Skip to main content

Advertisement

Log in

Information hiding in edges: A high capacity information hiding technique using hybrid edge detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Amanpreet K, Sumeet K (2012) Image steganography based on hybrid edge detection and 2 k correction method. Int J Eng Innov Technol (IJEIT) 1:2

    Google Scholar 

  2. Anastasia I, Spyros TH, George S (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524

    Article  Google Scholar 

  3. Anderson RJ, Petitcolas FAP (1998) On the limits of steganography. IEEE J Sel Areas Commun 16:474–481

    Article  Google Scholar 

  4. Arup KP, Tarok P (2013) Design of an edge detection based image steganography with high embedding capacity. Springer 115:794–800

    Google Scholar 

  5. Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36:1583–1595

    Article  Google Scholar 

  6. Chen WJ, Chang CC, Hoang Ngan LT (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292–3301

    Article  Google Scholar 

  7. Chin CC, Hsien WT (2004) A steganographic method for digital images using side match. Pattern Recogn Lett 25(12):1431–1437

    Article  Google Scholar 

  8. Chung MW, Nan IW, Chwei-Shyong T, Min-Shiang H (2007) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Software 81:150–158

    Google Scholar 

  9. Dawson EH, Gustafson M H, Millan B (2002) Evaluation of RC4 stream cipher. Manuscript from Information Security Research Centre, Queensland University of Technology

  10. Fabien AP, Petitcolas RJ, Kuhn MG (1999) Information hiding a survey. Proc IEEE Spec Issue Proc Multimed Content 87:1062–1078

    Google Scholar 

  11. Jae GY, Eun JY, Sang HS, Kee YY (2008) A new image steganography based on 2 k correction and edge-detection. Fifth International Conference on Information Technology: New Generations. IEEE Comput Soc: 563–568

  12. Karen B, Curran K (2006) An evaluation of image based steganography methods using visual inspection and automated detection techniques. Multimed Tools Appl 30:55–88

    Article  Google Scholar 

  13. Kwong CM (2004) Hiding data in images using simple LSB substitution. Comput J Pattern Recogn Lett 37:469–474

    Article  MATH  Google Scholar 

  14. Saurabh S, Ashutosh D (2014) Improved hash based approach for secure color image steganography using Canny edge detection method 14: 7

  15. Schyndel RG, Tirkel AZ, Osborne CF (1996) A digital watermarking. Proc IEEE Int Conf Imag Process 2:86–90

    Article  Google Scholar 

  16. Shabir AP, Javaid AS, Muheed H, Ghulam MB (2014) A secure and robust information hiding technique for covert communication. Int J Electron (UK) 102:1253–1266

    Google Scholar 

  17. Shabir AP, Javaid AS, Umer IA, Ghulam MB (2015) Hiding in encrypted images: a three tier security data hiding technique. Multidim Syst Sign Process. doi:10.1007/s11045-015-0358-z

    Google Scholar 

  18. Shabir AP, Javaid AS, Ghulam MB (2012) On the realization of a secure, high capacity data embedding technique using joint top-down and down- top embedding approach. Elixir Comp Sci Eng 49:10141–10146

    Google Scholar 

  19. Stallings W (2005). The RC4 stream Encrypyion Algorithm. In: Cryptography and network security

  20. Tove MJ (2008) An introduction to the visual system. Cambridge University Press

  21. Wang RZ, Lin CF, Ja-Chen L (2000) Hiding data in images optimal moderately significant –bit replacement. IEE Electron Lett 36:2069–2070

    Article  Google Scholar 

  22. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(910):1613–1626

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Parah, S.A., Sheikh, J.A., Akhoon, J.A. et al. Information hiding in edges: A high capacity information hiding technique using hybrid edge detection. Multimed Tools Appl 77, 185–207 (2018). https://doi.org/10.1007/s11042-016-4253-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4253-x

Keywords

Navigation