High payload steganography mechanism using hybrid edge detector

Steganography is the art and science of hiding data into information. The secret message is hidden in such a way that no one can apart from the sender or the intended recipient. The least significant bit (LSB) substitution mechanism is the most common steganographic technique for embedding a secret message in an image with high capacity, while the human visual system (HVS) would be unable to notice the hidden message in the cover image. In this paper, besides employing the LSB substitution technique as a fundamental stage, we take advantage of edge detection technique. The experimental results show that the proposed scheme not only achieves high embedding capacity but also enhances the quality of the stego image from the HVS by an edge detection technique. Moreover, based on that the secret message is replaced with different LSBs, our scheme can effectively resist the image steganalysis.

[1]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[2]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[3]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[4]  Y. Kuo,et al.  A new fuzzy edge detection method for image enhancement , 1997, Proceedings of 6th International Fuzzy Systems Conference.

[5]  Rainer Böhme,et al.  Statistical characterisation of MP3 encoders for steganalysis , 2004, MM&Sec '04.

[6]  Emanuele Trucco,et al.  Introductory techniques for 3-D computer vision , 1998 .

[7]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[8]  Hamid R. Tizhoosh,et al.  Fast fuzzy edge detection , 2002, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622).

[9]  F. Russo Edge detection in noisy images using fuzzy reasoning , 1998, IMTC/98 Conference Proceedings. IEEE Instrumentation and Measurement Technology Conference. Where Instrumentation is Going (Cat. No.98CH36222).

[10]  V. K. Govindan,et al.  Improving BTC image compression using a fuzzy complement edge operator , 2008, Signal Process..

[11]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[12]  W. Thompson,et al.  A fuzzy if-then approach to edge detection , 1993, [Proceedings 1993] Second IEEE International Conference on Fuzzy Systems.

[13]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[14]  Milan Sonka,et al.  Image Processing, Analysis and Machine Vision , 1993, Springer US.

[15]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[16]  Rangachar Kasturi,et al.  Machine vision , 1995 .

[17]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.