Skip to main content

Study of Security for Edge Detection Based Image Steganography 

  • Conference paper
  • First Online:
Proceedings of Fourth International Conference on Computer and Communication Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 606))

  • 223 Accesses

Abstract

Due to the increase in the speed of the computer networks, the advantage in information communication has also increased and thus, the importance of information security cannot be overstated. The method of steganography has the purpose of making the communication hidden by wrapping the data into some other form. Many steganography formats of files are available, but still images in digital form are considered most famous due to their internet frequency. There are plenty of algorithms for data hiding but might have a compromise in quality of image. In this paper, a new technique is proposed for performing image steganography by utilizing edge detection techniques for grayscale images. In this proposed method, edges are detected by converting the image into grayscale and then, text is embedded into the digital image. Different methods like Canny, Sobel, Prewitt and Laplacian are applied here for having better secrecy and also for enhancing the stego image as well for getting correct data that was embedding.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Luo W, Huang F, Huang J (2009) A more secure steganography based on adaptive pixel-value differencing scheme. Springer Science Business Media, LLC

    Google Scholar 

  2. Johnson NF, Jajodia S (1998) Exploring steganography: seeing and unseen, 0018-9162/98/$10.00 © 1998 IEEE

    Google Scholar 

  3. Moerland T. Steganography and steganalysis. Leiden Institute of Advanced Computing Science

    Google Scholar 

  4. Lal M, Singh J (2008) A novel approach for message security using steganography. In: 3rd International conference of advance computing and communication technologies, 08-09 Nov, 2008, APIIT, Panipat, India

    Google Scholar 

  5. Xiaofeng Z, Yu Z, Ran Z (2011) Image edge detection method of combining wavelet lift with canny operator. Proc Eng 15:1335–1339

    Article  Google Scholar 

  6. Kaur SP, Singh S. A new image steganography based on 2k correction method and Canny edge detection. Int J Comput Bus Res. ISSN: 2229-6166

    Google Scholar 

  7. Jain N, Meshram S, Dubey S (2012) Image steganography using LSB and edge-detection technique. Int J Soft Comput Eng (IJSCE) 2(3). ISSN: 2231-2307, July 2012

    Google Scholar 

  8. Alam S, Kumar V, Siddiqui WA, Ahmad M (2014) Key dependent image steganography using edge detection. In: Fourth international conference on advanced computing & communication technologies

    Google Scholar 

  9. Singh S, Agarwal G (2010) Use of image to secure text message with the help of LSB replacement. Int J Appl Eng Res 1

    Google Scholar 

  10. Setiadi DRIM, Jumanto J (2018) An enhanced LSB-image steganography using the hybrid canny-Sobel edge detection. Cybern Inf Technol 18(2):74–88. https://doi.org/10.2478/cait-2018-0029

  11. Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. In: 2016 International conference on research advances in integrated navigation systems (RAINS), pp 1–8

    Google Scholar 

  12. Asamoah D, Oppong E, Oppong S, Danso J (2018) Measuring the performance of image contrast enhancement technique. Int J Comp Appl 181:6–13. https://doi.org/10.5120/ijca2018917899

    Article  Google Scholar 

  13. Gaurav K, Ghanekar U (2018) Image steganography based on Canny edge detection, dilation operator and hybrid coding. J Inf Secur Appl 41:41–51. ISSN 2214-2126

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debabrata Swain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jani, N., Vasava, D., Shah, P., Swain, D., Choudhury, A. (2023). Study of Security for Edge Detection Based Image Steganography . In: Reddy, K.A., Devi, B.R., George, B., Raju, K.S., Sellathurai, M. (eds) Proceedings of Fourth International Conference on Computer and Communication Technologies. Lecture Notes in Networks and Systems, vol 606. Springer, Singapore. https://doi.org/10.1007/978-981-19-8563-8_11

Download citation

Publish with us

Policies and ethics