An In-Depth Analysis of Steganography Techniques: From Classical Edge Detection to Adaptive Approaches

Abstract

This paper delves into the realm of steganography, focusing on the evolution of techniques employed to conceal data within digital images. Beginning with an exploration of the motivations behind information security and the role of cryptography, the paper introduces adaptive steganography as a discreet means of incorporating private data into a cover medium. The discussion then shifts to the three key factors in image steganography - resilience, capacity, and imperceptibility - forming the foundation of effective data hiding. The spatial and frequency domain methods are compared, with specific emphasis on the classical Least Significant Bit insertion and more advanced adaptive steganography techniques. The paper further introduces edge-based steganography, highlighting the advantage of manipulating edge areas for increased imperceptibility. Moving beyond definitions and types, the paper provides a comprehensive analysis of notable research works in the field, elucidating their objectives, methodologies, results, strengths, and limitations. The conclusion reflects on the dynamic landscape of steganography, acknowledging both achievements and areas for improvement.

Country : Iraq

1 Noor Gh. Abdullah2 Shahd A. Hasso

  1. Software Department, College of Computer Science and Mathematics, University of Mosul, Mosul – Iraq
  2. Software Department, College of Computer Science and Mathematics, University of Mosul, Mosul – Iraq

IRJIET, Volume 8, Issue 1, January 2024 pp. 45-54

doi.org/10.47001/IRJIET/2024.801006

References

[1]     R. D. Rashid and T. F. Majeed, “Edge based image steganography: Problems and solution,” 2019 3rd Int. Conf. Commun. Signal Process. their Appl. ICCSPA 2019, no. May, 2019, doi: 10.1109/ICCSPA.2019.8713712.

[2]     R. Mohamad, “Data hiding by using AES Algorithm,” Wasit J. Comput. Math. Sci., vol. 1, no. 4, pp. 112–119, 2022, doi: 10.31185/wjcm.82.

[3]     D. Dongre and R. Mishra, “A Review on Edge Based Image Steganography,” Int. J. Recent Innov. Trends Comput. Commun., vol. 2, no. 9, pp. 2862–2866, 2014.

[4]     N. Johnson, Z. Duric, S. Jajodia, and N. Memon, “Information Hiding: Steganography and Watermarking—Attacks and Countermeasures,” J. Electron. Imaging, vol. 10, p. 825, Jan. 2001, doi: 10.1117/1.1388610.

[5]     H. Kolivand, T. C. Wee, S. Asadianfam, M. S. Rahim, and G. Sulong, High imperceptibility and robustness watermarking scheme for brain MRI using Slantlet transform coupled with enhanced knight tour algorithm, no. 0123456789. Springer US, 2023. doi: 10.1007/s11042-023-16459-7.

[6]     N. Akhtar, “An LSB Substitution with Bit Inversion Steganography Method,” 2016, pp. 515–521. doi: 10.1007/978-81-322-2538-6_53.

[7]     D. Baby, J. Thomas, G. Augustine, E. George, and N. R. Michael, “A novel DWT based image securing method using steganography,” Procedia Comput. Sci., vol. 46, no. Icict 2014, pp. 612–618, 2015, doi: 10.1016/j.procs.2015.02.105.

[8]     H.-D. Yuan, “Secret sharing with multi-cover adaptive steganography,” Inf. Sci. an Int. J., vol. 254, pp. 197–212, Jan. 2014, doi: 10.1016/j.ins.2013.08.012.

[9]     A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010, doi: 10.1016/j.sigpro.2009.08.010.

[10]  N. Rabade and Y. S. Thakur, “Different Steganography Techniques and Stego Keys Used in Digital Image Processing-a Review,” Int. Res. J. Mod. Eng. Technol. Sci., no. 02, pp. 852–859, 2023.

[11]  N. Hamid, A. Yahya, R. B. Ahmad, and O. M. Al-Qershi, “Image steganography techniques: an overview,” Int. J. Comput. Sci. Secur., vol. 6, no. 3, pp. 168–187, 2012.

[12]  Shikha and V. K. Dutt, “Steganography : The Art of Hiding Text in Image using Matlab,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 9, pp. 822–828, 2014.

[13]  M. S. Abuali, C. B. M. Rashidi, M. H. Salih, R. A. A. Raof, and S. S. Hussein, “Digital image steganography in spatial domain a comprehensive review,” J. Theor. Appl. Inf. Technol., vol. 97, no. 19, pp. 5081–5102, 2019.

[14]  M. Hassaballah, M. A. Hameed, and M. H. Alkinani, “Introduction to digital image steganography,” Digit. Media Steganography Princ. Algorithms, Adv., pp. 1–15, 2020, doi: 10.1016/B978-0-12-819438-6.00009-8.

[15]  G. Yadav and A. Ojha, “Improved security in the genetic algorithm-based image steganography scheme using Hilbert space-filling curve,” Imaging Sci. J., vol. 67, pp. 1–11, Feb. 2019, doi: 10.1080/13682199.2019.1570678.

[16]  R. Din et al., “Evaluating the Feature-Based Technique of Text Steganography Based on Capacity and Time Processing Parameters,” Adv. Sci. Lett., vol. 24, pp. 7355–7359, Oct. 2018, doi: 10.1166/asl.2018.12941.

[17]  S. Bobade and R. Goudar, “Secure Data Communication Using Protocol Steganography in IPv6,” in 2015 International Conference on Computing Communication Control and Automation, 2015, pp. 275–279. doi: 10.1109/ICCUBEA.2015.59.

[18]  C. Han, R. Xue, R. Zhang, and X. Wang, “A new audio steganalysis method based on linear prediction,” Multimed. Tools Appl., vol. 77, pp. 1–25, Jun. 2018, doi: 10.1007/s11042-017-5123-x.

[19]  P. Malathi, M. Manoaj, R. Manoj, V. Raghavan, and R. E. Vinodhini, “Highly Improved DNA Based Steganography,” Procedia Comput. Sci., vol. 115, pp. 651–659, 2017, doi: 10.1016/j.procs.2017.09.151.

[20]  M. Kasthuri, “Performance analysis of gradient based image edge detection,” Int. J. Health Sci. (Qassim)., vol. 6, no. June, pp. 2272–2278, 2022, doi: 10.53730/ijhs.v6ns5.9134.

[21]  J. A. M. Saif, M. H. Hammad, and I. A. A. Alqubati, “Gradient Based Image Edge Detection,” Int. J. Eng. Technol., vol. 8, no. 3, pp. 153–156, 2016, doi: 10.7763/ijet.2016.v6.876.

[22]  G. M. H. Amer and A. M. Abushaala, “Edge detection methods,” 2015 2nd World Symp. Web Appl. Networking, WSWAN 2015, no. April, 2015, doi: 10.1109/WSWAN.2015.7210349.

[23]  S. Krig, “Image Pre-Processing BT  - Computer Vision Metrics: Survey, Taxonomy, and Analysis,” S. Krig, Ed., Berkeley, CA: Apress, 2014, pp. 39–83. doi: 10.1007/978-1-4302-5930-5_2.

[24]  S. Saluja, A. K. Singh, S. Agrawal, M. E. Scholar, I. Bhilai, and S. Asst, “A Study of Edge Detection Methods,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 2, no. 1, pp. 994–999, 2013, [Online]. Available: www.ijarcce.com

[25]  A. Jan, S. A. Parah, and B. A. Malik, “A novel laplacian of gaussian (LoG) and chaotic encryption based image steganography technique,” 2020 Int. Conf. Emerg. Technol. INCET 2020, no. June, 2020, doi: 10.1109/INCET49848.2020.9154173.

[26]  X. Wang and J.-Q. Jin, An Edge Detection Algorithm Based on Improved CANNY Operator. 2007. doi: 10.1109/ISDA.2007.6.

[27]  J. Liu et al., “Image Edge Recognition of Virtual Reality Scene Based on Multi-Operator Dynamic Weight Detection,” IEEE Access, vol. 8, pp. 111289–111302, 2020, doi: 10.1109/ACCESS.2020.3001386.

[28]  K. Hempstalk, “Hiding behind corners: Using edges in images for better steganography,” Researchgate.Net, no. January 2006, 2006, [Online]. Available: https://www.researchgate.net/profile/Kathryn-Hempstalk/publication/241605558_Hiding_Behind_Corners_Using_Edges_in_Images_for_Better_Steganography/links/541fdafe0cf241a65a1acad4/Hiding-Behind-Corners-Using-Edges-in-Images-for-Better-Steganography.pdf

[29]  M. R. Modi, S. Islam, and P. Gupta, “Edge Based Steganography on Colored Images BT  - Intelligent Computing Theories,” D.-S. Huang, V. Bevilacqua, J. C. Figueroa, and P. Premaratne, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 593–600.

[30]  P. B. Chanda, S. Datta, S. Mukherjee, and J. P. Choudhury, “Comparative Study on Different Image Steganography Based Edge Detection,” Int. J. Innov. Res. Sci. Eng. Technol., pp. 220–226, 2016.

[31]  H.-C. Wu, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” Vision, Image Signal Process. IEE Proc. -, vol. 152, pp. 611–615, Nov. 2005, doi: 10.1049/ip-vis:20059022.

[32]  H. Motameni, M. Norouzi, M. Jahandar, and A. Hatami, “Labeling Method in Steganography,” World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng., vol. 1, pp. 1600–1605, 2007, [Online]. Available: https://api.semanticscholar.org/CorpusID:9357037

[33]  M. T. Parvez and A. A.-A. Gutub, “RGB Intensity Based Variable-Bits Image Steganography,” in 2008 IEEE Asia-Pacific Services Computing Conference, 2008, pp. 1322–1327. doi: 10.1109/APSCC.2008.105.

[34]  C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun, “Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems,” IEEE Trans. Inf. Forensics Secur., vol. 3, no. 3, pp. 488–497, 2008, doi: 10.1109/TIFS.2008.926097.

[35]  W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images,” Secur. Forensics, Steganography, Watermarking Multimed. Contents X, vol. 6819, no. March 2008, p. 68191E, 2008, doi: 10.1117/12.766754.

[36]  L. Li, B. Luo, Q. Li, and X. Fang, “A Color Images Steganography Method by Multiple Embedding Strategy Based on Sobel Operator,” in 2009 International Conference on Multimedia Information Networking and Security, 2009, pp. 118–121. doi: 10.1109/MINES.2009.187.

[37]  W.-J. Chen, C.-C. Chang, and T. Le Hoang, “High payload steganography mechanism using hybrid edge detector,” Expert Syst. Appl., vol. 37, pp. 3292–3301, Apr. 2010, doi: 10.1016/j.eswa.2009.09.050.

[38]  A. Gutub, “Pixel Indicator Technique for RGB Image Steganography,” J. Emerg. Technol. Web Intell., vol. 2, Feb. 2010, doi: 10.4304/jetwi.2.1.56-64.

[39]  W. Luo, F. Huang, and J. Huang, “Edge adaptive image steganography based on lsb matching revisited,” IEEE Trans. Inf. Forensics Secur., vol. 5, no. 2, pp. 201–214, 2010, doi: 10.1109/TIFS.2010.2041812.

[40]  C.-M. Yu, K.-C. Wu, and C.-M. Wang, “A distortion-free data hiding scheme for high dynamic range images,” Displays, vol. 32, no. 5, pp. 225–236, 2011, doi: https://doi.org/10.1016/j.displa.2011.02.004.

[41]  X. Liao, Q. Y. Wen, and J. Zhang, “A steganographic method for digital images with four-pixel differencing and modified LSB substitution,” J. Vis. Commun. Image Represent., vol. 22, no. 1, pp. 1–8, 2011, doi: 10.1016/j.jvcir.2010.08.007.

[42]  M. Hussain and M. Hussain, “Information hiding using edge boundaries of objects,” Int. J. Secur. its Appl., vol. 5, no. 3, pp. 1–10, 2011.

[43]  Y. Bassil, “Image Steganography based on a Parameterized Canny Edge Detection Algorithm,” Int. J. Comput. Appl., vol. 60, no. 4, pp. 35–40, 2012, doi: 10.5120/9682-4112.

[44]  M. Mahajan and N. Kaur, “Let’s Play with Images and Private Data Using Stick of Randomness BT  - Global Trends in Information Systems and Software Applications,” P. V. Krishna, M. R. Babu, and E. Ariwa, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 619–628.

[45]  M. Hussain, “A Survey of Image Steganography Techniques,” Int. J. Adv. Sci. Technol. (IJAST), vol. 54, pp. 113–125, May 2013.

[46]  V. Nagaraj, V. Vijayalakshmi, and G. Zayaraz, “Color Image Steganography based on Pixel Value Modification Method Using Modulus Function,” IERI Procedia, vol. 4, pp. 17–24, 2013, doi: 10.1016/j.ieri.2013.11.004.

[47]  J.-Y. Yan, T.-H. Chen, and C.-H. Lin, “Encryption in High Dynamic Range Images for RGBE Format,” in 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013, pp. 493–496. doi: 10.1109/IIH-MSP.2013.128.

[48]  K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption,” IEEE Trans. Inf. Forensics Secur., vol. 8, no. 3, pp. 553–562, 2013, doi: 10.1109/TIFS.2013.2248725.

[49]  D. Singla and M. Juneja, “An analysis of edge based image steganography techniques in spatial domain,” 2014 Recent Adv. Eng. Comput. Sci. RAECS 2014, vol. 1, no. 2, 2014, doi: 10.1109/RAECS.2014.6799604.

[50]  H. Al-Dmour and A. Al-Ani, “A Steganography Embedding Method Based on Edge Identification and XOR Coding,” Expert Syst. Appl., vol. 46, Oct. 2015, doi: 10.1016/j.eswa.2015.10.024.

[51]  Y.-T. Lin, C.-M. Wang, W.-S. Chen, F.-P. Lin, and W. Lin, “A Novel Data Hiding Algorithm for High Dynamic Range Images,” IEEE Trans. Multimed., vol. 19, no. 1, pp. 196–211, 2017, doi: 10.1109/TMM.2016.2605499.

[52]  P. Puteaux and W. Puech, “An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 7, pp. 1670–1681, 2018, doi: 10.1109/TIFS.2018.2799381.

[53]  X. Gao, Z. Pan, E. Gao, and G. Fan, “Reversible data hiding for high dynamic range images using two-dimensional prediction-error histogram of the second time prediction,” Signal Processing, vol. 173, p. 107579, 2020, doi: https://doi.org/10.1016/j.sigpro.2020.107579.

[54]  C. F. Lan, C. M. Wang, and W. Lin, “XtoE: A Novel Constructive and Camouflaged Adaptive Data Hiding and Image Encryption Scheme for High Dynamic Range Images,” Appl. Sci., vol. 12, no. 24, 2022, doi: 10.3390/app122412856.

[55]  X. Wang, C.-C. Chang, C.-C. Lin, and C.-C. Chang, “Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images,” J. Vis. Commun. Image Represent., vol. 82, p. 103421, 2022, doi: https://doi.org/10.1016/j.jvcir.2021.103421.

[56]  Y.-Y. Tsai, H.-L. Liu, P.-L. Kuo, and C.-S. Chan, “Extending Multi-MSB Prediction and Huffman Coding for Reversible Data Hiding in Encrypted HDR Images,” IEEE Access, vol. 10, pp. 49347–49358, 2022, doi: 10.1109/ACCESS.2022.3171578.

[57]  K. S. Hsieh and C. M. Wang, “Multi-Hider Reversible Data Hiding Using a Weighted Color Transfer and Modulus Operation,” Appl. Sci., vol. 13, no. 2, 2023, doi: 10.3390/app13021013.