Skip to main content
Log in

Realization of Efficient Steganographic Scheme Using Hybrid Edge Detection and Chaos

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Information technology is playing a greater role in different spheres of life for quick operational processes. It helps in time-saving in the era of globalization by exchanging information over the internet. However, using the internet as a medium for information exchange can cause the risk of data being hacked/modified. The hackers have found illegitimate actions of cyberspace anonymity a great platform. These intruders are technically well-skilled to modify, breach and steal sensitive information. Thus, providing security to such important data is a big challenge for researchers. This paper presents novel image steganography using edge detection technique and chaotic function. The edge regions of an image have been used to hide sensitive information. These edge regions have been detected using a combination of Canny and Laplacian of Gaussian detectors. Before embedding, the important data is encrypted using coupled chaos functions (Logistic and Sine maps) to improve data security. The maps in the presented framework have been used in an alternative manner in which the output of one maps’ iteration is used as an initial key to another map. The proposed method is analyzed for quality, security, and payload. From the evaluation perspective, the proposed framework shows better results for Peak Signal to Noise Ratio of 43.97 dB, Number of Changes per Rate of 99.9998%, Unified Average Changed Intensity of 52.8914%, and Entropy value of 7.7883. The comparison of the proposed scheme shows superiority over state-of-the-art techniques, hence proving the efficacy of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Jan, A.; Parah, S.A.; Malik, B.A.; Rashid, M.: Secure data transmission in IoTs based on CLoG edge detection. Future Gener. Comput. Syst. (2021). https://doi.org/10.1016/j.future.2021.03.005

    Article  Google Scholar 

  2. Lawrence, A.: 27 April 2021. https://www.databreaches.net/reverb-discloses-data-breach-exposing-musicians-personal-info

  3. Jecica, D.: 2 April 2021. https://healthitsecurity.com/news/patient-data-from-multiple-providers-leaked-in-third-party-github-incident

  4. Protenus Breach Barometer. https://blog.protenus.com/key-takeaways-from-the-2021-breach-barometer

  5. Miri, A.; Faez, K.: An image steganography method based on integer wavelet transform. Multimed. Tools Appl. 77, 13133–13144 (2018)

    Article  Google Scholar 

  6. Sahu, A.K.; Swain, G.: Reversible image steganography using dual-layer LSB matching. Sens. Imaging 21, 1 (2020)

    Article  Google Scholar 

  7. Ghosal, S.K.; Mukhopadhyay, S.; Hossain, S.; Sarkar, R.: Exploiting Laguerre transform in image steganography. Comput. Electr. Eng. 89, 106964 (2021)

    Article  Google Scholar 

  8. Lin, J.; Qian, Z.; Wang, Z.; Zhang, X.; Feng, G.: A new steganography method for dynamic GIF images based on palette sort. Wirel. Commun. Mob. Comput. 2020, 8812087 (2020)

    Article  Google Scholar 

  9. Wang, J.; Yang, C.; Wang, P.; Song, X.; Lu, J.: Payload location for JPEG image steganography based on co-frequency sub-image filtering. Int. J. Distrib. Sens. Netw. 16(1), 256 (2020)

    Article  Google Scholar 

  10. Shen, S.Y.; Huang, L.H.: A novel adaptive data hiding based on improved EMD and interpolation. Multimed. Tools Appl. 48, 131–141 (2015)

    Google Scholar 

  11. Saidi, M.; Hermassi, H.; Rhouma, R.; Belghith, S.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimed. Tools Appl. 76(11), 13493–13510 (2017)

    Article  Google Scholar 

  12. Kumar, R.; Kim, D.S.; Jung, K.H.: Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J. Inf. Secur. Appl. 47, 94–103 (2019)

    Google Scholar 

  13. Malik, A.; Sikka, G.; Verma, H.K.: An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidim. Syst. Sign. Process. 29(4), 1801–1818 (2018)

    Article  MATH  Google Scholar 

  14. Kim, C.; Yang, C.N.; Leng, L.: High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9(4), 644 (2020)

    Article  Google Scholar 

  15. Kim, C.; Shin, D.; Leng, L.; Yang, C.N.: Lossless data hiding for absolute moment block truncation coding using histogram modification. J. Real-Time Image Proc. 14(1), 101–114 (2018)

    Article  Google Scholar 

  16. Sowmya, P.; Karuna, G.; Shalini, R.S.; Suneetha, C.H.K.: An exploiting study on image edge detection quality evaluation using various algorithms. Mater. Today Proc. (2020). https://doi.org/10.1016/j.matpr.2020.09.511

    Article  Google Scholar 

  17. Ayub, N.; Selwal, A.: An improved image steganography technique using edge based data hiding in DCT domain. J. Int. Math. 23(2), 357–366 (2020)

    Google Scholar 

  18. Ghosal, S.K.; Mandal, J.K.; Sarkar, R.: High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multimed. Tools Appl. 77, 30403–30418 (2018)

    Article  Google Scholar 

  19. Banik, B.G.; Bandyopadhyay, S.M.: An image steganography method on edge detection using multiple LSB modification technique. J. Basic Appl. Res. Int. 9(2), 75–80 (2015)

    Google Scholar 

  20. Parah, S.A.; Kaw, J.A.; Bellavista, P.; Loan, N.A.; Bhat, G.M.; Muhammad, K.; Victor, A.: Efficient security and authentication for edge-based Internet of Medical Things. IEEE Trans. Internet Things J. (2021). https://doi.org/10.1109/JIOT.2020.3038009

    Article  Google Scholar 

  21. Ghosal, S.K.; Chatterjee, A.; Sarkar, R.: Image steganography based on Kirsch edge detection. Multimed. Syst. 27, 73–87 (2021)

    Article  Google Scholar 

  22. Prasad, S.; Pal, A.K.: Stego-key-based image steganography scheme using edge detector and modulus function. Int. J. Comput. Vis. Robot. 10(3), 223–240 (2020)

    Article  Google Scholar 

  23. Garav, K.; Ghanekar, U.: Image steganography algorithm based on edge region detection and hybrid coding. Comput. Model. Technol. 22(1), 40–56 (2018)

    Google Scholar 

  24. Dhargupta, S.; Chakraborty, A.; Ghosal, S.K.; Saha, S.; Sarkar, R.: Fuzzy edge detection based steganography using modified Gaussian distribution. Multimed. Tools Appl. 25, 1548 (2019)

    Google Scholar 

  25. Sajedi, H.; Yaghobi, S.R.: Information hiding methods for E-Healthcare. Smart Health 15, 100104 (2020)

    Article  Google Scholar 

  26. Bhagat, D.; Bhardwaj, R.: A survey on medical images for reversible data hiding techniques. IEEE Trans. (2019)

  27. Asanbe, M.O.: Hybrid data security: a review of cryptography and steganography techniques. Villanova J. Sci. Technol. Manag. 2(1), 1547 (2020)

    Google Scholar 

  28. Kaur, R.; Singh, B.: A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map. Multimed. Tools Appl. (2021)

  29. Delmi, A.; Suryadi, S.; Satria, Y.: Digital image steganography by using edge adaptive based chaos cryptography. J. Phys: Conf. Ser. 1442, 012041 (2017)

    Google Scholar 

  30. Eyssa, A.A.; Abdelsamie, F.E.; Abdelnaiem, A.E.: An efficient image steganography approach over wireless communication system. Wirel. Pers. Commun. 110, 321–337 (2020)

    Article  Google Scholar 

  31. Jan, A.; Parah, S.A.; Malik, B.A.: A novel Laplacian of Gaussian and chaotic encryption based image steganography technique. In: 2020 international conference for emerging technology (INCET), Belgaum, 1–4 (2020). https://doi.org/10.1109/INCET49848.2020.9154173

  32. Jan, A.; Parah, S.A.; Malik, B.A.: Logistic map-based image steganography using edge detection. Adv. Intell. Syst. Comput. (2021). https://doi.org/10.1007/978-981-15-6067-5_50

    Article  Google Scholar 

  33. Parah, S.A.; Sheikh, J.A.; Akhoon, J.A.; Loan, N.A.: Electronic health record hiding in images for smart city applications: a computationally efficient and reversible information hiding technique for secure communication. Futur. Gener. Comput. Syst. (2018). https://doi.org/10.1016/j.future.2018.02.023

    Article  Google Scholar 

  34. Khan, M.F.; Ahmed, A.; Saleem, K.: A novel cryptographic substitution box design using Gaussian distribution. IEEE Access 7, 15999–16007 (2019)

    Article  Google Scholar 

  35. Parah, S.A.; Bhat, G.M.; Sheikh, J.A.: A secure and efficient data hiding technique based on pixel adjustment. Am. J. Eng. Technol. Res. 14(2), 38–44 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jan, A., Parah, S.A., Hassan, M. et al. Realization of Efficient Steganographic Scheme Using Hybrid Edge Detection and Chaos. Arab J Sci Eng 48, 1859–1872 (2023). https://doi.org/10.1007/s13369-022-06960-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-022-06960-w

Keywords

Navigation