Abstract
The growth of the Internet and rapid development of digital devices and network technology led to increase the risks and threats of attackers, therefore the important data that is sent via the Internet must be preserved, one of the most substantial security methods utilized to protect this data is steganography, so this technology must be developed and strengthened in order to face the modern technologies used by the attackers. The aim of this paper is to preserve the data sent via internet by proposing a new method that treats to solve the gaps and weakness of previous methods. Since the edge region of the image is more permissive of alteration, therefore is more convenient for concealing secret information. A novel schema of concealing secret information is suggested by creating new algorithm in the name of strong edges detection algorithm (SEDA) to detect strong edges of the image and using chaotic mapping method to generate random numbers. This schema consist of five stages, where in the first stage the canny algorithm is utilized to reveal edges of the carrier media and store it in the new array called (na1), secondly, the SEDA is used to identified strong edges of the (na1) and the results is stored in the new array called (na2) as the strong edges are utilized to conceal mystery information. Thirdly, chirikov map method are using to generate random keys, where these keys are used to choose the locations in the (na2) and which are used to hide secret information. In the fourth stage, the important data is hidden in the chosen pixel locations. The extraction of important information carry out in the fifth stage, which is the opposite of concealing stage. The results proved that the proposed system increase security, robustness, payload capacity, efficiency and maintaining stego image’s quality.
Similar content being viewed by others
References
Al-Husainy MA (2009) Image steganography by mapping pixels to letters. J Comput Sci 5:33
Al-Nofaie S, Gutub A, Al-Ghamdi M (2019) Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ Comput Inf Sci 1–12. https://doi.org/10.1016/j.jksuci.2019.06.010
Al-shatnawi A (1996) A new method in image steganography with improved image quality. Appl Math Sci 6(79):3907–3915
ALabaichi A, Ali MA, Al-Dabbas K, Salih A (2020) Image steganography using least significant bit and secret map techniques. Int J Electr Comput Eng (IJECE) 10(1):935- 946, ISSN: 2088–8708. https://doi.org/10.11591/ijece.v10i1.pp935-946
Bai J, Chang C-C, Nguyen T-S, Zhu C, Liu Y (2017) A high payload steganographic algorithm based on edge detection. Displays 46:42-51. https://doi.org/10.1016/j.displa.2016.12.004
Bender W, Gruhl D, Morimoto N, Lu A (2012) Techniques for data hiding. IBM Syst J 35:313–336
Chang CC, Nguyen TS, Lin CC (2014) Reversible image hiding for high image quality based on histogram shifting and local complexity,. Int Natl J Netw Secur 16(3):201–213
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752
Gaurav K, Ghanekar U (2018) Image steganography based on Canny edge detection, dilation operator and hybrid coding. J Inf Secur Appl 41:41–51. https://doi.org/10.1016/j.jisa.2018.05.001
Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Res 10:6. https://doi.org/10.1007/s13319-019-0216-0
Hashim M, Rahim M (2017) Image steganography based on odd/even pixels distribution scheme and two parameters random function. J Theor Appl Inf Technol 95(22):5977–5986
Islam S, Modi MR, Gupta P (2014)Edge-based image steganography. EURASIP J Inf Secur: 1-14. http://jis.eurasipjournals.com/content/2014/1/8
Kalra M, Singh P (2014) EMD techniques of image steganography a comparative study. Int J Technol Explor Learn 3(2). https://issuu.com/ijtel/docs/385-390crp0302p26
Mishra -M, Routray AR, Kumar S (2014) “High security image steganography with modified Arnold cat map”, arXiv preprint arXiv: 1408.3838,
Morkel T, Olivier M, Africa S (2005) An overview of image steganography. In: Proceedings of the ISSA New Knowledge Today Conference. Sandton, South Africa, pp 1–11
Permella AJ, Jayanthi D, Arun N, Maheshwari KG (2019) Implementation of Xor and Edge Identification Method in Steganography. Int J Eng Adv Technol (IJEAT) 8(6S3). ISSN:2249–8958
Saha S, Ghosal S, Chakraborty A, Dhargupta S, Sarkar R, Mandal J (2018) Improved exploiting modification direction-based steganography using dynamic weightage array. Electron Lett 54(8):498–500. https://doi.org/10.1049/el2017.3336
Sethi N, Vijay S (2013) A hybrid cryptosystem for image using chaotic mapping. Int J Comput Sci Bus Inform 5(1):1–10, ISSN: 1694–2108
Setiadi DRIM (2019) Payload enhancement on least significant bit image steganography using edge area dilation. Intl J Electron Telecommun 65:295–300. https://doi.org/10.24425/ijet.2019.126313
Setiadi DRIM (2019) Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J King Saud Univ – Comput Inform Sci :1–11. https://doi.org/10.1016/j.jksuci.2019.12.007
Setiadi DRIM, Jumanto J (2018) An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection. Cybern Inf Technol 18:74–88
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Abdulhammed, O.Y. A novel approach of steganography by using strong edge detection and chaos theory. Multimed Tools Appl 81, 17875–17888 (2022). https://doi.org/10.1007/s11042-022-12643-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12643-3