High payload steganography mechanism using hybrid edge detector

被引:131
作者
Chen, Wen-Jan [1 ]
Chang, Chin-Chen [2 ,3 ]
Le, T. Hoang Ngan [4 ]
机构
[1] Da Yeh Univ, Dept Comp Sci & Informat Engn, Dacun 51591, Changhua, Taiwan
[2] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
[3] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
[4] Nat Sci Univ, Dept Comp Sci, Ho Chi Minh City, Vietnam
关键词
LSB steganography; Stego-image; Image steganalysis; Hybrid edge detection; IMAGES;
D O I
10.1016/j.eswa.2009.09.050
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the art and science of hiding data into information. The secret message is hidden in such a way that no one can apart from the sender or the intended recipient. The least significant bit (LSB) substitution mechanism is the most common steganographic technique for embedding a secret message in an image with high capacity, while the human visual system (HVS) would be unable to notice the hidden message in the cover image. in this paper, besides employing the LSB substitution technique as a fundamental stage, we take advantage of edge detection technique. The experimental results show that the proposed scheme not only achieves high embedding capacity but also enhances the quality of the stego image from the HVS by an edge detection technique. Moreover, based on that the secret message is replaced with different LSBs, our scheme can effectively resist the image steganalysis. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3292 / 3301
页数:10
相关论文
共 18 条
[1]   Improving BTC image compression using a fuzzy complement edge operator [J].
Amarunnishad, T. M. ;
Govindan, V. K. ;
Mathew, Abraham T. .
SIGNAL PROCESSING, 2008, 88 (12) :2989-2997
[2]  
[Anonymous], 1995, Machine vision
[3]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[4]  
BOHME R, 2004, P MULT SEC WORKSH, V1, P25
[5]  
Farid H, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P905
[6]   Quantitative steganalysis of digital images: estimating the secret message length [J].
Fridrich, J ;
Goljan, M ;
Hogea, D ;
Soukal, D .
MULTIMEDIA SYSTEMS, 2003, 9 (03) :288-302
[7]   Detecting LSB steganography in color and gray-scale images [J].
Fridrich, J. ;
Goljan, M. ;
Du, R. .
IEEE Multimedia, 2001, 8 (04) :22-28
[8]   Practical steganalysis of digital images - State of the art [J].
Fridrich, J ;
Goljan, M .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :1-13
[9]  
Johnson N.F., 2001, Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures, V1
[10]  
Kuo YH, 1997, PROCEEDINGS OF THE SIXTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS I - III, P1069, DOI 10.1109/FUZZY.1997.622858