Open Access Open Access  Restricted Access Subscription or Fee Access

An Edge Base Detection Image Steganography

Jasleen kaur, Neetika soni

Abstract


Steganography is an important technique used for data hiding. It is being used by military, govt. agencies and other major agencies for concealing their information during transit and storage. The basic need of any steganography technique is data hiding capacity and undetectability. In this paper we have implemented an XOR based coding technique and the IWT based XOR coding technique for image steganography for Images. The experiment is conducted to test the effectiveness of our algorithm. Result proves the new proposed and implemented technique to be more successful than the previous ones.


Keywords


Edge, IWT, MSE, Spatial, XOR, Image Steganography, Edge Detection, Image Processing, Security, Data Hiding.

Full Text:

PDF

References


Al-Dmour, H. and Al-Ani, A., 2016. A steganography embedding method based on edge identification and XOR coding. Expert Systems with Applications, 46, pp.293-306.

Al-Dmour, H., Ali, N. and Al-Ani, A., 2015, January. An efficient hybrid steganography method based on edge adaptive and tree based parity check. In MultiMedia Modeling (pp. 1-12). Springer International Publishing.

Anindya Sarkar, Member, IEEE, UpamanyuMadhow, Fellow,IEEE, and B.S.Manjunath, Fellow, IEEE, (2010) “Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography”, IEEE Transactions on Information Forensics and Security, Vol.5.No.2, pp.225-239.

Baby, D., Thomas, J., Augustine, G., George, E. and Michael, N.R., 2015. A novel DWT based image securing method using steganography. Procedia Computer Science, 46, pp.612-618.

Bandyopadhyay, D., Dasgupta, K., Mandal, J.K. and Dutta, P., 2014. A novel secure image steganography method based on Chaos theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), pp.11-22.

Bassil, Y., 2012. Image steganography based on a parameterized canny edge detection algorithm. arXiv preprint arXiv:1212.6259.

BawankarChetan.D, Hande.K.N, Jaiswal .A.A & Bute. A (2009) “Pattern Matching With External Hardware For Steganography Algorithm”, International Journal of Information Technology and Knowledge Management, Vol. 2 No.2, pp 289-295.

Cetin, O. and Ozcerit, A.T., 2009. A new steganography algorithm based on color histograms for data embedding into raw video streams. Computers& security, 28(7), pp.670-682.

Chen, W.J., Chang, C.C. and Le, T.H.N., 2010. High payload steganography mechanism using hybrid edge detector. Expert Systems with applications, 37(4), pp.3292-3301.

C.-H. Yang and M.-H. Tsai, (2010) “Improving Histogram-based Reversible Data Hiding by Interleaving Predictions”, IET Image Processing, Vol.4. Iss. 4 pp. 223-234.

Chin Chen Chang, Piyu Tsai & Min-Hui Lin (2004) “An Adaptive Steganography for Index-Based Images using Codeword Grouping”, Springer-Verlag Berlin Heidelberg 2004, pp.731- 738.

Duh, Fun-Bin, and Chin-Teng Lin. "Tracking a maneuvering target using neural fuzzy network." Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 34.1 (2004): 16-33.

Duh, Fun-Bin, Chia-Feng Juang, and Chin-Teng Lin. "Application of neural fuzzy network to pulse compression with binary phase code." Fuzzy Systems, 2003. FUZZ'03. The 12th IEEE International Conference on. Vol. 2. IEEE, 2003.

Geetha, S., Ishwarya, N. and Kamaraj, N., 2010. Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm. Expert Systems with Applications, 37(12), pp.7469-7482.

G. Sahoo& Rajesh Kumar Tiwari (2009) “Hiding Secret Information in Movie Clip: A Steganographic Approach”, International Journal of Computing and Applications, Vol. 4, No.1, pp 103-110.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.