Skip to main content
Log in

Image steganography based on Kirsch edge detection

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Conventional steganography methods fabricate the secret information into the cover pixels without analyzing the pixel intensities of an image. As a result, some minor pixel level manipulations may lead to huge visual distortion in the stego-image. To this end, in this paper, a novel steganographic scheme based on Kirsch edge detector is proposed. The aim of the scheme is to maximize the payload by embedding more secret bits into edge pixels and fewer bits into the non-edge pixels. The proposed scheme has three major phases: construction of edge image, embedding and extraction. The first phase deals with the construction of masked image from the cover image, and in turn, edge image from the masked one. The second phase deals with the decomposition of the cover image into a set of triplet of pixels and then embedding of (x + y + 1) bits of secret data into each triplet of pixels to obtain the stego-image. Here, ‘x’ and ‘y’ are not fixed as the edge information of each triplet changes incessantly. The third or last phase deals with the extraction of the secret information from the stego-image using the reverse process. Simulation results on some standard images ensure that the proposed method achieves higher payload and better image quality compared to the conventional steganographic schemes. Furthermore, the Kirsch edge detector is able to produce more number of edge pixels compared to the traditional edge detectors; and, hence the proposed scheme also outperforms the existing edge-based methods in terms of payload.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Yan, C., Shao, B., Yuxuan, W., Yue, G.: Deep multi-view enhancement hashing for image retrieval. IEEE Trans Pattern Anal Mach Intell (2020). https://doi.org/10.1109/TPAMI.2020.2975798

    Article  Google Scholar 

  2. Yan, C., Shao, B., Zhao, H., Ning, R., Zhang, Y., Feng, X.: 3D room layout estimation from a single RGB image. IEEE Trans Multimed (2020). https://doi.org/10.1109/TMM.2020.2967645

    Article  Google Scholar 

  3. Yan, C., Li, Z., Zhang, Y., Liu, Y., Ji, X., Zhang,Y.: Depth image denoising using nuclear norm and learning graph model. ACM Trans. Multimed. Comput. Commun. Appl. (2020). https://arxiv.org/pdf/2008.03741.pdf

  4. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst J 35(3–4), 313–336 (1996)

    Article  Google Scholar 

  5. Wu, D.-C., Tsai, W.-H.: A Steganographic method for images by pixel-value differencing. Pattern Recogn Lett. 24(9–10), 1613–1626 (2003)

    Article  Google Scholar 

  6. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 1–3 (2006)

    Article  MathSciNet  Google Scholar 

  7. Lee C. F., Wang Y. R., Chang C. C.: A Steganographic method with high embedding capacity by improving exploiting modification direction. Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Vol. 1, pp. 497–500 (2007).

  8. Shen, S.-Y., Huang, L.-H.: A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput. Secur. 48, 131–141 (2015)

    Article  Google Scholar 

  9. Shen, S.-Y., Huang, L.-H., Wu, S.-S.: A novel adaptive data hiding based on improved EMD and interpolation. Multimed. Tools Appl. (2017). https://doi.org/10.1007/s11042-017-4905-5,pp.1-17

    Article  Google Scholar 

  10. Mukherjee, S., Sanyal, G.: A multi level image steganography methodology based on adaptive PMS and block based pixel swapping. Multimed. Tools Appl. 78, 17607–17622 (2019). https://doi.org/10.1007/s11042-018-7127-6

    Article  Google Scholar 

  11. Abdulla, A.A., Sellahewa, H., Jassim, S.A.: Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed. Tools Appl. 78, 17799–17823 (2019). https://doi.org/10.1007/s11042-019-7166-7

    Article  Google Scholar 

  12. Chatterjee, A., Ghosal, S.K., Sarkar, R.: LSB based steganography with OCR: an intelligent amalgamation. Multimed. Tools Appl. 79, 11747–11765 (2020). https://doi.org/10.1007/s11042-019-08472-6

    Article  Google Scholar 

  13. Mohamed, N., Baziyad, M., Rabie, T., et al.: L*a*b* color space high capacity steganography utilizing quad-trees. Multimed Tools Appl 79, 25089–25113 (2020). https://doi.org/10.1007/s11042-020-09129-5

    Article  Google Scholar 

  14. Chen, W.J., Chang, C.C., Le, T.H.N.: High payload Steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37, 3292–3301 (2010)

    Article  Google Scholar 

  15. Tseng, H.W., Leng, H.S.: High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process. 8, 647–654 (2014)

    Article  Google Scholar 

  16. Bai, J., Chang, C.-C., Nguyen, T.-S., Zhu, C., Liu, Y.: A high payload steganographic algorithm based on edge detection. Displays 46, 42–51 (2017). https://doi.org/10.1016/j.displa.2016.12.004

    Article  Google Scholar 

  17. Atta, R., Ghanbari, M.: A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set, journal of visual communication & image representation. Elsevier (2018). https://doi.org/10.1016/j.jvcir.2018.03.009

    Article  Google Scholar 

  18. Gaurav, K., Ghanekar, U.: Image steganography based on Canny edge detection, dilation operator and hybrid coding. J. Inf. Secur. Appl. 41, 41–51 (2018). https://doi.org/10.1016/j.jisa.2018.05.001

    Article  Google Scholar 

  19. Ghosal, S.K., Mandal, J.K., Sarkar, R.: High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multimed. Tools Appl. 77, 30403–30418 (2018). https://doi.org/10.1007/s11042-018-6126-y

    Article  Google Scholar 

  20. Setiadi, D.R.I.M.: Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J. King Saud Univ Comput Inf Sci (2019). https://doi.org/10.1016/j.jksuci.2019.12.007

    Article  Google Scholar 

  21. Kumar, S., Singh, A., Kumar, M.: Information hiding with adaptive steganography based on novel fuzzy edge identification. Defence Technol. 15(2), 162–169 (2019). https://doi.org/10.1016/j.dt.2018.08.003

    Article  Google Scholar 

  22. Kirsch, R.: Computer determination of the constituent structure of biological images. Comput. Biomed. Res. 4, 315–328 (1971)

    Article  Google Scholar 

  23. Weber A. G., The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. https://sipi.usc.edu/database/. Accessed 11 Jul 2019.

  24. Boehm, B.: Stegexpose-A tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656 (2014).

  25. Dumitrescu, S., Xiaolin, W., Nasir M.: On steganalysis of random LSB embedding in continuous-tone images. Proceedings. International Conference on Image Processing. Vol. 3. IEEE (2002).

  26. Fridrich, J., Goljan, M., Dui, R.: Reliable detection of LSB steganography in color and grayscale images. Proceedings of the ACM Workshop on Multimedia and Security, pp. 27–30 (2001).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudipta Kumar Ghosal.

Additional information

Communicated by Y. Zhang.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ghosal, S.K., Chatterjee, A. & Sarkar, R. Image steganography based on Kirsch edge detection. Multimedia Systems 27, 73–87 (2021). https://doi.org/10.1007/s00530-020-00703-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-020-00703-3

Keywords

Navigation