Accès libre

A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection

À propos de cet article

Citez

1. Ghosal, S. K., A. Chatterjee, R. Sarkar. Image Steganography Based on Kirsch Edge Detection. – Multimedia Systems, 2020, pp. 1-15.10.1007/s00530-020-00703-3 Search in Google Scholar

2. Zhang, H., L. Hu. A Data Hiding Scheme Based on Multidirectional Line Encoding and Integer Wavelet Transform. – Signal Processing: Image Communication, Vol. 78, 2019, pp. 331-344.10.1016/j.image.2019.07.019 Search in Google Scholar

3. Hamid, N., et al. Image Steganography Techniques: An Overview. – International Journal of Computer Science and Security (IJCSS), Vol. 6, 2012, No 3, pp. 168-187. Search in Google Scholar

4. Kumar, S., A. Singh, M. Kumar. Information Hiding with Adaptive Steganography Based on Novel Fuzzy Edge Identification. – Defence Technology, Vol. 15, 2019, No 2, pp. 162-169.10.1016/j.dt.2018.08.003 Search in Google Scholar

5. Alabaichi, Ashwak, M. A. Abid, A. K. Al-Dabbas, A. Salih. Image Steganography Using Least Significant Bit and Secret Map Techniques. – International Journal of Electrical & Computer Engineering, Vol. 10, 2020, No 1 pp. 2088-8708.10.11591/ijece.v10i1.pp935-946 Search in Google Scholar

6. Kordov, K., B. Stoyanov. Least Significant Bit Steganography Using Hitzl-Zele Chaotic Map. – International Journal of Electronics and Telecommunications, Vol. 63, 2017.10.1515/eletel-2017-0061 Search in Google Scholar

7. Irawan, C., C. A. Sari, E. H. Rachmawanto. Hiding and Securing Message on Edge Areas of Image Using LSB Steganography and OTP Encryption. – In: Proc of 1st International Conference on Informatics and Computational Sciences (ICICoS’17), IEEE, 2017.10.1109/ICICOS.2017.8276328 Search in Google Scholar

8. Tripathy, S. K., R. Srivastava. An Edge-Based Image Steganography Method Using Modulus-3 Strategy and Comparative Analysis. – In: Proc of International Conference on Computer Vision and Image Processing, Singapore, Springer, 2019.10.1007/978-981-15-4018-9_43 Search in Google Scholar

9. Bhardwaj, S., A. Mittal. A Survey on Various Edge Detector Techniques. – Procedia Technology, Vol. 4, 2012, pp. 220-226.10.1016/j.protcy.2012.05.033 Search in Google Scholar

10. Zhang, H., L. Hu. A Data Hiding Scheme Based on Multidirectional Line Encoding and Integer Wavelet Transform. – Signal Processing: Image Communication, Vol. 78, 2019, pp. 331-344.10.1016/j.image.2019.07.019 Search in Google Scholar

11. Bassil, Y. Image Steganography Based on a Parameterized Canny Edge Detection Algorithm. – arXiv preprint arXiv:1212.6259, 2012.10.5120/9682-4112 Search in Google Scholar

12. Islam, S., M. R. Modi, P. Gupta. Edge-Based Image Steganography. – EURASIP Journal on Information Security, Vol. 2014, 2014, No 1, pp. 1-14. Search in Google Scholar

13. Maini, R., H. Aggarwal. Study and Comparison of Various Image Edge Detection Techniques. – International Journal of Image Processing (IJIP), Vol. 3, 2009, No 1, pp. 1-11. Search in Google Scholar

14. Gaurav, K., U. Ghanekar. Image Steganography Based on Canny Edge Detection, Dilation Operator and Hybrid Coding. – Journal of Information Security and Applications, Vol. 41, 2018, pp. 41-51.10.1016/j.jisa.2018.05.001 Search in Google Scholar

15. Kadhim, I. J., et al. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. – Neurocomputing, Vol. 335, 2019, pp. 299-326.10.1016/j.neucom.2018.06.075 Search in Google Scholar

16. Hameed, M. A., et al. An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques. – IEEE Access, Vol. 7, 2019, pp. 185189-185204.10.1109/ACCESS.2019.2960254 Search in Google Scholar

17. Jumanto, J. An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection. – Cybernetics and Information Technologies, Vol. 18, 2018, No 2, pp. 74-88.10.2478/cait-2018-0029 Search in Google Scholar

18. Arora, S., S. Anand. A Proposed Method for Image Steganography Using Edge Detection. – International Journal of Emerging Technology and Advanced Engineering, Vol. 3, 2013, No 2, pp. 296-297. Search in Google Scholar

19. Bassil, Y. Image Steganography Based on a Parameterized Canny Edge Detection Algorithm. – arXiv preprint arXiv:1212.6259, 2012.10.5120/9682-4112 Search in Google Scholar

20. Hempstalk, K. Hiding Behind Corners: Using Edges in Images for Better Steganography. – In: Proc of Computing Women’s Congress, Hamilton, New Zealand. 2006. Search in Google Scholar

21. Kadhim, I. J., P. Premaratne, P. J. Vial. High Capacity Adaptive Image Steganography with Cover Region Selection Using Dual-Tree Complex Wavelet Transform. – Cognitive Systems Research, Vol. 60, 2020, pp. 20-32.10.1016/j.cogsys.2019.11.002 Search in Google Scholar

22. Setiadi, De Rosal, I. Moses. PSNR vs SSIM: Imperceptibility Quality Assessment for Image Steganography. – Multimedia Tools and Applications, 2020.10.1007/s11042-020-10035-z Search in Google Scholar

23. Setiadi, De Rosal, I. Moses. Payload Enhancement on Least Significant Bit Image Steganography Using Edge Area Dilation. – International Journal of Electronics and Telecommunications, Vol. 65, 2019. Search in Google Scholar

eISSN:
1314-4081
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Computer Sciences, Information Technology