Digital Image Authentication Model Based on Edge Adaptive Steganography

With the rapid growth of internet in the present world, social networking websites like Twitter, Facebook and Instagram are being increasingly used by people to share their life moments and events via images. But this vastly popular phenomenon of image sharing on internet is exposed to many risks. At present, these social networking websites are not bound by stringent privacy and copyright laws. Thus original image, once shared, can be easily downloaded and edited by the miscreants. Modified images can be then uploaded, morphed or shared further without the consent of the original owner of the image. Validation of the ownership of these images is practically impossible due to high degree of replication. This calls for an urgent requirement of an image authentication system. A digital image authentication system using adaptive steganography (Edge detection with variable LSB as the embedding technique) has been proposed in this paper. In the proposed technique the secret data related to person's login detail and current timestamp will be hidden in the original image using steganography without affecting the visual quality of the image. The information behind that image can be decoded only by the authorized party containing the original data of the person. This will validate the source and ownership of the shared image. It has been shown by the experimental results that the quality of image is not degraded even after the addition of secret data.

[1]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  S. Katzenbeisser,et al.  A survey of steganographic techniques , .

[3]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[4]  Ahmad R. Naghsh-Nilchi,et al.  A New Approach to Steganography using Sinc-Convolution Method , 2008 .

[5]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[6]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[7]  Zhaohui Li,et al.  A technique of improved steganography text based on chaos and BPCS , 2010, 2010 2nd International Conference on Advanced Computer Control.

[8]  K. L. Shunmuganathan,et al.  Steganography using edge adaptive image , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[9]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[10]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[11]  Adnan Abdul-Aziz Gutub,et al.  RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[12]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[13]  Chin-Chen Chang,et al.  An Adaptive Steganography for Index-Based Images Using Codeword Grouping , 2004, PCM.

[14]  Rainer Böhme,et al.  Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.

[15]  Elke Franz,et al.  Adaptive steganography based on dithering , 2004, MM&Sec '04.

[16]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[17]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..