Skip to main content
Log in

A novel approach of steganography by using strong edge detection and chaos theory

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The growth of the Internet and rapid development of digital devices and network technology led to increase the risks and threats of attackers, therefore the important data that is sent via the Internet must be preserved, one of the most substantial security methods utilized to protect this data is steganography, so this technology must be developed and strengthened in order to face the modern technologies used by the attackers. The aim of this paper is to preserve the data sent via internet by proposing a new method that treats to solve the gaps and weakness of previous methods. Since the edge region of the image is more permissive of alteration, therefore is more convenient for concealing secret information. A novel schema of concealing secret information is suggested by creating new algorithm in the name of strong edges detection algorithm (SEDA) to detect strong edges of the image and using chaotic mapping method to generate random numbers. This schema consist of five stages, where in the first stage the canny algorithm is utilized to reveal edges of the carrier media and store it in the new array called (na1), secondly, the SEDA is used to identified strong edges of the (na1) and the results is stored in the new array called (na2) as the strong edges are utilized to conceal mystery information. Thirdly, chirikov map method are using to generate random keys, where these keys are used to choose the locations in the (na2) and which are used to hide secret information. In the fourth stage, the important data is hidden in the chosen pixel locations. The extraction of important information carry out in the fifth stage, which is the opposite of concealing stage. The results proved that the proposed system increase security, robustness, payload capacity, efficiency and maintaining stego image’s quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Al-Husainy MA (2009) Image steganography by mapping pixels to letters. J Comput Sci 5:33

    Article  Google Scholar 

  2. Al-Nofaie S, Gutub A, Al-Ghamdi M (2019) Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ Comput Inf Sci 1–12. https://doi.org/10.1016/j.jksuci.2019.06.010

  3. Al-shatnawi A (1996) A new method in image steganography with improved image quality. Appl Math Sci 6(79):3907–3915

  4. ALabaichi A, Ali MA, Al-Dabbas K, Salih A (2020) Image steganography using least significant bit and secret map techniques. Int J Electr Comput Eng (IJECE) 10(1):935- 946, ISSN: 2088–8708. https://doi.org/10.11591/ijece.v10i1.pp935-946

  5. Bai J, Chang C-C, Nguyen T-S, Zhu C, Liu Y (2017) A high payload steganographic algorithm based on edge detection. Displays 46:42-51. https://doi.org/10.1016/j.displa.2016.12.004

  6. Bender W, Gruhl D, Morimoto N, Lu A (2012) Techniques for data hiding. IBM Syst J 35:313–336

  7. Chang CC, Nguyen TS, Lin CC (2014) Reversible image hiding for high image quality based on histogram shifting and local complexity,. Int Natl J Netw Secur 16(3):201–213

    Google Scholar 

  8. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752

    Article  Google Scholar 

  9. Gaurav K, Ghanekar U (2018) Image steganography based on Canny edge detection, dilation operator and hybrid coding. J Inf Secur Appl 41:41–51. https://doi.org/10.1016/j.jisa.2018.05.001

  10. Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Res 10:6. https://doi.org/10.1007/s13319-019-0216-0

    Article  Google Scholar 

  11. Hashim M, Rahim M (2017) Image steganography based on odd/even pixels distribution scheme and two parameters random function. J Theor Appl Inf Technol 95(22):5977–5986

    Google Scholar 

  12. Islam S, Modi MR, Gupta P (2014)Edge-based image steganography. EURASIP J Inf Secur: 1-14. http://jis.eurasipjournals.com/content/2014/1/8

  13. Kalra M, Singh P (2014) EMD techniques of image steganography a comparative study. Int J Technol Explor Learn 3(2). https://issuu.com/ijtel/docs/385-390crp0302p26

  14. Mishra -M, Routray AR, Kumar S (2014) “High security image steganography with modified Arnold cat map”, arXiv preprint arXiv: 1408.3838,

  15. Morkel T, Olivier M, Africa S (2005) An overview of image steganography. In: Proceedings of the ISSA New Knowledge Today Conference. Sandton, South Africa, pp 1–11

  16. Permella AJ, Jayanthi D, Arun N, Maheshwari KG (2019) Implementation of Xor and Edge Identification Method in Steganography. Int J Eng Adv Technol (IJEAT) 8(6S3). ISSN:2249–8958

  17. Saha S, Ghosal S, Chakraborty A, Dhargupta S, Sarkar R, Mandal J (2018) Improved exploiting modification direction-based steganography using dynamic weightage array. Electron Lett 54(8):498–500. https://doi.org/10.1049/el2017.3336

  18. Sethi N, Vijay S (2013) A hybrid cryptosystem for image using chaotic mapping. Int J Comput Sci Bus Inform 5(1):1–10, ISSN: 1694–2108

  19. Setiadi DRIM (2019) Payload enhancement on least significant bit image steganography using edge area dilation. Intl J Electron Telecommun 65:295–300. https://doi.org/10.24425/ijet.2019.126313

    Article  Google Scholar 

  20. Setiadi DRIM (2019) Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J King Saud Univ – Comput Inform Sci :1–11. https://doi.org/10.1016/j.jksuci.2019.12.007

  21. Setiadi DRIM, Jumanto J (2018) An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection. Cybern Inf Technol 18:74–88

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar Younis Abdulhammed.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdulhammed, O.Y. A novel approach of steganography by using strong edge detection and chaos theory. Multimed Tools Appl 81, 17875–17888 (2022). https://doi.org/10.1007/s11042-022-12643-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12643-3

Keywords

Navigation