Multi-Edge Concept used for Image Steganography
DOI:
https://doi.org/10.15649/2346075X.691Keywords:
Steganography, Edge, LSB.Abstract
Digital Steganography means hiding sensitive data inside a cover object in
a way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustness against attacks. In some cases, we
need to take in account not just the invisibility but also we need to think
about other requirement which is the robustness of recovering the embedded secrete messages. In this paper we propose a new steganoraphic
scheme that aims to achieve the robustness even the stego image attacked
by steganalyzers. Furthermore, we proposed a scheme which is more robust against JPEG compression attack compared with other traditional
steganography schemes.
References
Agrawal N, Savvides M. Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching. In: 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops; 2009 Jun 20-25; Miami, FL, USA. IEEE; 2009. p. 85-92. Available from: https://ieeexplore.ieee.org/document/5204308/ https://doi.org/10.1109/CVPR.2009.5204308
Fridrich J, Long M. Steganalysis of LSB encoding in color images. In: 2000 IEEE International Conference on Multimedia and Expo ICME2000 Proceedings Latest Advances in the Fast Changing World of Multimedia (Cat No00TH8532);2000 Jul 30 - Aug 2; New York, NY, USA. IEEE; 2000. p. 1279-82. Available from: http://ieeexplore.ieee.org/document/871000/
Fridrich J, Goljan M, Du R. Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security new challenges - MM&Sec '01 [Internet]; 2001 Oct 5; Ottawa, Ontario, Canada; New York, New York, USA: ACM Press; 2001. p. 27. Available from: http://portal.acm.org/citation.cfm?doid=1232454.1232466 https://doi.org/10.1145/1232454.1232466
Rashid RD, Sellahewa H, Jassim SA. Biometric feature embedding using robust steganography technique. In: Proceedings of SPIE - The International Society for Optical Engineering; Baltimore/Maryland/USA; 2013. https://doi.org/10.1117/12.2018910
Xu J, Sung AH, Shi P, Liu Q. JPEG compression immune steganography using wavelet transform. In: International Conference on Information Technology: Coding and Computing, 2004 Proceedings ITCC 2004; 2004 Apr 5-7; Las Vegas, NV, USA, USA;2004. p. 704-708 Vol.2. Available from: http://ieeexplore.ieee.org/document/1286737/ https://doi.org/10.1109/ITCC.2004.1286737
Rashid RD, Asaad A, Jassim S. Topological data analysis as image steganalysis technique. In: Proceedings of SPIE - The International Society for Optical Engineering; 2018 Apr 15-19; Orlando, Florida, United States; 2018.
Johnson NF, Jajodia S. Exploring steganography: Seeing the unseen. Computer (Long Beach Calif) [Internet]. 1998;31(2):26-34. Available from: http://ieeexplore.ieee.org/document/4655281/ https://doi.org/10.1109/MC.1998.4655281
Chan C-K, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognition. 2004;37(3):459-474. Available from: https://www.sciencedirect.com/science/article/abs/pii/S003132030300284X https://doi.org/10.1016/j.patcog.2003.08.007
Morkel T, Eloff J, Olivier M. An overview of image steganography [Internet]. Available from: https://pdfs.semanticscholar.org/bb26/1e7f02f8597b37a2f71e55c2e2c21aa7575f.pdf
Rashid RD, Jassim SA, Sellahewa H. Covert exchange of face biometric data using steganography. In: 2013 5th Computer Science and Electronic Engineering Conference (CEEC);2013 Sep 17-18; Colchester, UK;2013. IEEE; p. 134-9. Available from: http://ieeexplore.ieee.org/document/6659460/ https://doi.org/10.1109/CEEC.2013.6659460
Hempstalk K. Hiding Behind Corners: Using Edges in Images for Better Steganography. Available from: https://www.researchgate.net/publication/241605558
Bailey K, Curran K. An evaluation of image based steganography methods. Multimed Tools Applications. 2006;30(1):55-88. Available from: https://doi.org/10.1007/s11042-006-0008-4
Chen W-J, Chang C-C, Le THN. High payload steganography mechanism using hybrid edge detector. Expert Syst Appl, 2010;37(4):3292-301. Available from: https://doi.org/10.1016/j.eswa.2009.09.050
Singh KM, Singh LS, Singh AB, Devi KS. Hiding Secret Message in Edges of the Image. In: 2007 International Conference on Information and Communication Technology;2007 Mar 7-9; Dhaka, Bangladesh; IEEE;2007. p. 238-41. https://doi.org/10.1109/ICICT.2007.375384
Rashid R. Robust Steganographic Techniques for Secure Biometric-based Remote Authentication, 2016. Available from: https://www.researchgate.net/publication/295549501
Yang C-H, Weng C-Y, Wang S-J, Sun H-M. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Trans Inf Forensics Secur. 2008;3(3):488-97. Available from: http://ieeexplore.ieee.org/document/4598830/. https://doi.org/10.1109/TIFS.2008.926097
H-C, Wu N-I, Tsai C-S, Hwang M-S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings - Vision, Image and Signal Processing; 2007;152(5): 611-615. https://doi.org/10.1049/ip-vis:20059022
Unnikrishnan R. Analysis of Modern Steganographic Techniques. 2011. Available from: http://www.bvicam.ac.in/news/INDIACom 2011/9.pdf
Downloads
Published
How to Cite
Issue
Section
Altmetrics
Downloads
License
All articles published in this scientific journal are protected by copyright. The authors retain copyright and grant the journal the right of first publication, with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0), which permits sharing the work with authorship recognition and without commercial purposes.
Readers may copy and distribute the material from this journal issue for non-commercial purposes in any medium, provided the original work is cited and credit is given to the authors and the journal.
Any commercial use of the material from this journal is strictly prohibited without written permission from the copyright holder.
For more information on the copyright of the journal and open access policies, please visit our website.