We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A Novel Approach for Data Hiding using LSB on Edges of a Gray Scale Cover Images

by Krishna Nand Chaturvedi, Amit Doeger
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 7
Year of Publication: 2014
Authors: Krishna Nand Chaturvedi, Amit Doeger
10.5120/15000-3079

Krishna Nand Chaturvedi, Amit Doeger . A Novel Approach for Data Hiding using LSB on Edges of a Gray Scale Cover Images. International Journal of Computer Applications. 86, 7 ( January 2014), 36-40. DOI=10.5120/15000-3079

@article{ 10.5120/15000-3079,
author = { Krishna Nand Chaturvedi, Amit Doeger },
title = { A Novel Approach for Data Hiding using LSB on Edges of a Gray Scale Cover Images },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 7 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number7/15000-3079/ },
doi = { 10.5120/15000-3079 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:37.636255+05:30
%A Krishna Nand Chaturvedi
%A Amit Doeger
%T A Novel Approach for Data Hiding using LSB on Edges of a Gray Scale Cover Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 7
%P 36-40
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

At present, there are many data security mechanisms available in the information security horizon. Many of them mostly emphasize how to make an algorithm that is computationally hard decipher by a cryptanalysis attack. However, in day to day life computational power is increasing in the digital world. So recent trend in the data security paradigm is changing from one layer security to two-layer security first layer is called cryptography, which secured against cryptanalysis and second layer is steganography that prevents, as much as possible, against any suspicion of the hidden text. In this approach, firstly, it is required to extract all the three-color components of a digital image then to find the edges of each component. Since intensity values of edge pixels differ abruptly in comparison to nearest neighbor pixels, it will not arouse suspicion if the intensity values of these pixels are changed. Thus, embedding of the higher-order bits in the edge pixels is possible as compared to the lower-order bits in the non-edge pixels. Thus finally this work is more contributive towards the goal of increasing the embedding rate and strength against steganalysis attack in the edge based steganography.

References
  1. W. Luo, F. Huang, and J. Huang, "Edge adaptive image steganography based on LSB matching revisited," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 201–214, 2010.
  2. R. Chandramouli and N. Memon, "Analysis of LSB based Image Steganography", IEEE ICIP, pp. 1022-1022, Oct. 2001.
  3. R. J. Anderson, F. A. P. Petitcolas, "On The Limits of Steganography", IEEE Journal of Selected Area in Communications, pp. 474-481, May 1998.
  4. N. F. Johnson, S. Jajodia, "Staganalysis: The Investigation of Hiding Information", IEEE, pp. 113-116, 1998.
  5. K. Rabah, "Steganography- the Art of Hiding Data", Information Technology of Journal 3(3), pp. 245-269, 2004.
  6. N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen", Computer 31, pp. 26-34, 1998.
  7. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information Hiding - A Survey", IEEE Proc. , Special Issue on Protection of Multimedia Content, 87(7), pp. 1062-1078, July 1999.
  8. D. Artz, "Digital Steganography: Hiding Data within Data", IEEE Internet Computing, pp. 75-80, May-Jun 2001.
  9. K. Maney, "Bin Laden's Messages could be Hiding in Plain Sight", USA Today 19 December, 2001.
  10. N. Provos, P. Honeyman, "Detecting Steganography Content on the Internet". CITI Technical Report 01-11, Oct-09, 2001.
  11. N. Provos, "Probabilistic Methods for Improving Information Hiding", CITI Technical Report 01-1, January 31, 2001.
  12. N. F. Johnson & S. Jajodia, "Steganalysis of Images Created Using Current Steganography Software", In Proceeding for the Second Information Hiding Workshop, Portland 0 region, USA, April 1998, pp. 273-289.
  13. S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB Steganography via Sample Pair Analysis", IEEE transactions on signal processing, vo1. 51, no. 7, Ju1. 2003.
  14. Andrew D. Ker, "Steganalysis of LSB Matching in Gray scale Images" , IEEE signal processing letters, vol. 12, no. 6, pp. 441-444, Jun. 2005.
  15. Qinhua Huang and Weimin Ouyang, "Protect Fragile Regions in Steganography LSB Embedding", 3rd International Symposium on Knowledge Acquisition and Modelling, 2010.
  16. Andrew D. Ker, "A General Framework for Structural Steganalysis of LSB Replacement", in Proc. 7th Int. Workshop on Information Hiding, 2005, vo1. 3427, pp. 296-311.
  17. Adel Almohammad and Gheorghita Ghinea, "Image Steganography and Chrominance Components", 10th IEEE International Conference on Computer and Information Technology, 2010.
  18. Jarno Mielikainen, "LSB Matching Revisited", IEEE signal processing letters, vol. 13, no. 5, May 2006.
  19. Xinpeng Zhang and Shuozhong Wang, "Steganography Using Multiple Base Notational System and Human Vision Sensitivity", IEEE signal processing letters, vol. 12, no. 1, Jan. 2005.
  20. Ying Wang, Student Member, IEEE, and Pierre Moulin, Fellow, IEEE, "Optimized Feature Extraction for Learning-Based Image Steganalysis" IEEE transactions on information forensics and security, vol. 2, no. 1, Mar. 2007.
  21. S. R. Khosravirad, T. Eghlidos and S. Ghaemmaghami, "Closure of sets: a statistically hypersensitive system for steganalysis of least significant bit embedding", IET Signal Process, vol. 5, Iss. 4, pp. 379–389, 2011.
  22. K. Naveen Brahma Teja, Dr. G. L. Madhumati and K. Rama Koteswara Rao, "Data Hiding Using EDGE Based Steganography", International Journal of Emerging Technology and Advanced Engineering, vol. 2, Issue 11, Nov. 2012.
  23. Rafael C. Gonzalez and Richard E. Woods, "Digital Image Processing Using MATLAB", Third Edition.
  24. http://www. sarc-wv. com/about_steganography
Index Terms

Computer Science
Information Sciences

Keywords

LSB EG-LSB Data hiding Steganography Edge extraction Canny Edge Detector etc…