Have a personal or library account? Click to login
An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection Cover

An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection

Open Access
|Jun 2018

References

  1. 1. Yang, C.-H., C.-Y. Weng, S.-J. Wang, H.-M. Sun. Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. – IEEE Transactions on Information Forensics and Security, Vol. 3, 2008, No 3, pp. 488-497.10.1109/TIFS.2008.926097
  2. 2. Verma, M., R. Rani. Significant Secret Image Sharing Scheme Based on Boolean Operation. – Cybernetics and Information Technologies, Vol. 17, 2017, No 2, pp. 134-150.10.1515/cait-2017-0022
  3. 3. Setiadi, D. R. I. M., T. Sutojo, E. H. Rachmawanto, C. A. Sari. Fast and Efficient Image Watermarking Algorithm Using Discrete Tchebichef Transform. – In: International Conference on Cyber and IT Service Management (CITSM’17), Denpasar, 2017.10.1109/CITSM.2017.8089229
  4. 4. Nag, A., S. Biswas, D. Sarkar, Partha. Secret Image Sharing Scheme Based on a Boolean Operation. – Cybernetics and Iformation Technologies, Vol. 14, 2014, No 2, pp. 98-113.10.2478/cait-2014-0023
  5. 5. Ardy, R. D., O. R. Indriani, C. A. Sari, D. R. I. M. Setiadi, E. H. Rachmawanto. Digital Image Signature Using Triple Protection Cryptosystem (RSA, Vigenere, and MD5). – In: International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS’17), Yogyakarta, 2017.
  6. 6. Setiadi, D. R. I. M., H. A. Santoso, E. H. Rachmawanto, C. A. Sari. An Improved Message Capacity and Security Using Divide and Modulus Function in Spatial Domain Steganography. – In: International Conference on Information and Communications Technology (ICOIACT’18), Yogyakarta, 2018.10.1109/ICOIACT.2018.8350670
  7. 7. Setyono, A., D. R. I. M. Setiadi, Muljono. StegoCrypt Method Using Wavelet Transform and One-Time Pad for Secret Image Delivery. – In: International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE’17), Semarang, 2017.10.1109/ICITACEE.2017.8257703
  8. 8. Zhu, Z., T. Zhang, P. Zhu, B. Wan, X. Hou. Steganalysis of AE-LSB Steganography Based on Pixel Value Differencing. – In: International Conference on Natural Computation (ICNC’13), Shenyang, 2013.10.1109/ICNC.2013.6818208
  9. 9. Astuti, Y. P., D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari. Simple and Secure Image Steganography Using LSB and Triple XOR Operation on MSB. – In: International Conference on Information and Communications Technology (ICOIACT’18), Yogyakarta, 2018.10.1109/ICOIACT.2018.8350661
  10. 10. Singla, D., M. Juneja. An Analysis of Edge Based Image Steganography Techniques in Spatial Domain. – In: Recent Advances in Engineering and Computational Sciences (RAECS’14), Chandigarh, 2014.10.1109/RAECS.2014.6799604
  11. 11. Bai, J., C.-C. Chang, T.-S. Nguyen, C. Zhu, Y. Liu. A High Payload Steganographic Algorithm Based on Edge Detection. – Displays, Vol. 46, 2017, No 1, pp. 42-51.10.1016/j.displa.2016.12.004
  12. 12. Islam, S., M. R. Modi, P. Gupta. Edge-Based Image Steganography. – EURASIP Journal on Information Security, Vol. 2014, 2014, No 1.10.1186/1687-417X-2014-8
  13. 13. Irawan, C., D. R. I. M. Setiadi, C. A. Sari, E. H. Rachmawanto. Hiding and Securing Message on Edge Areas of Image Using LSB Steganography and OTP Encryption. – In: International Conference on Informatics and Computational Sciences (ICICoS’17), Semarang, 2017.10.1109/ICICOS.2017.8276328
  14. 14. Mohamed, M. H., N. M. AL-Aidroos, M. A. Bamatraf. A Combined Image Steganography Technique Based on Edge Concept & Dynamic LSB. – International Journal of Engineering Research & Technology (IJERT), Vol. 1, 2012, No 8, pp. 1-7.
  15. 15. Kalra, A., R. L. Chhokar. A Hybrid Approach Using Sobel and Canny Operator for Digital Image Edge Detection. – In: International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE’16), Ghaziabad, 2016.10.1109/ICMETE.2016.49
  16. 16. Goodarzi, M. H., A. Zaeim, A. S. Shahabi. Convergence between Fuzzy Logic and Steganography for High Payload Data Embedding and More Security. – In: International Conference on Telecommunication Systems, Services, and Applications (TSSA’11), Bali, 2011.10.1109/TSSA.2011.6095421
  17. 17. Singla, D., D. M. Juneja. New Information Hiding Technique Using Features of Image. – Journal of Emerging Technologies in Web Intelligence, Vol. 6, 2014, No 2, pp. 237-242.10.4304/jetwi.6.2.237-242
  18. 18. Canny, J. A Computational Approach to Edge Detection. – IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. PAMI-8, 1986, No 6, pp. 679-698.10.1109/TPAMI.1986.4767851
  19. 19. Nikolic, M., E. Tuba, M. Tuba. Edge Detection in Medical Ultrasound Images Using Adjusted Canny Edge Detection Algorithm. – In: Telecommunications Forum (TELFOR’16), Belgrade, 2016.10.1109/TELFOR.2016.7818878
  20. 20. Kaur, P., B. Kaur. 2-D Geometric Shape Recognition Using Canny Edge Detection Technique. – In: International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016.
  21. 21. Jin-Yu, Z., C. Yan, H. Xian-Xiang. Edge Detection of Images Based on Improved Sobel Operator and Genetic Algorithms. – In: International Conference on Image Analysis and Signal Processing, Linhai, 2009.
  22. 22. Gao, W., X. Zhang, L. Yang, H. Liu. An Improved Sobel Edge Detection. – In: IEEE International Conference on Computer Science and Information Technology (ICCSIT’10), Chengdu, 2010.
DOI: https://doi.org/10.2478/cait-2018-0029 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 74 - 88
Submitted on: Nov 5, 2017
Accepted on: May 21, 2018
Published on: Jun 30, 2018
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2018 De Rosal Ignatius Moses Setiadi, Jumanto Jumanto, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.