Skip to main content

Extremely High-Capacity, Secure Image Steganography Based on Composite Edge Detection, with Message Integrity

  • Conference paper
  • First Online:
  • 965 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 120))

Abstract

Image steganography is a technique for obscuring secret message within image pixel matrix. It provides means for secretly communicating between two entities with the third party totally unaware of the embedded message. One of the most important methods for image steganography is edge detection technique, wherein secret data is inserted in LSBs of image edge pixels. Data embedding in edge pixels does not create notable distortion in image when compared to embedding data in non-edge pixels. Different types of edge pixel detectors are available including most renowned Canny edge detector, Sobel edge detector, Prewitt edge detector and many others. Hybrid edge detection uses a combination of different edge detectors for generating edge pixels of image. Message to be secretly communicated is inserted in the LSB of these edge pixels, and the image thus formed called stego image is sent to the concerned party. Major drawback of hybrid edge detection technique is its capacity. The number of edge pixels is very less in any image. In the last decade, many papers have focused on increasing capacity of edge detection by using different techniques. In this work, we have proposed an extremely high-capacity hybrid edge detection technique by using data compression. Also, data is encrypted and then inserted in the cover image pixels. For message integrity, SHA512 hash function is used. Subsequently, this work not only improves capacity of edge detection while maintaining the image quality but also provides security and message integrity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yu, Y.-H., Chang, C.-C., Lin, I.-C.: A new steganographic method for color and grayscale image hiding. Comput Vision Image Understanding 107(3), 183–194 (2007)

    Google Scholar 

  2. Muhammad, K., Ahmad, J., Rho, S., Baik, S.W.: Image steganography for authenticity of visual contents in social networks. Multimed. Tools Appl. 76(18), 18985–19004 (2017)

    Article  Google Scholar 

  3. Grover, N., Mohapatra, A.: Digital image authentication model based on edge adaptive steganography. In: 2013 2nd International Conference on Advanced Computing, Networking and Security (ADCONS), pp 238–242 (2013)

    Google Scholar 

  4. Tondwalkar, A., Jani, P.V.: Secure localization of wireless devices with application to sensor networks using steganography. Proc. Comput. Sci. 78, 610–616 (2016)

    Article  Google Scholar 

  5. Kumar, G., Ghanekar, U.: Image steganography based on canny edge detection, dilation operator and hybrid coding. J. Inf. Secur. Appl. 41, 41–51 (2018)

    Google Scholar 

  6. Parah, S.A., Sheikh, J.A., Akhoon, J.A., Loan, N.A., Bhat, G.M.: Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimeda Tools Appl. (to be published). https://doi.org/10.1007/s11042-016-4253-x

  7. Ioannidou, A., Halkidis, S.T., Stephanides, G.: A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl. 39, 11517–11524 (2012)

    Article  Google Scholar 

  8. Chen, W.J., Chang, C.C., Hoang Ngan, L.T.: High payload steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37(4), 3292–3301 (2010)

    Article  Google Scholar 

  9. Jung, K.H., Yoo, K.Y.: Data hiding using edge detector for scalable images. Multimedia Tools and Appl (2013). https://doi.org/10.1007/s11042-012-1293-84

    Article  Google Scholar 

  10. Lie, W.N., Chang, L.C.: Data hiding in images with adaptive number of least significant bits based on the human visual system. In: Proceedings of ICIP ’99, vol. 1, pp. 286–290 (1999)

    Google Scholar 

  11. Sun, S.: A novel edge based image steganography with 2k correction and Huffman encoding. Inf. Process. Lett. 116(2), 93–99 (2016)

    Article  Google Scholar 

  12. Bai, J., Chang, C.C., Nguyen, T.S., Zhu, C., Liu, Y.: A high payload steganographic algorithm based on edge detection. Displays 46, 42–51 (2017)

    Article  Google Scholar 

  13. Jae, G.Y., Eun, J.Y., Sang, H.S., Kee, Y.Y.: A new image steganography based on 2k correction and edgedetection. In: Fifth International Conference on Information Technology: New Generations. IEEE Computer Society, pp. 563–568

    Google Scholar 

  14. Datta, B., Roy, S., Roy, S., Bandyopadhyay, S.K.: Multi-bit robust image steganography based on modular arithmetic. Multimedia Tools Appl. 1–36 (2018)

    Google Scholar 

  15. Irawan, C., Setiadi, D.R.I.M., Sari dan, C.A., Rachmawanto, E.H.: Hiding and securing message on edge areas of image using LSB steganography and OTP encryption. In: International Conference on Informatics and Computational Sciences (ICICoS), Semarang (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yadav, P., Mohapatra, A.K. (2020). Extremely High-Capacity, Secure Image Steganography Based on Composite Edge Detection, with Message Integrity. In: Bansal, J., Gupta, M., Sharma, H., Agarwal, B. (eds) Communication and Intelligent Systems. ICCIS 2019. Lecture Notes in Networks and Systems, vol 120. Springer, Singapore. https://doi.org/10.1007/978-981-15-3325-9_1

Download citation

Publish with us

Policies and ethics