Loading…
A steganography embedding method based on edge identification and XOR coding
•A method for hiding data in the spatial or IWT domains of images is proposed.•Design new edge detection method to estimate same edge intensities for both images.•XOR operation is used to embed the message and to improve imperceptibility.•Proposed method is robust against textural feature steganalys...
Saved in:
Published in: | Expert systems with applications 2016-03, Vol.46, p.293-306 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c333t-694b45035e3f58609dc2bcefc17389c8b52bb677d1c57df3fde00aed452486be3 |
---|---|
cites | cdi_FETCH-LOGICAL-c333t-694b45035e3f58609dc2bcefc17389c8b52bb677d1c57df3fde00aed452486be3 |
container_end_page | 306 |
container_issue | |
container_start_page | 293 |
container_title | Expert systems with applications |
container_volume | 46 |
creator | Al-Dmour, Hayat Al-Ani, Ahmed |
description | •A method for hiding data in the spatial or IWT domains of images is proposed.•Design new edge detection method to estimate same edge intensities for both images.•XOR operation is used to embed the message and to improve imperceptibility.•Proposed method is robust against textural feature steganalysis.
In this paper, we present a novel image steganography algorithm that combines the strengths of edge detection and XOR coding, to conceal a secret message either in the spatial domain or an Integer Wavelet Transform (IWT) based transform domain of the cover image. Edge detection enables the identification of sharp edges in the cover image that when embedding in would cause less degradation to the image quality compared to embedding in a pre-specified set of pixels that do not differentiate between sharp and smooth areas. This is motivated by the fact that the human visual system (HVS) is less sensitive to changes in sharp contrast areas compared to uniform areas of the image. The edge detection method presented here is capable of estimating the exact edge intensities for both the cover and stego images (before and after embedding the message), which is essential when extracting the message. The XOR coding, on the other hand, is a simple, yet effective, process that helps in reducing differences between the cover and stego images. In order to embed three secret message bits, the algorithm requires four bits of the cover image, but due to the coding mechanism, no more than two of the four bits will be changed when producing the stego image. The proposed method utilizes the sharpest regions of the image first and then gradually moves to the less sharp regions. Experimental results demonstrate that the proposed method has achieved better imperceptibility results than other popular steganography methods. Furthermore, when applying a textural feature steganalytic algorithm to differentiate between cover and stego images produced using various embedding rates, the proposed method maintained a good level of security compared to other steganography methods. |
doi_str_mv | 10.1016/j.eswa.2015.10.024 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1825463476</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0957417415007289</els_id><sourcerecordid>1825463476</sourcerecordid><originalsourceid>FETCH-LOGICAL-c333t-694b45035e3f58609dc2bcefc17389c8b52bb677d1c57df3fde00aed452486be3</originalsourceid><addsrcrecordid>eNp9kF1LwzAUhoMoOKd_wKtcetOaNEnTgjdj-AWDgSh4F_Jx2mWszUw6Zf_elnnt1YGX93nhPAjdUpJTQsv7bQ7pR-cFoWIMclLwMzSjlWRZKWt2jmakFjLjVPJLdJXSlhAqCZEztFrgNECr-9BGvd8cMXQGnPN9izsYNsFhoxM4HHoMrgXsHfSDb7zVgx8z3Tv8uX7DNkzINbpo9C7Bzd-do4-nx_flS7ZaP78uF6vMMsaGrKy54YIwAawRVUlqZwtjobFUsqq2lRGFMaWUjlohXcMaB4RocFwUvCoNsDm6O-3uY_g6QBpU55OF3U73EA5J0aoQvGRclmO1OFVtDClFaNQ--k7Ho6JETerUVk3q1KRuykZ1I_RwgmB84ttDVMl66C04H8EOygX_H_4L9aR3ow</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1825463476</pqid></control><display><type>article</type><title>A steganography embedding method based on edge identification and XOR coding</title><source>Elsevier</source><creator>Al-Dmour, Hayat ; Al-Ani, Ahmed</creator><creatorcontrib>Al-Dmour, Hayat ; Al-Ani, Ahmed</creatorcontrib><description>•A method for hiding data in the spatial or IWT domains of images is proposed.•Design new edge detection method to estimate same edge intensities for both images.•XOR operation is used to embed the message and to improve imperceptibility.•Proposed method is robust against textural feature steganalysis.
In this paper, we present a novel image steganography algorithm that combines the strengths of edge detection and XOR coding, to conceal a secret message either in the spatial domain or an Integer Wavelet Transform (IWT) based transform domain of the cover image. Edge detection enables the identification of sharp edges in the cover image that when embedding in would cause less degradation to the image quality compared to embedding in a pre-specified set of pixels that do not differentiate between sharp and smooth areas. This is motivated by the fact that the human visual system (HVS) is less sensitive to changes in sharp contrast areas compared to uniform areas of the image. The edge detection method presented here is capable of estimating the exact edge intensities for both the cover and stego images (before and after embedding the message), which is essential when extracting the message. The XOR coding, on the other hand, is a simple, yet effective, process that helps in reducing differences between the cover and stego images. In order to embed three secret message bits, the algorithm requires four bits of the cover image, but due to the coding mechanism, no more than two of the four bits will be changed when producing the stego image. The proposed method utilizes the sharpest regions of the image first and then gradually moves to the less sharp regions. Experimental results demonstrate that the proposed method has achieved better imperceptibility results than other popular steganography methods. Furthermore, when applying a textural feature steganalytic algorithm to differentiate between cover and stego images produced using various embedding rates, the proposed method maintained a good level of security compared to other steganography methods.</description><identifier>ISSN: 0957-4174</identifier><identifier>EISSN: 1873-6793</identifier><identifier>DOI: 10.1016/j.eswa.2015.10.024</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>Algorithms ; Coding ; Edge detection ; Human Visual System (HVS) ; Image detection ; Image quality ; IWT ; Messages ; Steganography ; XOR coding</subject><ispartof>Expert systems with applications, 2016-03, Vol.46, p.293-306</ispartof><rights>2015 Elsevier Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c333t-694b45035e3f58609dc2bcefc17389c8b52bb677d1c57df3fde00aed452486be3</citedby><cites>FETCH-LOGICAL-c333t-694b45035e3f58609dc2bcefc17389c8b52bb677d1c57df3fde00aed452486be3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27900,27901</link.rule.ids></links><search><creatorcontrib>Al-Dmour, Hayat</creatorcontrib><creatorcontrib>Al-Ani, Ahmed</creatorcontrib><title>A steganography embedding method based on edge identification and XOR coding</title><title>Expert systems with applications</title><description>•A method for hiding data in the spatial or IWT domains of images is proposed.•Design new edge detection method to estimate same edge intensities for both images.•XOR operation is used to embed the message and to improve imperceptibility.•Proposed method is robust against textural feature steganalysis.
In this paper, we present a novel image steganography algorithm that combines the strengths of edge detection and XOR coding, to conceal a secret message either in the spatial domain or an Integer Wavelet Transform (IWT) based transform domain of the cover image. Edge detection enables the identification of sharp edges in the cover image that when embedding in would cause less degradation to the image quality compared to embedding in a pre-specified set of pixels that do not differentiate between sharp and smooth areas. This is motivated by the fact that the human visual system (HVS) is less sensitive to changes in sharp contrast areas compared to uniform areas of the image. The edge detection method presented here is capable of estimating the exact edge intensities for both the cover and stego images (before and after embedding the message), which is essential when extracting the message. The XOR coding, on the other hand, is a simple, yet effective, process that helps in reducing differences between the cover and stego images. In order to embed three secret message bits, the algorithm requires four bits of the cover image, but due to the coding mechanism, no more than two of the four bits will be changed when producing the stego image. The proposed method utilizes the sharpest regions of the image first and then gradually moves to the less sharp regions. Experimental results demonstrate that the proposed method has achieved better imperceptibility results than other popular steganography methods. Furthermore, when applying a textural feature steganalytic algorithm to differentiate between cover and stego images produced using various embedding rates, the proposed method maintained a good level of security compared to other steganography methods.</description><subject>Algorithms</subject><subject>Coding</subject><subject>Edge detection</subject><subject>Human Visual System (HVS)</subject><subject>Image detection</subject><subject>Image quality</subject><subject>IWT</subject><subject>Messages</subject><subject>Steganography</subject><subject>XOR coding</subject><issn>0957-4174</issn><issn>1873-6793</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp9kF1LwzAUhoMoOKd_wKtcetOaNEnTgjdj-AWDgSh4F_Jx2mWszUw6Zf_elnnt1YGX93nhPAjdUpJTQsv7bQ7pR-cFoWIMclLwMzSjlWRZKWt2jmakFjLjVPJLdJXSlhAqCZEztFrgNECr-9BGvd8cMXQGnPN9izsYNsFhoxM4HHoMrgXsHfSDb7zVgx8z3Tv8uX7DNkzINbpo9C7Bzd-do4-nx_flS7ZaP78uF6vMMsaGrKy54YIwAawRVUlqZwtjobFUsqq2lRGFMaWUjlohXcMaB4RocFwUvCoNsDm6O-3uY_g6QBpU55OF3U73EA5J0aoQvGRclmO1OFVtDClFaNQ--k7Ho6JETerUVk3q1KRuykZ1I_RwgmB84ttDVMl66C04H8EOygX_H_4L9aR3ow</recordid><startdate>20160315</startdate><enddate>20160315</enddate><creator>Al-Dmour, Hayat</creator><creator>Al-Ani, Ahmed</creator><general>Elsevier Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20160315</creationdate><title>A steganography embedding method based on edge identification and XOR coding</title><author>Al-Dmour, Hayat ; Al-Ani, Ahmed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c333t-694b45035e3f58609dc2bcefc17389c8b52bb677d1c57df3fde00aed452486be3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algorithms</topic><topic>Coding</topic><topic>Edge detection</topic><topic>Human Visual System (HVS)</topic><topic>Image detection</topic><topic>Image quality</topic><topic>IWT</topic><topic>Messages</topic><topic>Steganography</topic><topic>XOR coding</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al-Dmour, Hayat</creatorcontrib><creatorcontrib>Al-Ani, Ahmed</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Expert systems with applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-Dmour, Hayat</au><au>Al-Ani, Ahmed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A steganography embedding method based on edge identification and XOR coding</atitle><jtitle>Expert systems with applications</jtitle><date>2016-03-15</date><risdate>2016</risdate><volume>46</volume><spage>293</spage><epage>306</epage><pages>293-306</pages><issn>0957-4174</issn><eissn>1873-6793</eissn><abstract>•A method for hiding data in the spatial or IWT domains of images is proposed.•Design new edge detection method to estimate same edge intensities for both images.•XOR operation is used to embed the message and to improve imperceptibility.•Proposed method is robust against textural feature steganalysis.
In this paper, we present a novel image steganography algorithm that combines the strengths of edge detection and XOR coding, to conceal a secret message either in the spatial domain or an Integer Wavelet Transform (IWT) based transform domain of the cover image. Edge detection enables the identification of sharp edges in the cover image that when embedding in would cause less degradation to the image quality compared to embedding in a pre-specified set of pixels that do not differentiate between sharp and smooth areas. This is motivated by the fact that the human visual system (HVS) is less sensitive to changes in sharp contrast areas compared to uniform areas of the image. The edge detection method presented here is capable of estimating the exact edge intensities for both the cover and stego images (before and after embedding the message), which is essential when extracting the message. The XOR coding, on the other hand, is a simple, yet effective, process that helps in reducing differences between the cover and stego images. In order to embed three secret message bits, the algorithm requires four bits of the cover image, but due to the coding mechanism, no more than two of the four bits will be changed when producing the stego image. The proposed method utilizes the sharpest regions of the image first and then gradually moves to the less sharp regions. Experimental results demonstrate that the proposed method has achieved better imperceptibility results than other popular steganography methods. Furthermore, when applying a textural feature steganalytic algorithm to differentiate between cover and stego images produced using various embedding rates, the proposed method maintained a good level of security compared to other steganography methods.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.eswa.2015.10.024</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0957-4174 |
ispartof | Expert systems with applications, 2016-03, Vol.46, p.293-306 |
issn | 0957-4174 1873-6793 |
language | eng |
recordid | cdi_proquest_miscellaneous_1825463476 |
source | Elsevier |
subjects | Algorithms Coding Edge detection Human Visual System (HVS) Image detection Image quality IWT Messages Steganography XOR coding |
title | A steganography embedding method based on edge identification and XOR coding |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-24T17%3A56%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20steganography%20embedding%20method%20based%20on%20edge%20identification%20and%20XOR%20coding&rft.jtitle=Expert%20systems%20with%20applications&rft.au=Al-Dmour,%20Hayat&rft.date=2016-03-15&rft.volume=46&rft.spage=293&rft.epage=306&rft.pages=293-306&rft.issn=0957-4174&rft.eissn=1873-6793&rft_id=info:doi/10.1016/j.eswa.2015.10.024&rft_dat=%3Cproquest_cross%3E1825463476%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c333t-694b45035e3f58609dc2bcefc17389c8b52bb677d1c57df3fde00aed452486be3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1825463476&rft_id=info:pmid/&rfr_iscdi=true |