Call for Paper - February 2017 Edition
IJCA solicits original research papers for the February 2017 Edition. Last date of manuscript submission is January 20, 2017. Read More

A Novel Edge Based Image Steganography with Enhanced Visual and Statistical Security

International Conference on VLSI, Communications and Instrumentation
© 2011 by IJCA Journal
Number 2 - Article 1
Year of Publication: 2011
Remya Unnikrishnan
S. Benson Edwin Raj
Iwin Thanakumar Joseph

Remya Unnikrishnan, Benson Edwin S Raj and Iwin Thanakumar Joseph. A Novel Edge Based Image Steganography with Enhanced Visual and Statistical Security. IJCA Proceedings on International Conference on VLSI, Communications and Instrumentation (ICVCI) (14):1–5, 2011. Full text available. BibTeX

	author = {Remya Unnikrishnan and S. Benson Edwin Raj and Iwin Thanakumar Joseph},
	title = {A Novel Edge Based Image Steganography with Enhanced Visual and Statistical Security},
	journal = {IJCA Proceedings on International Conference on VLSI, Communications and Instrumentation (ICVCI)},
	year = {2011},
	number = {14},
	pages = {1--5},
	note = {Full text available}


Steganography is the science that involves communicating the secret data in an appropriate multimedia carrier e.g. image, audio and video files. Edge Based Steganography is in which only the sharper edge regions are used for hiding the message while keeping the other smoother regions as they are. It is more difficult to observe changes at the sharper edges than those in smoother regions. In this paper we have proposed a novel architecture using Enhanced Least Significant Bit algorithm which can reduce the rate of pixel modification thereby increasing the security both visually and statistically.


  • K. Hempstalk, “Hiding behind corners: Using edges in images for better steganography,” Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006.
  • K. M. Singh, L. S. Singh, A. B. Singh, and K. S. Devi, “Hiding secret message in edges of the image,” in Proc. Int. Conf. Information and Communication Technology, pp. 238–241, Mar. 2007.
  • C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488–497, Sep. 2008.
  • Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang, “ High quality steganographic method with pixel-value differencing and modulus function,” Science Direct The Journal of Systems and Software, 24 January 2007.
  • Weiqi Luo, Fangjun Huang, and Jiwu Huang, “Edge adaptive image steganography based on LSB matching revisited,” in IEEE Transactions on Information Forensics and Security, vol.5, no.2, June 2010
  • J. Mielikainen, “LSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.
  • D. Wu and W. Tsai, “A steganographic method for images by pixel value differencing,” Pattern Recognit. Lett., vol. 24, pp. 1613–1626, 2003.
  • Dumitrescu.S, Xiaolin Wu, Zhe Wang “Detection of LSB Steganography via Sample Pair Analysis,” IEEE Transactions on Signal Processing, vol. 51, issue 7, pp. 1995-2007
  • X. Li, T. Zeng, and B. Yang, “Detecting LSB matching by applying calibration technique for difference image,” in Proc. 10th ACM Workshop on Multimedia and Security, Oxford, U.K, pp. 133–138, 2008.
  • Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, and Ki-Ryong Kwon, An Image Steganography Using Pixel Characteristics Y. Hao et al. (Eds.): CIS 2005, Part II, Springer-Verlag Berlin Heidelberg LNAI 3802, (2005) 581– 588.
  • X. Zhang and S. Wang, “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett., vol. 25, pp. 331–339, 2004.
  • A. D. Ker, “A general framework for structural steganalysis of LSB replacement,” in Proc. 7th Int. Workshop on Information Hiding, 2005,vol. 3427, pp. 296–311.
  • J. Harmsen and W. Pearlman, “Steganalysis of additive-noise modelable information hiding,” Proc. SPIE Electronic Imaging, vol. 5020, pp. 131–142, 2003.
  • J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimedia, vol. 8, no. 4, pp.22–28, Oct. 2001.
  • A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems,”in Proc. 3rd Int. Workshop on Information Hiding, 1999, vol. 1768, pp.61–76.