Open Access

An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection


Cite

1. Yang, C.-H., C.-Y. Weng, S.-J. Wang, H.-M. Sun. Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. – IEEE Transactions on Information Forensics and Security, Vol. 3, 2008, No 3, pp. 488-497.10.1109/TIFS.2008.926097Search in Google Scholar

2. Verma, M., R. Rani. Significant Secret Image Sharing Scheme Based on Boolean Operation. – Cybernetics and Information Technologies, Vol. 17, 2017, No 2, pp. 134-150.10.1515/cait-2017-0022Search in Google Scholar

3. Setiadi, D. R. I. M., T. Sutojo, E. H. Rachmawanto, C. A. Sari. Fast and Efficient Image Watermarking Algorithm Using Discrete Tchebichef Transform. – In: International Conference on Cyber and IT Service Management (CITSM’17), Denpasar, 2017.10.1109/CITSM.2017.8089229Search in Google Scholar

4. Nag, A., S. Biswas, D. Sarkar, Partha. Secret Image Sharing Scheme Based on a Boolean Operation. – Cybernetics and Iformation Technologies, Vol. 14, 2014, No 2, pp. 98-113.10.2478/cait-2014-0023Search in Google Scholar

5. Ardy, R. D., O. R. Indriani, C. A. Sari, D. R. I. M. Setiadi, E. H. Rachmawanto. Digital Image Signature Using Triple Protection Cryptosystem (RSA, Vigenere, and MD5). – In: International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS’17), Yogyakarta, 2017.Search in Google Scholar

6. Setiadi, D. R. I. M., H. A. Santoso, E. H. Rachmawanto, C. A. Sari. An Improved Message Capacity and Security Using Divide and Modulus Function in Spatial Domain Steganography. – In: International Conference on Information and Communications Technology (ICOIACT’18), Yogyakarta, 2018.10.1109/ICOIACT.2018.8350670Search in Google Scholar

7. Setyono, A., D. R. I. M. Setiadi, Muljono. StegoCrypt Method Using Wavelet Transform and One-Time Pad for Secret Image Delivery. – In: International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE’17), Semarang, 2017.10.1109/ICITACEE.2017.8257703Search in Google Scholar

8. Zhu, Z., T. Zhang, P. Zhu, B. Wan, X. Hou. Steganalysis of AE-LSB Steganography Based on Pixel Value Differencing. – In: International Conference on Natural Computation (ICNC’13), Shenyang, 2013.10.1109/ICNC.2013.6818208Search in Google Scholar

9. Astuti, Y. P., D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari. Simple and Secure Image Steganography Using LSB and Triple XOR Operation on MSB. – In: International Conference on Information and Communications Technology (ICOIACT’18), Yogyakarta, 2018.10.1109/ICOIACT.2018.8350661Search in Google Scholar

10. Singla, D., M. Juneja. An Analysis of Edge Based Image Steganography Techniques in Spatial Domain. – In: Recent Advances in Engineering and Computational Sciences (RAECS’14), Chandigarh, 2014.10.1109/RAECS.2014.6799604Search in Google Scholar

11. Bai, J., C.-C. Chang, T.-S. Nguyen, C. Zhu, Y. Liu. A High Payload Steganographic Algorithm Based on Edge Detection. – Displays, Vol. 46, 2017, No 1, pp. 42-51.10.1016/j.displa.2016.12.004Search in Google Scholar

12. Islam, S., M. R. Modi, P. Gupta. Edge-Based Image Steganography. – EURASIP Journal on Information Security, Vol. 2014, 2014, No 1.10.1186/1687-417X-2014-8Search in Google Scholar

13. Irawan, C., D. R. I. M. Setiadi, C. A. Sari, E. H. Rachmawanto. Hiding and Securing Message on Edge Areas of Image Using LSB Steganography and OTP Encryption. – In: International Conference on Informatics and Computational Sciences (ICICoS’17), Semarang, 2017.10.1109/ICICOS.2017.8276328Search in Google Scholar

14. Mohamed, M. H., N. M. AL-Aidroos, M. A. Bamatraf. A Combined Image Steganography Technique Based on Edge Concept & Dynamic LSB. – International Journal of Engineering Research & Technology (IJERT), Vol. 1, 2012, No 8, pp. 1-7.Search in Google Scholar

15. Kalra, A., R. L. Chhokar. A Hybrid Approach Using Sobel and Canny Operator for Digital Image Edge Detection. – In: International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE’16), Ghaziabad, 2016.10.1109/ICMETE.2016.49Search in Google Scholar

16. Goodarzi, M. H., A. Zaeim, A. S. Shahabi. Convergence between Fuzzy Logic and Steganography for High Payload Data Embedding and More Security. – In: International Conference on Telecommunication Systems, Services, and Applications (TSSA’11), Bali, 2011.10.1109/TSSA.2011.6095421Search in Google Scholar

17. Singla, D., D. M. Juneja. New Information Hiding Technique Using Features of Image. – Journal of Emerging Technologies in Web Intelligence, Vol. 6, 2014, No 2, pp. 237-242.10.4304/jetwi.6.2.237-242Search in Google Scholar

18. Canny, J. A Computational Approach to Edge Detection. – IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. PAMI-8, 1986, No 6, pp. 679-698.10.1109/TPAMI.1986.4767851Search in Google Scholar

19. Nikolic, M., E. Tuba, M. Tuba. Edge Detection in Medical Ultrasound Images Using Adjusted Canny Edge Detection Algorithm. – In: Telecommunications Forum (TELFOR’16), Belgrade, 2016.10.1109/TELFOR.2016.7818878Search in Google Scholar

20. Kaur, P., B. Kaur. 2-D Geometric Shape Recognition Using Canny Edge Detection Technique. – In: International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016.Search in Google Scholar

21. Jin-Yu, Z., C. Yan, H. Xian-Xiang. Edge Detection of Images Based on Improved Sobel Operator and Genetic Algorithms. – In: International Conference on Image Analysis and Signal Processing, Linhai, 2009.Search in Google Scholar

22. Gao, W., X. Zhang, L. Yang, H. Liu. An Improved Sobel Edge Detection. – In: IEEE International Conference on Computer Science and Information Technology (ICCSIT’10), Chengdu, 2010.Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology