A Radical Image Steganography Method Predicated on Intensity and Edge Detection

A Radical Image Steganography Method Predicated on Intensity and Edge Detection

Abhijit Sarkar, Sabyasachi Samanta
DOI: 10.4018/978-1-6684-7524-9.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet has grown to be widely used by billions of individuals in our digital age. The internet is required for a variety of platforms, online apps, and standalone applications. Numerous methods, including cryptography, encryption/decryption, and data concealment algorithms, are developed for this goal. However, the employment of these methods was not very secure, making it simple for hackers to get the secret message. A new method called “steganography” was developed to offer the highest level of protection for sensitive data. Steganography's primary goal is to conceal the presence of concealed messages. Additionally, it seeks out concealed messages using factors like the kind of embedding method, the message's length, its content, or the carrier's secret key. At this point in the chapter, a single bit of data has been embedded into edge-based pixel positions with arbitrary bit positions. The authors have compared their method to three standard edge detection algorithms for a more comprehensive assessment. Different statistical measures also have been made for the uniqueness of the technique.
Chapter Preview
Top

Introduction

Information security is regarded as one of the utmost crucial components of technology based on the exchange of information and messages due to the expansion of the Internet and computer technology in recent decades. Information security refers to the processes put in place by corporations to keep sensitive data secure. This entails installing safeguards to prevent unauthorized individuals. Information security encompasses a wide range of subjects, including but not limited to networking and security architecture, monitoring, and accounting. Information security safeguards vital records from being illegally accessed, modified, recorded, interrupted, or destroyed. Cryptography and steganography are one of the most crucial methods for protecting sensitive data (Safarpour et al.,2016). The intention of cryptography is to ensure that only the intended recipients of a message or transmission can decipher and utilize the data contained inside it (Kaur et al., 2010). This ensures that sensitive data remains secure from prying eyes. Steganography is the study of concealing information in unremarkable items such that an opponent cannot detect its presence (Dadgostar et al., 2016). To evade discovery, data may be steganographed by being buried inside an otherwise benign file or message. Confidential material may be recovered from a conventionally sent file or message after it has delivered at its recipient. In addition to encryption, steganography may be used to covertly hide or secure sensitive information. This technique involves concealing data or a hidden message inside another digital media file, such as a picture, song, or video (Pal et al., 2013). Its origins lie in the Greek words for “to write” (graph) and “covered” (steganos). As a result, we refer to it as “secret writing.”

There are typically five distinct approaches in the steganography process namely audio steganography, text steganography, video steganography, image steganography and network/protocol steganography. Data concealment in text steganography is accomplished by encoding it into the alphabetic sequence of words. Steganography with images involves hiding information inside a picture of something else. Steganography in audio is the practice of concealing information using sound. The term “video steganography” refers to the practice of discreetly concealing data or other files inside a video file on a computer. Steganography on the network refers to the process of concealing data within another network protocol, such as TCP, UDP, ICMP, IP, etc.

Complete Chapter List

Search this Book:
Reset