Multimedia Tools and Applications

, Volume 76, Issue 6, pp 7973–7987 | Cite as

LSB based non blind predictive edge adaptive image steganography

  • Soumendu ChakrabortyEmail author
  • Anand Singh Jalal
  • Charul Bhatnagar


Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganography can break the stego system. To prevent the breakdown of the stego system data is embedded in the selected area of an image which reduces the probability of detection. Most of the existing adaptive image steganography techniques achieve low embedding capacity. In this paper a high capacity Predictive Edge Adaptive image steganography technique is proposed where selective area of cover image is predicted using Modified Median Edge Detector (MMED) predictor to embed the binary payload (data). The cover image used to embed the payload is a grayscale image. Experimental results show that the proposed scheme achieves better embedding capacity with minimum level of distortion and higher level of security. The proposed scheme is compared with the existing image steganography schemes. Results show that the proposed scheme achieves better embedding rate with lower level of distortion.


Edge adaptive High level bit plane Low level bit plane Predictive image 


  1. 1.
    Alattar M (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156MathSciNetCrossRefGoogle Scholar
  2. 2.
    Böhme R (2010) Principles of modern steganography and steganalysis. In: Böhme R (ed) Advanced statistical steganalysis, 1st edn. Springer, Berlin Heidelberg, pp 11–77Google Scholar
  3. 3.
    Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side-match vector quantization. IEEE Trans Circuits Syst Video Technol 16(10):1301–1308CrossRefGoogle Scholar
  4. 4.
    Cheddad, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752CrossRefzbMATHGoogle Scholar
  5. 5.
    Farid H (2002) Detecting hidden messages using higher-order statistical models. IEEE Image Process Int Conf Proc 2:905–908Google Scholar
  6. 6.
    Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security, pp 27–30. doi: 10.1145/1232454.1232466
  7. 7.
    Harmsen J, Pearlman W (2003) Steganalysis of additive-noise modelable information hiding. SPIE Electron Imaging Conf Proc 5020:131–142CrossRefGoogle Scholar
  8. 8.
    Hempstalk K (2006) Hiding behind corners: using edges in images for better steganography. In: Computing Women’s Congress Proceedings, Hamilton, New ZealandGoogle Scholar
  9. 9.
    Hong W, Chen TS (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22:131–140CrossRefGoogle Scholar
  10. 10.
    Huang F, Li B, Huang J (2007) Attack LSB matching steganography by counting alteration rate of the number of neighborhood gray levels. IEEE Image Process Conf Proc 1:401–404Google Scholar
  11. 11.
    Huang F, Zhong Y, Huang J (2014) Improved algorithm of edge adaptive image steganography based on LSB matching revisited algorithm. Digital-forensics and watermarking. Lect Notes Comput Sci 8389:19–31CrossRefGoogle Scholar
  12. 12.
    Hwang J, Kim JW, Choi JU (2006) A reversible watermarking based on histogram shifting. Lect Notes Comput Sci 4283:348–361CrossRefGoogle Scholar
  13. 13.
    Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090MathSciNetCrossRefGoogle Scholar
  14. 14.
    Ker D (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444CrossRefGoogle Scholar
  15. 15.
    Khosravi MJ, Naghsh-Nilchi AR (2014) A novel joint secret image sharing and robust steganography method using wavelet. Multimedia Systems 20(2):215–226CrossRefGoogle Scholar
  16. 16.
    Kim K, Lee M, Lee H, Lee H (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42(11):3083–3096CrossRefzbMATHGoogle Scholar
  17. 17.
    Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591CrossRefzbMATHGoogle Scholar
  18. 18.
    Luo XY, Wang DS, Wang P, Liu FL (2008) A review on blind detection for image steganography. Signal Process 88:2138–2157CrossRefzbMATHGoogle Scholar
  19. 19.
    Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193CrossRefGoogle Scholar
  20. 20.
    Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214CrossRefGoogle Scholar
  21. 21.
    Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel value differencing scheme. Multimed Tools Appl 52(2–3):407–430CrossRefGoogle Scholar
  22. 22.
    Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287CrossRefGoogle Scholar
  23. 23.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362CrossRefGoogle Scholar
  24. 24.
    Ou D, Sun W (2014) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed Tools Appl. doi: 10.1007/s11042-014-2059-2 Google Scholar
  25. 25.
    Roy R, Changder S, Sarkar A, Debnath NC (2013) Evaluating image steganography techniques: future research challenges. In: Proceedings of International Conference on Computing, Management and Telecommunications (ComManTel), pp 309–314. doi: 10.1109/ComManTel.2013.6482411
  26. 26.
    Thodi M, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730MathSciNetCrossRefGoogle Scholar
  27. 27.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896CrossRefGoogle Scholar
  28. 28.
    Tsai PY, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143CrossRefzbMATHGoogle Scholar
  29. 29.
    Ulutas G, Ulutas M, Nabiyev VV (2012) Secret image sharing with reversible capabilities. International Journal of Internet Technology and Secured Transactions 4(1):1–11CrossRefzbMATHGoogle Scholar
  30. 30.
    Vetterli M (1987) A theory of multirate filter banks. IEEE Trans Acoust Speech Signal Process 35(3):356–372CrossRefGoogle Scholar
  31. 31.
    Walton S (1995) Image authentication for a slippery new age. Dr Dobbs J Softw Tools Prof Program 20:18–26Google Scholar
  32. 32.
    Wu HC, Wang HC, Tsai CS, Wang CM (2010) Reversible image steganographic scheme via predictive coding. Displays 31:35–43CrossRefGoogle Scholar
  33. 33.
    Zhang L, Wu X (2006) An edge-guided image interpolation algorithm via directional filtering and data fusion. IEEE Trans Image Process 15(8):2226–2238CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Soumendu Chakraborty
    • 1
    Email author
  • Anand Singh Jalal
    • 2
  • Charul Bhatnagar
    • 2
  1. 1.Department of Information TechnologyIndian Institute of Information TechnologyAllahabadIndia
  2. 2.Department of Computer Engineering and ApplicationGLA UniversityMathuraIndia

Personalised recommendations