Skip to main content
Log in

Image steganography using deep learning based edge detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper introduces a deep learning-based Steganography method for hiding secret information within the cover image. For this, we use a convolutional neural network (CNN) with Deep Supervision based edge detector, which can retain more edge pixels over conventional edge detection algorithms. Initially, the cover image is pre-processed by masking the last 5-bits of each pixel. The said edge detector model is then applied to obtain a gray-scale edge map. To get the prominent edge information, the gray-scale edge map is converted into a binary version using both global and adaptive binarization schemes. The purpose of using different binarization techniques is to prove the less sensitive nature of the edge detection method to the thresholding approaches. Our rule for embedding secret bits within the cover image is as follows: more bits into the edge pixels while fewer bits into the non-edge pixels. Experimental outcomes on various standard images confirm that compared to state-of-the-art methods, the proposed method achieves a higher payload.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD dissertation, Dept. of applied computing, Buckingham Univ., Buckingham, UK. http://bear.buckingham.ac.uk/149/

  2. Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on Bitplane indexes. IEEE International Symposium on Multimedia 2013:287–291

  3. Abdulla AA, Jassim SA, Sellahewa H (2013) Efficient high capacity steganography technique, Proceedings of SPIE - The International Society for Optical Engineering.

  4. Akhtar N, Ahamad V, and Javed H (2017) A compressed LSB steganography method. IEEE. Ghaziabad, India.

  5. Bhattacharyya D, Kim T (2011) Image data hiding technique using discrete Fourier transformation. Ubiquitous computing and multimedia applications: second international conference, UCMA 2011. Daejeon, Korea

  6. Boehm B (2014) StegExpose - a tool for detecting LSB steganography. Multimedia, Cryptography and Security:1–11

  7. Boroumand M, Chen M, Fridrich J (2018) Deep residual network for Steganalysis of digital images. IEEE Transactions on Information and security 14:1181–1193

    Article  Google Scholar 

  8. Chandwadkar R, Dhole SP. (2013) Comparison of Edge Detection Techniques. 6th Annual Conference of IRAJ

  9. Chen W-J, Chang C-C, Chang C-C (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292–3301

    Article  Google Scholar 

  10. Dhargupta S, Chakraborty A, Ghosal SK, Saha S, Sarkar R (2019) Fuzzy edge detection based steganography using modified Gaussian distribution. Multimed Tools Appl 78(4):17589–17606

    Article  Google Scholar 

  11. Dube RR, Lalkot MA (2016) Improved edge based steganography scheme for GrayScale images in spatial domain. International Journal of Science and Research (IJSR) 5(6):1976–1978

    Article  Google Scholar 

  12. Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. Proceedings of International Conference on Image Processing, IEEE 3:641–644

    Article  Google Scholar 

  13. Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51:1995–2007

    Article  Google Scholar 

  14. El-Sayed MA, Estaitia YA, Khafagy MA (2013) Edge detection using convolutional neural network. Int J Adv Comput Sci Appl 4(10):11–17

    Google Scholar 

  15. Ghosal S, Mandal JK, Sarkar R (2018) High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multimed Tools Appl 77(3–4):30403–30418

    Article  Google Scholar 

  16. Ghosal S, Mukhopadhyay S, Hossain S, Sarkar R (2020) Application of Lah transform for security and privacy of data through information hiding in telecommunication. Transactions on Emerging Telecommunications Technologies

  17. Ghosal SK, Chatterjee A, Sarkar R (2020) Image steganography based on kirsch edge detection. In: Multimedia Systems. Springer

    Google Scholar 

  18. Ghosal S, Mukhopadhyay S, Hossain S, Sarkar R (2021) Exploiting Laguerre transform in image steganography. Computers & Electrical Engineering 89:106964

    Article  Google Scholar 

  19. Golijan M, Rui D, Fridrich J (2001) Detecting LSB steganography in color, and gray-scale images. Multimedia, IEEE 8:22–28

    Google Scholar 

  20. Gujjunoori S, Oruganti M (2019) Difference expansion based reversible data embedding and edge detection. Multimed Tools Appl 78:25889–25917

    Article  Google Scholar 

  21. Han JKW, Hsueh-Ming (2020) Traditional method inspired deep neural network for edge detection. IEEE international conference on image processing (ICIP). Abu Dhabi, United Arab Emirates, United Arab Emirates.

  22. Hosam O, Halima NB (2016) Adaptive block-based pixel value differencing steganography. Security and communication networks, Wiley 9(18):5036–5050

    Article  Google Scholar 

  23. https://www.kaggle.com/vijaygiitk/multiclass-weather-dataset - Accessed on 20-Jan-2020

  24. Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J. on Info. Security , 8 (1). https://doi.org/10.1186/1687-417X-2014-8

  25. Ismail K., El Bachir A and Taouil Y (2018) Image steganography based on edge detection algorithm. International conference on electronics, control, optimization and computer science (ICECOCS). Kenitra, Morocco.

  26. Jung K, Yoo K (2015) High-capacity index based data hiding method. Multimed Tools Appl 74(6):2179–2193.

    Article  Google Scholar 

  27. Kumar DS, Kiran R (2017) Data hiding using Fibonacci EDGE based steganography for cloud data. Int J Appl Eng Res 12(16):5565–5569

    Google Scholar 

  28. Lee CF, Chang C and Tsou P (2010) Data Hiding Scheme with High Embedding Capacity and Good Visual Quality Based on Edge Detection. 2010 Fourth International Conference on Genetic and Evolutionary Computing.

  29. Ma X, Li B, Zhang Y, Yan M (2012) The Canny Edge Detection and Its Improvement. International Conference on Artificial Intelligence and Computational Intelligence. 50–58

  30. Martin D, Fowlkes C, Tal D, Malik J (2001) A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. Proc. 8th Int'l Conf. Computer Vision 2:416–423

    Google Scholar 

  31. Mathura N, Mathur S, Mathur D (2016) A novel approach to improve Sobel edge detector. Procedia Computer Science 93:431–438

    Article  Google Scholar 

  32. Mukherjee N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77(2):18451–18481

    Article  Google Scholar 

  33. Mukhopadhyay S, Hossain S, Ghosal S, Sarkar R (2021) Secured image steganography based on Catalan transform. Multimed Tools Appl 80:14495–14520

    Article  Google Scholar 

  34. Pak C, Kim J, Kwangil A, Kim C, Kim K (2019) A novel color image LSB steganography using improved 1D chaotic map. Multimed Tools Appl 79:1409–1425

    Article  Google Scholar 

  35. Poma XS, Riba E, Sappa A (2020) Dense Extreme Inception Network: Towards a Robust CNN Model for Edge Detection. Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)

  36. Setiadi DRIM, Jumanto J (2018) An enhanced LSB-image steganography using the hybrid canny-Sobel edge detection. Cybernetics and information technologies 18(2):1314–4081

    Article  Google Scholar 

  37. Shanthakumari R, Malliga S (2020) Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79:3975–3991

    Article  Google Scholar 

  38. Shin N (2000) One-Time Hash Steganography. In: Pfitzmann A. (eds) Information Hiding. IH 1999. Lecture notes in computer science, vol 1768. Springer, Berlin, Heidelberg https://doi.org/10.1007/10719724_2

  39. Shrivakshan GT, Chandrasekar C (2012) A comparison of various edge detection techniques used in image processing. IJCSI International Journal of Computer Science Issues 9(5):269–276

    Google Scholar 

  40. Stanley CA (2005) Pairs of values and the Chi -Squared Attack. CiteSteer 1–45

  41. Tseng H-W, Leng H-S (2014) High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process 8(11):647–654

    Article  Google Scholar 

  42. Tu SX and Zhuowen (2015) Holistically-nested edge detection. IEEE international conference on computer vision (ICCV). Santiago, Chile

  43. Wang X (2007) Laplacian operator-based edge detectors. IEEE Trans Pattern Anal Mach Intell 29(5):886–900

    Article  Google Scholar 

  44. Wang Z, Yin Z, Zhang X (2017) Distortion function for JPEG steganography based on image texture and correlation in DCT domain. IETE Tech Rev 35(4):1–8

    Google Scholar 

  45. Weber AG (1997) USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and image processing institute, University of Southern California, Department of Electrical Engineering.

  46. Xue C, Zhang J, Xing J, Lei Y and Sun Y (2019) Research on edge detection operator of a convolutional neural network. IEEE 8th joint international information technology and artificial intelligence conference (ITAIC). Chongqing, China.

  47. Yang L, Wu X , Zhao D , Li H, Zhai J (2011) An improved Prewitt algorithm for edge detection based on noised image. 2011 4th international congress on image and signal processing. Shanghai, China

  48. Younus ZS, Hussain MK (2019) Image steganography using exploiting modification direction for compressed encrypted data. Journal of King Saud University –Computer and Information Sciences

  49. Zhang Z, Ma S, Liu H, Gong Y (2009) An edge detection approach based on directional wavelet transform. Computers & Mathematics with Applications, Elsevier 57(8):1265–1271

    Article  MathSciNet  Google Scholar 

  50. Zisserman KS and Andrew (2014) Very deep convolutional networks for large-scale image recognition. Computer Vision and Pattern Recognition.

  51. Zou Y, Zhang G, Liu L (2019) Research on image steganography analysis based on deep learning. J Vis Commun Image R 60:266–275

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudipta Kr Ghosal.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ray, B., Mukhopadhyay, S., Hossain, S. et al. Image steganography using deep learning based edge detection. Multimed Tools Appl 80, 33475–33503 (2021). https://doi.org/10.1007/s11042-021-11177-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11177-4

Keywords

Navigation