Information hiding in edges: A high capacity information hiding technique using hybrid edge detection

被引:46
|
作者
Parah, Shabir A. [1 ]
Sheikh, Javaid A. [1 ]
Akhoon, Jahangir A. [1 ]
Loan, Nazir A. [1 ]
Bhat, Ghulam M. [1 ]
机构
[1] Univ Kashmir, Post Grad Dept Elect & Instrumentat Technol, Srinagar 190006, Jammu & Kashmir, India
关键词
Canny edge detection; Prewitt edge detection; Pixel value differencing (PVD); Hybrid edge detection; Human visual system (HVS); Ciphering; IMAGES;
D O I
10.1007/s11042-016-4253-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.
引用
收藏
页码:185 / 207
页数:23
相关论文
共 50 条
  • [21] High capacity information hiding algorithm for DCT domain of image
    Xie Jianquan
    Yang Chunhua
    Huang Dazu
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 269 - +
  • [22] High-Capacity Information Hiding Based on Residual Network
    Duan, Xintao
    Li, Baoxia
    Xie, Zimei
    Yue, Dongli
    Ma, Yuanyuan
    IETE TECHNICAL REVIEW, 2021, 38 (01) : 172 - 183
  • [23] Information Hiding Using Minification
    Rajba, Pawel
    Mazurczyk, Wojciech
    IEEE ACCESS, 2021, 9 : 66436 - 66449
  • [24] Channel models for high-capacity information hiding in images
    Briffa, JA
    Das, M
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION V, WITH APPLICATIONS, 2002, 4793 : 135 - 144
  • [25] HCGAN: A High Capacity Information Hiding Algorithm Based on GAN
    Zhang K.
    Li X.
    Yu X.
    Feng L.
    Qin H.
    Zhang J.
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2022, 49 (04): : 35 - 46
  • [26] HidingGAN: High Capacity Information Hiding with Generative Adversarial Network
    Wang, Zihan
    Gao, Neng
    Wang, Xin
    Xiang, Ji
    Zha, Daren
    Li, Linghui
    COMPUTER GRAPHICS FORUM, 2019, 38 (07) : 393 - 401
  • [27] Information Hiding Using CAVLC: Misconceptions and a Detection Strategy
    You, Weike
    Cao, Yun
    Zhao, Xianfeng
    DIGITAL FORENSICS AND WATERMARKING, 2017, 10431 : 187 - 201
  • [28] INFORMATION HIDING
    SMITH, R
    BYTE, 1983, 8 (08): : 30 - &
  • [29] Information hiding and detection error rate
    Zhang, XH
    Zhang, F
    Liu, XX
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 5372 - 5375
  • [30] Studies of information hiding detection in images
    Xia, Yu
    Lang, Rong-Ling
    Cao, Wei-Bing
    Dai, Guan-Zhong
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (04): : 728 - 736