Abstract
With the rapid escalation of the usage of sensitive data exchange through internet, information security has become a vulnerable realm of concern. Numerous security policies are incorporated, steganography being one of them. In this paper, a new image steganography technique facilitating embedding and extraction mechanisms have been proposed. The classic technique of edge detection is employed in which the threshold is made to vary for every new input test case. Relying on the threshold generation methodology, each edge image is generated in accordance with a distinct key threshold value. This in turn directs the insertion and extraction strategies. By using different performance metrics, like Payload, Mean Squared Error, Peak Signal to Noise Ratio, Structural Similarity Index, Kullback-Leibler Divergence, Cross-correlation, etc., this procedure substantiates better results. It has quite a remarkable embedding capacity (i.e. Payload). Also the values of Peak Signal to Noise Ratio and Structural Similarity Index indicate that the imperceptibility of the stego-image is well-maintained. The statistical results obtained reassure the undetectability of the hidden image. This approach may be used to deliver a status of security to a system which communicates secure data files through any public surveillance medium.









Similar content being viewed by others
References
Abdallah EE, Ben Hamza A, Bhattacharya P (2007) MPEG Video Watermarking Using Tensor Singular Value Decomposition, International Conference Image Analysis and Recognition, ICIAR 2007: Image Analysis and Recognition, p 772–783
Abdallah EE, Ben Hamza A, Bhattacharya P (2010) Video watermarking using wavelet transform and tensor algebra. SIViP 4(2):233–245
Ahmad T, Abdullah M (2009) A novel steganographic method for gray-level images. World Acad Sci Eng Technol 3(3):3
Almohammad A, Ghinea G (2010) Stego-image quality and the reliability of PSNR, Image Processing Theory, Tools and Applications, IEEE
Altaay AAJ, Sahib SB., Zamani M (2012) An Introduction to Image Steganography Techniques, IEEE International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
Banerjee I, Indu P, Singh A et al (2015) Robust watermarking using four bit per pixel technique. Int J Electron Secur Digit Forensics 7(4)
Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl 76:16529–16562
Bhattacharyya D, Kim T (2011) Image data hiding technique using discrete Fourier transformation. In: Kim T, Adeli H, Robles RJ, Balitanas M (eds) Ubiquitous computing and multimedia applications. Communications in Computer and Information Science. Springer, Berlin, Heidelberg, p 151
Bhattacharyya S, Sanyal G (2012) Study and analysis of quality of service in different image based steganography using pixel mapping method. International Journal of Applied Information Systems 2(7):42–57
Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141:123–138
Dukkipati A (2012) On maximum entropy and minimum KL-divergence optimization by Gröbner basis methods. Appl Math Comput 218(23):11674–11687
Duncan K, Sarkar S (2012) Relational entropy-based saliency detection in images and videos. 19th IEEE International Conference on Image Processing, p 1093–1096
El-Alfy E, Al-Sadi A (2011) A comparative study of PVD-based schemes for data hiding in digital images. In: Siegel HJ, El-Kadi A (eds) AICCSA (IEEE Computer Society), p 144–149
Elsheh E, Ben Hamza A (2011) Secret sharing approaches for 3D object encryption. Expert Syst Appl 38(11):13906–13911
Feng J, Zhang J, Zhu X et al (2017) A novel chaos optimization algorithm. Multimed Tools Appl 76:17405–17436
Ferzli R, Girija L, Ali W (2010) Efficient implementation of kurtosis based no reference image sharpness metric. In: Astola J, Egiazarian KO (eds) Image processing: algorithms and systems, (SPIE), p 75320
Gurav M, MukeshTiwari P, Singh P (2015) High secured image by LSB steganography technique using matlab. International Journal on Recent and Innovation Trends in Computing and Communication 3(4):1836–1840
Huang P, Chang K, Chang C et al (2008) A novel image steganography method using tri-way pixel value differencing. J Multimed 3
Kahn J, Kalai G (2007) Thresholds and expectation thresholds. Comb Probab Comput 16(3):495–502
Kanan H, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–6130
Koo H, Cho N (2013) Skew estimation of natural images based on a salient line detector. J Electron Imaging 22(1):013020
Kumar V, Gupta P (2012) Importance of statistical measures in digital image processing. International Journal of Emerging Technology and Advanced Engineering 2(8):56–62
Lan T, Mansour M, Tewfik A (2000) Robust high capacity data embedding. In: ICIP, p 581–584
Li Q, Fang YM, Xu JT (2016) A novel spatial pooling strategy for image quality assessment. J Comput Sci Technol 31(2):225–234
Liu L, Miao S (2017) An image encryption algorithm based on baker map with varying parameter. Multimed Tools Appl 76:16511–16527
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214
Mohapatra S, Kumar P, Majhi B (2012) Adaptive threshold selection for impulsive noise detection in images using coefficient of variance. Neural Comput & Applic 21(2):281–288
Muhammad K, Ahmad J, Rho S et al (2017) Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76:18985–19004
Mukherjee S, Sanyal G (2017) Enhanced position power first mapping (PPFM) based image steganography. Int J Comput Appl 39(2). Taylor and Francis
Mukherjee S, Ash S, Sanyal G (2015) A novel image steganographic methodology by Power Modulus Scrambling with logistic mapping, TENCON 2015, 2015 IEEE Region 10 Conference
Mukherjee S, Ash S, Sanyal G (2015) A novel image steganographic approach by Pixel Position Modulus Method (PPMM), Computing for Sustainable Global Development (INDIACom), IEEE Conference Publications, 201
Potdar V, Chang E (2004) Gray level modification steganography for secret communication. IEEE International Conference on Industrial Informatics, Berlin, Germany, p 355–368
Safarpour M, Charmi M (2016) Capacity enlargement of the PVD steganography method using the GLM technique, CoRRabs, 1601.00299
Sajedi H (2016) Steganalysis based on steganography pattern discovery. Journal of Information Security and Applications 30:3–14
Sheisi H, Mesgarian J, Rahmani M (2012) Steganography: Dct Coefficient Replacement Method and Compare with JSteg Algorithm. International Journal of Computer and Electrical Engineering 4(4)
Solemani S, Taherinia A (2017) High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76:20847–20867
Subhedar M, Mankar V (2014) Current status and key issues in image steganography: a survey. Computer Science Review 13-14:95–113
Sun S (2016) A novel edge based image steganography with 2k correction and Huffman encoding. Inf Process Lett 116(2):93–99
Tao H, Chongmin L, Zain JM, Abdalla AN (2014) Robust Image Watermarking Theories and Techniques: A Review. J Appl Res Technol 12(1):122–138
Tiwari N, Sandilya M (2014) Spatial domain image steganography based on security and randomization. Int J Adv Comput Sci Appl 5(1)
Wakure MA, Holambe AN (2015) A discrete wavelet transform: a steganographic method for transmitting images. Int J Comput Appl 129(5)
Yang C, Weng C, Wang S et al (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3):488–497
Yang X et al (2016) Image quality assessment via spatial structural analysis. Comput Electr Eng
Yevseyeva I, Fernandes V, Moorsel A et al (2016) Two-stage security controls selection. International Conference on Enterprise Information Systems/ International Conference on Project Management/ International Conference on Health and Social Care Information Systems and Technologies, 100, p 971–978
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mukherjee, S., Sanyal, G. Edge based image steganography with variable threshold. Multimed Tools Appl 78, 16363–16388 (2019). https://doi.org/10.1007/s11042-018-6975-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6975-4