Data Hiding Based on Intelligent Optimized Edges for Secure Multimedia Communication

Recently, image steganography has received a lot of attention as it enables for secure multimedia communication. Payload capacity and stego image imperceptibility are a critical factors of any steganographic technique. In order to receive maximum embedding capacity with a minimum degradation of stego images, secret data should be embedded carefully in a specific regions. In this paper, data hiding is considered as an optimization problem related to achieving optimum embedding level of the cover image. Embedding data in edge area provide high imperceptibility. However, the embedding capacity of edge region is very limited. The work attempt to improve the edge based steganography by incorporates edge detection and vision science research. Genetic Algorithm that uses human visual system characteristics approach for data hiding is presented. Primarily, the approach applies Differences of Gaussian detector which closely resembles the human visual behavior. Secondly, the edge profusion indicates the level of threshold visibility with the help of Genetic Algorithm training. The suggested solution uses Contrast Sensitivity Function (CSF) which produces the edges based on the size of the embedding information. The authors of this paper compared their technique with other classical and recent works. The quality of the steganography is measured based on various quality metrics such as PSNR, wPSNR, SSIM and UIQI. These metrics declare the stability between imperceptibility and large embedding capacity.

[1]  Zenon Chaczko,et al.  Hyper Edge Detection with Clustering for Data Hiding , 2016, J. Inf. Hiding Multim. Signal Process..

[2]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[3]  C. Enroth-Cugell,et al.  The contrast sensitivity of retinal ganglion cells of the cat , 1966, The Journal of physiology.

[4]  B. Wandell Foundations of vision , 1995 .

[5]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[6]  Peter G. J. Barten,et al.  Contrast sensitivity of the human eye and its e ects on image quality , 1999 .

[7]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[8]  Kefa Rabah,et al.  Steganography-The Art of Hiding Data , 2004 .

[9]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[10]  Chin-Chen Chang,et al.  High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..

[11]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[12]  Zenon Chaczko,et al.  Digital multimedia archiving based on optimization steganography system , 2014, 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE).

[13]  Saurabh Singh,et al.  Use of image to secure text message with the help of LSB replacement , 2010 .

[14]  Nitin Jain,et al.  Image Steganography Using LSB and Edge - Detection Technique , 2012 .

[15]  D Marr,et al.  Theory of edge detection , 1979, Proceedings of the Royal Society of London. Series B. Biological Sciences.

[16]  Chin-Chen Chang,et al.  A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..

[17]  Youssef Bassil,et al.  Image Steganography based on a Parameterized Canny Edge Detection Algorithm , 2012, ArXiv.

[18]  David J. Sakrison,et al.  The effects of a visual fidelity criterion of the encoding of images , 1974, IEEE Trans. Inf. Theory.

[19]  Eric Cole,et al.  Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .

[20]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[21]  Sarbjeet Singh,et al.  A Proposed Method for Image Steganography Using Edge Detection , 2013 .