Information hiding in edges: A high capacity information hiding technique using hybrid edge detection

被引:46
|
作者
Parah, Shabir A. [1 ]
Sheikh, Javaid A. [1 ]
Akhoon, Jahangir A. [1 ]
Loan, Nazir A. [1 ]
Bhat, Ghulam M. [1 ]
机构
[1] Univ Kashmir, Post Grad Dept Elect & Instrumentat Technol, Srinagar 190006, Jammu & Kashmir, India
关键词
Canny edge detection; Prewitt edge detection; Pixel value differencing (PVD); Hybrid edge detection; Human visual system (HVS); Ciphering; IMAGES;
D O I
10.1007/s11042-016-4253-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.
引用
收藏
页码:185 / 207
页数:23
相关论文
共 50 条
  • [31] Information Hiding as a Challenge for Malware Detection
    Mazurczyk, Wojciech
    Caviglione, Luca
    IEEE SECURITY & PRIVACY, 2015, 13 (02) : 89 - 93
  • [32] The edge process model and its application to information-hiding capacity analysis
    Voloshynovskiy, S
    Koval, O
    Mihcak, MK
    Pun, T
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (05) : 1813 - 1825
  • [33] Capacity estimation research for speech information hiding
    1600, Beijing University of Posts and Telecommunications (39):
  • [34] Information hiding system StegoWaveK for improving capacity
    Kim, YS
    Kim, YM
    Choi, JY
    Baik, DK
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2003, 2745 : 423 - 436
  • [35] A Large Capacity Blind Information Hiding Algorithm
    Xie, Jianquan
    Yang, Chunhua
    Huang, Dazu
    Xie, Duosi
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 934 - +
  • [36] StegAnim-A Novel Information Hiding Technique using Animations
    Tadiparthi, Gopalakrishna Reddy
    Sueyoshi, Toshiyuki
    ENGINEERING LETTERS, 2006, 13 (03)
  • [37] Hiding Information in Digital Images Using LSB Steganography Technique
    Jebur S.A.
    Nawar A.K.
    Kadhim L.E.
    Jahefer M.M.
    International Journal of Interactive Mobile Technologies, 2023, 17 (07) : 167 - 178
  • [38] Secure perceptual data hiding technique using information theory
    Hadhoud, MM
    Ismail, NA
    Shawkey, W
    Mohammed, AZ
    ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 249 - 253
  • [39] Information hiding technique with double phase encoding
    Kishk, S
    Javidi, B
    APPLIED OPTICS, 2002, 41 (26) : 5462 - 5470
  • [40] An information hiding technique based on visual cryptography
    Chen, Te-Yu
    Ou, Hsia-Hung
    Yang, Yong -Jay
    Tseng, Jing-Hang
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 249 - 253