Abstract
Due to the increase in the speed of the computer networks, the advantage in information communication has also increased and thus, the importance of information security cannot be overstated. The method of steganography has the purpose of making the communication hidden by wrapping the data into some other form. Many steganography formats of files are available, but still images in digital form are considered most famous due to their internet frequency. There are plenty of algorithms for data hiding but might have a compromise in quality of image. In this paper, a new technique is proposed for performing image steganography by utilizing edge detection techniques for grayscale images. In this proposed method, edges are detected by converting the image into grayscale and then, text is embedded into the digital image. Different methods like Canny, Sobel, Prewitt and Laplacian are applied here for having better secrecy and also for enhancing the stego image as well for getting correct data that was embedding.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Luo W, Huang F, Huang J (2009) A more secure steganography based on adaptive pixel-value differencing scheme. Springer Science Business Media, LLC
Johnson NF, Jajodia S (1998) Exploring steganography: seeing and unseen, 0018-9162/98/$10.00 © 1998 IEEE
Moerland T. Steganography and steganalysis. Leiden Institute of Advanced Computing Science
Lal M, Singh J (2008) A novel approach for message security using steganography. In: 3rd International conference of advance computing and communication technologies, 08-09 Nov, 2008, APIIT, Panipat, India
Xiaofeng Z, Yu Z, Ran Z (2011) Image edge detection method of combining wavelet lift with canny operator. Proc Eng 15:1335–1339
Kaur SP, Singh S. A new image steganography based on 2k correction method and Canny edge detection. Int J Comput Bus Res. ISSN: 2229-6166
Jain N, Meshram S, Dubey S (2012) Image steganography using LSB and edge-detection technique. Int J Soft Comput Eng (IJSCE) 2(3). ISSN: 2231-2307, July 2012
Alam S, Kumar V, Siddiqui WA, Ahmad M (2014) Key dependent image steganography using edge detection. In: Fourth international conference on advanced computing & communication technologies
Singh S, Agarwal G (2010) Use of image to secure text message with the help of LSB replacement. Int J Appl Eng Res 1
Setiadi DRIM, Jumanto J (2018) An enhanced LSB-image steganography using the hybrid canny-Sobel edge detection. Cybern Inf Technol 18(2):74–88. https://doi.org/10.2478/cait-2018-0029
Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. In: 2016 International conference on research advances in integrated navigation systems (RAINS), pp 1–8
Asamoah D, Oppong E, Oppong S, Danso J (2018) Measuring the performance of image contrast enhancement technique. Int J Comp Appl 181:6–13. https://doi.org/10.5120/ijca2018917899
Gaurav K, Ghanekar U (2018) Image steganography based on Canny edge detection, dilation operator and hybrid coding. J Inf Secur Appl 41:41–51. ISSN 2214-2126
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jani, N., Vasava, D., Shah, P., Swain, D., Choudhury, A. (2023). Study of Security for Edge Detection Based Image Steganography . In: Reddy, K.A., Devi, B.R., George, B., Raju, K.S., Sellathurai, M. (eds) Proceedings of Fourth International Conference on Computer and Communication Technologies. Lecture Notes in Networks and Systems, vol 606. Springer, Singapore. https://doi.org/10.1007/978-981-19-8563-8_11
Download citation
DOI: https://doi.org/10.1007/978-981-19-8563-8_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8562-1
Online ISBN: 978-981-19-8563-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)