Have a personal or library account? Click to login

A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection

Open Access
|Dec 2021

References

  1. 1. Ghosal, S. K., A. Chatterjee, R. Sarkar. Image Steganography Based on Kirsch Edge Detection. – Multimedia Systems, 2020, pp. 1-15.10.1007/s00530-020-00703-3
  2. 2. Zhang, H., L. Hu. A Data Hiding Scheme Based on Multidirectional Line Encoding and Integer Wavelet Transform. – Signal Processing: Image Communication, Vol. 78, 2019, pp. 331-344.10.1016/j.image.2019.07.019
  3. 3. Hamid, N., et al. Image Steganography Techniques: An Overview. – International Journal of Computer Science and Security (IJCSS), Vol. 6, 2012, No 3, pp. 168-187.
  4. 4. Kumar, S., A. Singh, M. Kumar. Information Hiding with Adaptive Steganography Based on Novel Fuzzy Edge Identification. – Defence Technology, Vol. 15, 2019, No 2, pp. 162-169.10.1016/j.dt.2018.08.003
  5. 5. Alabaichi, Ashwak, M. A. Abid, A. K. Al-Dabbas, A. Salih. Image Steganography Using Least Significant Bit and Secret Map Techniques. – International Journal of Electrical & Computer Engineering, Vol. 10, 2020, No 1 pp. 2088-8708.10.11591/ijece.v10i1.pp935-946
  6. 6. Kordov, K., B. Stoyanov. Least Significant Bit Steganography Using Hitzl-Zele Chaotic Map. – International Journal of Electronics and Telecommunications, Vol. 63, 2017.10.1515/eletel-2017-0061
  7. 7. Irawan, C., C. A. Sari, E. H. Rachmawanto. Hiding and Securing Message on Edge Areas of Image Using LSB Steganography and OTP Encryption. – In: Proc of 1st International Conference on Informatics and Computational Sciences (ICICoS’17), IEEE, 2017.10.1109/ICICOS.2017.8276328
  8. 8. Tripathy, S. K., R. Srivastava. An Edge-Based Image Steganography Method Using Modulus-3 Strategy and Comparative Analysis. – In: Proc of International Conference on Computer Vision and Image Processing, Singapore, Springer, 2019.10.1007/978-981-15-4018-9_43
  9. 9. Bhardwaj, S., A. Mittal. A Survey on Various Edge Detector Techniques. – Procedia Technology, Vol. 4, 2012, pp. 220-226.10.1016/j.protcy.2012.05.033
  10. 10. Zhang, H., L. Hu. A Data Hiding Scheme Based on Multidirectional Line Encoding and Integer Wavelet Transform. – Signal Processing: Image Communication, Vol. 78, 2019, pp. 331-344.10.1016/j.image.2019.07.019
  11. 11. Bassil, Y. Image Steganography Based on a Parameterized Canny Edge Detection Algorithm. – arXiv preprint arXiv:1212.6259, 2012.10.5120/9682-4112
  12. 12. Islam, S., M. R. Modi, P. Gupta. Edge-Based Image Steganography. – EURASIP Journal on Information Security, Vol. 2014, 2014, No 1, pp. 1-14.
  13. 13. Maini, R., H. Aggarwal. Study and Comparison of Various Image Edge Detection Techniques. – International Journal of Image Processing (IJIP), Vol. 3, 2009, No 1, pp. 1-11.
  14. 14. Gaurav, K., U. Ghanekar. Image Steganography Based on Canny Edge Detection, Dilation Operator and Hybrid Coding. – Journal of Information Security and Applications, Vol. 41, 2018, pp. 41-51.10.1016/j.jisa.2018.05.001
  15. 15. Kadhim, I. J., et al. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. – Neurocomputing, Vol. 335, 2019, pp. 299-326.10.1016/j.neucom.2018.06.075
  16. 16. Hameed, M. A., et al. An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques. – IEEE Access, Vol. 7, 2019, pp. 185189-185204.10.1109/ACCESS.2019.2960254
  17. 17. Jumanto, J. An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection. – Cybernetics and Information Technologies, Vol. 18, 2018, No 2, pp. 74-88.10.2478/cait-2018-0029
  18. 18. Arora, S., S. Anand. A Proposed Method for Image Steganography Using Edge Detection. – International Journal of Emerging Technology and Advanced Engineering, Vol. 3, 2013, No 2, pp. 296-297.
  19. 19. Bassil, Y. Image Steganography Based on a Parameterized Canny Edge Detection Algorithm. – arXiv preprint arXiv:1212.6259, 2012.10.5120/9682-4112
  20. 20. Hempstalk, K. Hiding Behind Corners: Using Edges in Images for Better Steganography. – In: Proc of Computing Women’s Congress, Hamilton, New Zealand. 2006.
  21. 21. Kadhim, I. J., P. Premaratne, P. J. Vial. High Capacity Adaptive Image Steganography with Cover Region Selection Using Dual-Tree Complex Wavelet Transform. – Cognitive Systems Research, Vol. 60, 2020, pp. 20-32.10.1016/j.cogsys.2019.11.002
  22. 22. Setiadi, De Rosal, I. Moses. PSNR vs SSIM: Imperceptibility Quality Assessment for Image Steganography. – Multimedia Tools and Applications, 2020.10.1007/s11042-020-10035-z
  23. 23. Setiadi, De Rosal, I. Moses. Payload Enhancement on Least Significant Bit Image Steganography Using Edge Area Dilation. – International Journal of Electronics and Telecommunications, Vol. 65, 2019.
DOI: https://doi.org/10.2478/cait-2021-0032 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 97 - 107
Submitted on: Apr 28, 2021
Accepted on: Jul 15, 2021
Published on: Dec 7, 2021
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2021 Nadia A. Mohsin, Huda A. Alameen, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.