Abstract
The multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.
Similar content being viewed by others
References
Amanpreet K, Sumeet K (2012) Image steganography based on hybrid edge detection and 2 k correction method. Int J Eng Innov Technol (IJEIT) 1:2
Anastasia I, Spyros TH, George S (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524
Anderson RJ, Petitcolas FAP (1998) On the limits of steganography. IEEE J Sel Areas Commun 16:474–481
Arup KP, Tarok P (2013) Design of an edge detection based image steganography with high embedding capacity. Springer 115:794–800
Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36:1583–1595
Chen WJ, Chang CC, Hoang Ngan LT (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292–3301
Chin CC, Hsien WT (2004) A steganographic method for digital images using side match. Pattern Recogn Lett 25(12):1431–1437
Chung MW, Nan IW, Chwei-Shyong T, Min-Shiang H (2007) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Software 81:150–158
Dawson EH, Gustafson M H, Millan B (2002) Evaluation of RC4 stream cipher. Manuscript from Information Security Research Centre, Queensland University of Technology
Fabien AP, Petitcolas RJ, Kuhn MG (1999) Information hiding a survey. Proc IEEE Spec Issue Proc Multimed Content 87:1062–1078
Jae GY, Eun JY, Sang HS, Kee YY (2008) A new image steganography based on 2 k correction and edge-detection. Fifth International Conference on Information Technology: New Generations. IEEE Comput Soc: 563–568
Karen B, Curran K (2006) An evaluation of image based steganography methods using visual inspection and automated detection techniques. Multimed Tools Appl 30:55–88
Kwong CM (2004) Hiding data in images using simple LSB substitution. Comput J Pattern Recogn Lett 37:469–474
Saurabh S, Ashutosh D (2014) Improved hash based approach for secure color image steganography using Canny edge detection method 14: 7
Schyndel RG, Tirkel AZ, Osborne CF (1996) A digital watermarking. Proc IEEE Int Conf Imag Process 2:86–90
Shabir AP, Javaid AS, Muheed H, Ghulam MB (2014) A secure and robust information hiding technique for covert communication. Int J Electron (UK) 102:1253–1266
Shabir AP, Javaid AS, Umer IA, Ghulam MB (2015) Hiding in encrypted images: a three tier security data hiding technique. Multidim Syst Sign Process. doi:10.1007/s11045-015-0358-z
Shabir AP, Javaid AS, Ghulam MB (2012) On the realization of a secure, high capacity data embedding technique using joint top-down and down- top embedding approach. Elixir Comp Sci Eng 49:10141–10146
Stallings W (2005). The RC4 stream Encrypyion Algorithm. In: Cryptography and network security
Tove MJ (2008) An introduction to the visual system. Cambridge University Press
Wang RZ, Lin CF, Ja-Chen L (2000) Hiding data in images optimal moderately significant –bit replacement. IEE Electron Lett 36:2069–2070
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(910):1613–1626
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Parah, S.A., Sheikh, J.A., Akhoon, J.A. et al. Information hiding in edges: A high capacity information hiding technique using hybrid edge detection. Multimed Tools Appl 77, 185–207 (2018). https://doi.org/10.1007/s11042-016-4253-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4253-x