CFP last date
20 January 2025
Reseach Article

Image Steganography based on a Parameterized Canny Edge Detection Algorithm

by Youssef Bassil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 4
Year of Publication: 2012
Authors: Youssef Bassil
10.5120/9682-4112

Youssef Bassil . Image Steganography based on a Parameterized Canny Edge Detection Algorithm. International Journal of Computer Applications. 60, 4 ( December 2012), 35-40. DOI=10.5120/9682-4112

@article{ 10.5120/9682-4112,
author = { Youssef Bassil },
title = { Image Steganography based on a Parameterized Canny Edge Detection Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 4 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number4/9682-4112/ },
doi = { 10.5120/9682-4112 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:05:45.890821+05:30
%A Youssef Bassil
%T Image Steganography based on a Parameterized Canny Edge Detection Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 4
%P 35-40
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the science of hiding digital information in such a way that no one can suspect its existence. Unlike cryptography which may arouse suspicions, steganography is a stealthy method that enables data communication in total secrecy. Steganography has many requirements, the foremost one is irrecoverability which refers to how hard it is for someone apart from the original communicating parties to detect and recover the hidden data out of the secret communication. A good strategy to guaranteeirrecoverability is to cover the secret data not usinga trivial method based on a predictable algorithm, but using a specific random pattern based on a mathematical algorithm. This paper proposes an image steganography technique based on theCanny edge detection algorithm. It is designed to hide secret data into a digital image within the pixels that make up the boundaries of objects detected in the image. More specifically, bits of the secret data replace the three LSBs of every color channel of the pixels detected by the Canny edge detection algorithm as part of the edges in the carrier image. Besides, the algorithm is parameterized by three parameters: The size of the Gaussian filter, a low threshold value, and a high threshold value. These parameters can yield to different outputs for the same input image and secret data. As a result, discovering the inner-workings of the algorithm would be considerably ambiguous, misguiding steganalysts from the exact location of the covert data. Experiments showed a simulation tool codenamed GhostBit, meant to cover and uncover secret data using the proposed algorithm. As future work, examining how other image processing techniques such as brightness and contrast adjustment can be taken advantage of in steganography with the purpose ofgiving the communicating parties more preferences tomanipulate their secret communication.

References
  1. R. Anderson, F. Petitcolas, "On the limits of steganography," IEEE Journal on Selected Areas in Communications, vol. 16, 1998.
  2. W. Bender, D. Gruhl, N. Morimoto, A. Lu, "Techniques for data hiding IBM Systems Journal", vol. 35, no 3, pp. 313-336, 1996.
  3. Peter Wayner, "Disappearing cryptography: information hiding: steganography & watermarking", 3rd Edition, Morgan Kaufmann Publishers, 2009.
  4. Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, "Information Hiding - A Survey", Proceedings of the IEEE, special issue on protection of multimedia content, vol. 87, no. 7, pp. 1062-1078, 1999.
  5. Tovée, Martin J. , "An introduction to the visual system", Cambridge University Press, 2008.
  6. B. Pfitzmann, "Information hiding terminology", in Information Hiding, First International Workshop, vol. 1174, pp. 347–350, Springer, 1996.
  7. Eric Cole, "Hiding in Plain Sight: Steganography and the Art of Covert Communication", Wiley Publishing, 2003.
  8. J. R. Smith and B. O. Comisky, "Modulation and information hiding in images," in information hiding, first international workshop, Germany: Springer-Verlag, vol. 1174, pp. 207–226, 1996.
  9. Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, "Information Hiding - A Survey", Proceedings of the IEEE, special issue on protection of multimedia content, vol. 87, no. 7, pp. 1062-1078, 1999.
  10. Tovée, Martin J. , "An introduction to the visual system", Cambridge University Press, 2008.
  11. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.
  12. Johnson, N. F. and Jajodia, S. , "Exploring steganography: Seeing the unseen", Computer Journal, vol. 31, no. 2, pp. 26–34, 1998.
  13. T. Zhang and X. Ping, "A Fast and Effective Steganalytic Technique against JSteg-like Algorithms", Proceedings of the 8th ACM Symposium, Applied Computing, ACM Press, 2003.
  14. Eiji Kawaguchi and Richard O. Eason, "Principle and applications of BPCS- Steganography", Proceedings of SPIE: Multimedia Systems and Applications, vol. 35, no. 28, pp. 464-473, 1998.
  15. T. Lindeberg (1998) "Edge detection and ridge detection with automatic scale selection", International Journal of Computer Vision, 30, 2, pages 117--154.
  16. H. G. Barrow and J. M. Tenenbaum (1981) "Interpreting line drawings as three-dimensional surfaces", Artificial Intelligence, vol 17, issues 1-3, pages 75-116.
  17. Lindeberg, Tony (2001), "Edge detection", in Hazewinkel, Michiel, Encyclopedia of Mathematics, Springer, ISBN 978-1-55608-010-4
  18. Shapiro L. G. & Stockman G. C. (2001) Computer Vision. London etc. : Prentice Hall, Page 326.
  19. Canny, J. , A Computational Approach To Edge Detection, IEEE Trans. Pattern Analysis and Machine Intelligence, 8(6):679–698, 1986.
  20. Charles Petzold, "Programming Microsoft Windows with C#", Microsoft Press, 2002.
  21. AForge. NET Framework, URL: http://www. aforgenet. com/framework/, Retrieved October, 27, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Image Steganography Canny Edge Detection Parameterized Algorithm