Hybrid Edge Detection-Based Image Steganography Technique for Color Images

  • Deepali Singla
  • Mamta Juneja
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 309)


Steganography, Greek meaning covered writing, is a branch of information security which hides the existence of important information in order to prevent any unauthorized access. The number of image steganography techniques has been proposed so far to achieve the goals of steganography, i.e., high payload, less imperceptibility, and more robustness. In this paper, we are proposing a new steganography technique for colored image (i.e., RGB images). The proposed scheme has taken into consideration the property that more information can be hidden into the contrast areas rather than in the bright areas. This scheme makes the use of hybrid edge detector, i.e., combination of fuzzy and canny edge detector. After detecting edges, embedding is done accordingly. The proposed scheme achieves all the three goals of steganography appropriately.


Adaptive LSB AES Fuzzy edge detector Stego image 


  1. 1.
    Artz, D.: Digital steganography: hiding data within data. IEEE Internet Comput. J. 5(3), 75–80 (2001)CrossRefGoogle Scholar
  2. 2.
    Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36, 2875–2881 (2003)CrossRefMATHGoogle Scholar
  3. 3.
    Maroney, C.: Hide and seek 5 for windows 95, computer software and documentation, originally released in Finland and the UK Google Scholar
  4. 4.
    Hempstalk, K.: hiding behind corners: using edges in images for better steganography. In: Proceedings of the Computing Women’s Congress, 2006Google Scholar
  5. 5.
    Singh, M., Singh, B., Singh, S.S.: Hiding encrypted message in the features of images.” IJCSNS 7, 302 (2007)Google Scholar
  6. 6.
    Hossain, M., Al Haque, S., Sharmin, F.: Variable rate steganography in gray scale digital images using neighborhood pixel. In: 12th international conference Dhaka, information computers and information technology, ICCIT ‘09, 2009Google Scholar
  7. 7.
    Chen, W.J., Chang, C.C., Le, T.H.N.: High payload steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37, 3292–3301 (2010)Google Scholar
  8. 8.
    Amirtharajan, R., Bose, B., Imadabathuni, S., Bosco, J.: Security building at the line of control for image stego. Int. J. Comp. Appl. 12(5), 46–53 (2010) Google Scholar
  9. 9.
    Hussain, M., Hussain.: Embedding data in edge boundaries with high PSNR. In: Proceedings of 7th international conference on emerging technologies (ICET 2011), pp. 1–6, 2011Google Scholar
  10. 10.
    Juneja, M., Sandhu, P.S.: A new approach for information security using an improved steganography technique. J. Inf. Process Syst. 9, 405–424 (2013)Google Scholar
  11. 11.
    Specification for the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 2001Google Scholar
  12. 12.
    Canny, J.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. 8, 679–687 (1986)CrossRefGoogle Scholar
  13. 13.
    Talai Z., Talai A.: A fast edge detection using fuzzy rules. In: International conference on communication and control application, pp. 1–5, 2011Google Scholar
  14. 14.
    Kekre, H.B., Athawale, A., Halarnkar, P.N.: Performance evaluation of pixel value differencing and Kekre’s modified algorithm for information hiding in images. In: ACM international conference on advances in computing, communication and control, 2009Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Computer Science and EngineeringPanjab UniversityChandigarhIndia

Personalised recommendations