CFP last date
20 December 2024
Reseach Article

A Novel Edge Based Image Steganography with Enhanced Visual and Statistical Security

Published on None 2011 by Remya Unnikrishnan, S. Benson Edwin Raj, Iwin Thanakumar Joseph
journal_cover_thumbnail
International Conference on VLSI, Communication & Instrumentation
Foundation of Computer Science USA
ICVCI - Number 14
None 2011
Authors: Remya Unnikrishnan, S. Benson Edwin Raj, Iwin Thanakumar Joseph
c0fd4275-1d44-49ca-a6e0-1d5f32d72ca3

Remya Unnikrishnan, S. Benson Edwin Raj, Iwin Thanakumar Joseph . A Novel Edge Based Image Steganography with Enhanced Visual and Statistical Security. International Conference on VLSI, Communication & Instrumentation. ICVCI, 14 (None 2011), 1-5.

@article{
author = { Remya Unnikrishnan, S. Benson Edwin Raj, Iwin Thanakumar Joseph },
title = { A Novel Edge Based Image Steganography with Enhanced Visual and Statistical Security },
journal = { International Conference on VLSI, Communication & Instrumentation },
issue_date = { None 2011 },
volume = { ICVCI },
number = { 14 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icvci/number14/2730-1517/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on VLSI, Communication & Instrumentation
%A Remya Unnikrishnan
%A S. Benson Edwin Raj
%A Iwin Thanakumar Joseph
%T A Novel Edge Based Image Steganography with Enhanced Visual and Statistical Security
%J International Conference on VLSI, Communication & Instrumentation
%@ 0975-8887
%V ICVCI
%N 14
%P 1-5
%D 2011
%I International Journal of Computer Applications
Abstract

Steganography is the science that involves communicating the secret data in an appropriate multimedia carrier e.g. image, audio and video files. Edge Based Steganography is in which only the sharper edge regions are used for hiding the message while keeping the other smoother regions as they are. It is more difficult to observe changes at the sharper edges than those in smoother regions. In this paper we have proposed a novel architecture using Enhanced Least Significant Bit algorithm which can reduce the rate of pixel modification thereby increasing the security both visually and statistically.

References
  1. K. Hempstalk, “Hiding behind corners: Using edges in images for better steganography,” Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006.
  2. K. M. Singh, L. S. Singh, A. B. Singh, and K. S. Devi, “Hiding secret message in edges of the image,” in Proc. Int. Conf. Information and Communication Technology, pp. 238–241, Mar. 2007.
  3. C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488–497, Sep. 2008.
  4. Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang, “ High quality steganographic method with pixel-value differencing and modulus function,” Science Direct The Journal of Systems and Software, 24 January 2007.
  5. Weiqi Luo, Fangjun Huang, and Jiwu Huang, “Edge adaptive image steganography based on LSB matching revisited,” in IEEE Transactions on Information Forensics and Security, vol.5, no.2, June 2010
  6. J. Mielikainen, “LSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.
  7. D. Wu and W. Tsai, “A steganographic method for images by pixel value differencing,” Pattern Recognit. Lett., vol. 24, pp. 1613–1626, 2003.
  8. Dumitrescu.S, Xiaolin Wu, Zhe Wang “Detection of LSB Steganography via Sample Pair Analysis,” IEEE Transactions on Signal Processing, vol. 51, issue 7, pp. 1995-2007
  9. X. Li, T. Zeng, and B. Yang, “Detecting LSB matching by applying calibration technique for difference image,” in Proc. 10th ACM Workshop on Multimedia and Security, Oxford, U.K, pp. 133–138, 2008.
  10. Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, and Ki-Ryong Kwon, An Image Steganography Using Pixel Characteristics Y. Hao et al. (Eds.): CIS 2005, Part II, Springer-Verlag Berlin Heidelberg LNAI 3802, (2005) 581– 588.
  11. X. Zhang and S. Wang, “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett., vol. 25, pp. 331–339, 2004.
  12. A. D. Ker, “A general framework for structural steganalysis of LSB replacement,” in Proc. 7th Int. Workshop on Information Hiding, 2005,vol. 3427, pp. 296–311.
  13. J. Harmsen and W. Pearlman, “Steganalysis of additive-noise modelable information hiding,” Proc. SPIE Electronic Imaging, vol. 5020, pp. 131–142, 2003.
  14. J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimedia, vol. 8, no. 4, pp.22–28, Oct. 2001.
  15. A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems,”in Proc. 3rd Int. Workshop on Information Hiding, 1999, vol. 1768, pp.61–76.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Pixel-value differencing (PVD) Least significant bit based steganography (LSB)