Image Steganography Using LSB and Edge - Detection Technique

Steganography is the technique of hiding the fact that communication is taking place, by hiding data in other data. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Steganalysis, the detection of this hidden information, is an inherently difficult problem and requires a thorough investigation so we are using "Edge detection Filter". In this paper search how the edges of the images can be used to hiding text message in Steganography .It give the depth view of image steganography and Edge detection Filter techniques. Method: In this paper search how the edges of the images can be used to hiding text message in Steganography. For that gray image has been presented. In this method tried to find binary value of each character of text message and then in the next stage, tried to find dark places of gray image (black) by converting the original image to binary image for labeling each object of image by considering on 8 pixel connectivity. Then these images have been converted to RGB image in order to find dark places. Because in this way each sequence of gray color turns into RGB color and dark level of grey image is found by this way if the Gary image is very light the histogram must be changed manually to find just dark places. In the final stage each 8 pixels of dark places has been considered as a byte and binary value of each character has been put in low bit of each byte that was created manually by dark places pixels for increasing security of the main way of least Significant bit steganography. Steganalysis then used to evaluate the hiding process to ensure the data can be hidden in best possible way.

[1]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[2]  Baljit Singh,et al.  Adaptive Thresholding for Edge Detection in Gray Scale Images , 2010 .

[3]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[4]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[5]  Ahmad T. Al-Taani,et al.  Data Embedding Based on Better Use of Bits in Image Pixels , 2008 .

[6]  Regunathan Radhakrishnan,et al.  Data masking: a secure-covert channel paradigm , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[7]  Geeta Sikka,et al.  A New Image Steganography Based On First Component Alteration Technique , 2010, ArXiv.

[8]  Mehdi Hussain,et al.  Information Hiding Using Edge Boundaries of Objects , 2011 .

[9]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[10]  William Palm,et al.  Introduction to Matlab 7 for Engineers , 2004 .

[11]  Ying Wang,et al.  Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.

[12]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[13]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[14]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[15]  N. Senthilkumaran,et al.  Image Segmentation - A Survey of Soft Computing Approaches , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[16]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[17]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[18]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[19]  Mamta Juneja,et al.  Performance Evaluation of Edge Detection Techniques for Images in Spatial Domain , 2009 .

[20]  C. A. Murthy,et al.  Thresholding in edge detection: a statistical approach , 2004, IEEE Transactions on Image Processing.

[21]  Husrev T. Sencar,et al.  Image Steganography: Concepts and Practice , 2004 .

[22]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[23]  Kh.M. Singh,et al.  Hiding Secret Message in Edges of the Image , 2007, 2007 International Conference on Information and Communication Technology.

[24]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[25]  Hamid Hassanpour,et al.  Edge Detection Techniques: Evaluations and Comparison , 2008 .

[26]  Hideki Noda,et al.  High capacity and secure digital steganography to palette-based images , 2002, Proceedings. International Conference on Image Processing.

[27]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[28]  Tariq Jamil Steganography: the art of hiding information in plain sight , 1999 .

[29]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[30]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[31]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[32]  M Radha,et al.  EDGE DETECTION TECHNIQUES FOR IMAGE SEGMENTATION , 2011 .

[33]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[34]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[35]  Adrian Biran,et al.  Matlab for engineers , 1997 .

[36]  Kevin Curran,et al.  An Investigation into the Use of the Least Significant Bit Substitution Technique in Digital Watermarking , 2005 .

[37]  K.R. Venugopal,et al.  Steganalysis of LSB Embedded Images Using Variable Threshold Color Pair Analysis , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.

[38]  Kathryn Hempstalk,et al.  Hiding Behind Corners : Using Edges in Images for Better Steganography , 2006 .

[39]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[40]  J. Krenn,et al.  Steganography and Steganalysis , 2006 .

[41]  Daisy Jacobs,et al.  Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.