemes have been vastly exploited in the literature. An improved LSB method using modulus-3 strategy can be found in the literature, which has the advantages of high embedding capacity and resistance against Subtractive Pixel Adjacency Matrix (SPAM) steganalysis. However, one drawback is that it hides data sequentially. The edge-based hiding techniques have the advantage that it can tolerate significant variations in edge pixels and fulfill all the requirements of the Human Vision System (HVS), but it has limited in embedding capacity. The proposed work is a reversible data hiding scheme that takes the advantages of both the edge-based algorithm and the novel modulus-3 hiding scheme. At first, we converted the message into ternary data, and then we applied the novel modulus-3 strategy to hide two ternary bits in the edge pixel of the image thereby taking the advantages of both modulus-3 strategy and edge-based hiding approach. We have implemented four edge detection algorithms like Laplacian, Canny, Sobel, and Prewitt to find four different edge areas from the cover image. For each edge area, we applied the modulus-3 strategy to hide the entire ternary message, and then, we made a comparative analysis based on the performance of four edge detectors, and finally, we concluded.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: a survey. Comput. Sci. Rev. 13–14(C), 95–113 (2014)
Yang, J., Liu, K., Kang, X., Wong, E.K., Shi, Y.-Q.: Spatial image steganography based on generative adversarial network, no. 1, pp. 1–7 (2018)
Tang, W., Li, B., Tan, S., Barni, M., Huang, J.: CNN-based adversarial embedding for image steganography. IEEE Trans. Inf. Forensics Secur. 14(8), 2074–2087 (2019)
Lee, Y.P., Lee, J.C., Chen, W.K., Chang, K.C., Su, I.J., Chang, C.P.: High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf. Sci. (Ny) 191, 214–225 (2012)
Yang, C.H., Weng, C.Y., Tso, H.K., Wang, S.J.: A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84(4), 669–678 (2011)
Liao, X., Wen, Q.Y., Zhang, J.: A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J. Vis. Commun. Image Represent. 22(1), 1–8 (2011)
Swain, G., Lenka, S.K.: Steganography using two sided, three sided, and four sided side match methods. CSI Trans. ICT 1, 127–133 (2013). https://doi.org/10.1007/s40012-013-0015-3
Hussain, M., Wahid, A., Wahab, A., Ho, A.T.S., Javed, N., Jung, K.: Rightmost digit replacement crossmark. Signal Process. Image Commun. 50, 44–57 (2017)
Geetha, S., Kabilan, V., Chockalingam, S.P., Kamaraj, N.: Varying radix numeral system based adaptive image steganography. Inf. Process. Lett. 111(16), 792–797 (2011)
Hong, W., Chen, T.S., Luo, C.W.: Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. J. Syst. Softw. 85(5), 1166–1175 (2012)
Li, Y.C., Yeh, C.M., Chang, C.C.: Data hiding based on the similarity between neighboring pixels with reversibility. Digit. Signal Process. A Rev. J. 20(4), 1116–1128 (2010)
Zhao, Z., Luo, H., Lu, Z.M., Pan, J.S.: Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU Int. J. Electron. Commun. 65(10), 814–826 (2011)
Ma, X., Pan, Z., Hu, S., Wang, L.: Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy. J. Vis. Commun. Image Represent. 28, 60–70 (2015)
Tang, M., Hu, J., Song, W., Zeng, S.: Reversible and adaptive image steganographic method. AEU Int. J. Electron. Commun. 69(12), 1745–1754 (2013)
INFOSEC: Security Awareness Statistics. https://resources.infosecinstitute.com/category/enterprise/securityawareness/security-awareness-fundamentals/security-awareness-statistics/#gref. Accessed 13 Aug 2019
CSO: Top cybersecurity facts, figures and statistics for 2018. https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html. Accessed 13 Aug 2019
VARONIS: 56 Must Know Data Breach Statistics for 2019. https://www.varonis.com/blog/data-breach-statistics. Accessed 13 Aug 2019
Loan, N.A., Parah, S.A., Sheikh, J.A., Akhoon, J.A., Bhat, G.M.: Hiding electronic patient record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J. Biomed. Inform. 73, 125–136 (2017)
Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3), 469–474 (2004)
Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognit. 36(12), 2875–2881 (2003)
Yang, H., Sun, X., Sun, G.: A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering 18(4), 509–516 (2009)
Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)
Li, X., Yang, B., Cheng, D., Zeng, T.: A generalization of LSB matching. IEEE Signal Process. Lett. 16(2), 69–72 (2009)
Xu, W.L., Chang, C.C., Chen, T.S., Wang, L.M.: An improved least-significant-bit substitution method using the modulo three strategy. Displays 42, 36–42 (2016)
Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)
Pevny, T., et al.: Steganalysis by subtractive pixel adjacency matrix to cite. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)
Fabien a. p. petitcolas: Public-Domain Test Images for Homeworks and Projects. https://homepages.cae.wisc.edu/~ece533/images/
Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tripathy, S.K., Srivastava, R. (2020). An Edge-Based Image Steganography Method Using Modulus-3 Strategy and Comparative Analysis. In: Nain, N., Vipparthi, S., Raman, B. (eds) Computer Vision and Image Processing. CVIP 2019. Communications in Computer and Information Science, vol 1148. Springer, Singapore. https://doi.org/10.1007/978-981-15-4018-9_43
Download citation
DOI: https://doi.org/10.1007/978-981-15-4018-9_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4017-2
Online ISBN: 978-981-15-4018-9
eBook Packages: Computer ScienceComputer Science (R0)