An Efficient and Secure Steganography Technique Using Edge Adaptive Technique

Authors

  • Singla N Division of Computer Engineering, Netaji Subhas Institute of Technology, University of Delhi, New Delhi, India
  • Saini KK Division of Computer Engineering, Netaji Subhas Institute of Technology, University of Delhi, New Delhi, India

DOI:

https://doi.org/10.26438/ijcse/v6i5.766772

Keywords:

Steganography, Edge Adaptive, LSB, Majority Parity Check

Abstract

This paper presents an edge based embedding technique to achieve undetectability in steganography with minimal amount of distortion. In this method, desired information is embedded in the edges, as the edges are least susceptible to Human Visual System (HVS) and therefore, remains concealed. Further, the proposed technique uses Majority Parity Check to improve the PSNR of image. The prominent issue with steganography is the amount of distortion caused due to embedding. The proposed technique offers the flexibility of attaining high security with minimal distortion. Experimental results show that the technique provides reduction in the distortion by 20% in comparison to other well-known techniques available in literature.

References

R. Agrawal, "Hippocratic Databases", In the Proceedings of the 28th International conference on Very Large Data Bases, VLDB Endowment, 2002.

W. Luo, F. Huang, J. Huang, "Edge adaptive image steganography based on LSB matching revisited", IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 201-214, June 2010.

S. Islam, P. Gupta, "Revisiting least two significant bits steganography", In the Proceedings of 8th International conference on intelligent information processing (ICIIP), Seoul, Republic of Korea, pp. 90-93, April 2013.

A. Ker, “Steganalysis of embedding in two least-significant bits”, IEEE Transactions on Information Forensics and Security, pp. 46-54, April 2007.

H. Al-Dmour, N. Ali, A. Al-Ani, "An efficient hybrid steganography method based on edge adaptive and tree based parity check", In the Proceedings of 21st International Conference, MMM 2015, Sydney, NSW, Australia, January 2015,

H. Al-Dmour, A. Al-Ani, “A steganography embedding method based on edge identification and XOR coding”, Expert Systems With Applications, Vol/ 46, pp. 293-306, March 2016.

W. Da-Chun, W. H. Tsai, “Steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, Vol. 24, Issues 9–10, pp. 1613-1626, June 2003.

X. Zhang, S. Wang, “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security”, Pattern Recognition Letters, Vol 25, Issue 3, pp. 331-339, Feb 2004.

N. Kanopoulos, N. Vasanthavada R. L., “Design of an image edge detection filter using the Sobel operator”, IEEE Journal of Solid-State Circuits, Vol. 23 , Issue 2, pp. 358-367, Apr 1988.

A. Seif, M. M. Salut, M. N. Marsono, “A hardware architecture of Prewitt edge detection”, In the Proceedings of IEEE Conference on Sustainable Utilization and Development in Engineering and Technology”, pp. 99 – 101, Nov. 2010.

L. Chen, I. W. Tsang, D. Xu, “Laplacian Embedded Regression for Scalable Manifold Regularization”, IEEE Transactions on Neural Networks and Learning Systems, Vol. 23, Issue: 6, pp. 902 – 915, June 2012.

J. Canny, “A Computational Approach to Edge Detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence”, Vol. PAMI-8 , Issue 6, pp. 679 – 698, Nov. 1986.

K. More, J. Rao, "Hiding Data in Images with Least Distortion using Majority Vote Parity Check.", In the Proceedings of Third International Conference on Computational Intelligence and Information Technology – CIIT 2013, Mumbai, India, Oct. 2013.

Hou, Chung-Li, et al, "An optimal data hiding scheme with tree-based parity check", Image Processing, IEEE Transactions on Image Processing, Vol. 20, Issue 3, p. 880-886, March 2011.

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.766772
Published: 2025-11-13

How to Cite

[1]
N. Singla and K. K. Saini, “An Efficient and Secure Steganography Technique Using Edge Adaptive Technique”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 766–772, Nov. 2025.

Issue

Section

Research Article