Image Steganography Using Edge Detection Technique
DOI:
https://doi.org/10.26438/ijcse/v6i12.222227Keywords:
PSNR, Bit Error Rate, MSE, Stegnography, Huffman CodingAbstract
Nowadays, the mechanisms are growing among the high speed and novel developments are accomplished day by day. Every day as a huge amount of data shared within the diverse users on the internet so the sharing of data is enhanced. In order to hide the occurrence of the communication, the steganography is utilized. In a suitable carrier such as image, video or audio this mechanism deals among the insertion of the secret message. Due to its broad utilization on the internet, the digital images are majorly preferred over the other carriers. For the implementation, the MATLAB software is utilized. In this paper, a couple of methods are utilized to embed the secret message. Those methods are original binary form and complemented form of a binary converted message, to advance security. For the embedding purpose, fuzzy edge detection technique is utilized and in order to hide the information into an image, the LSB mechanism is proposed. In the proposed work fuzzy technique will be utilized to offer more sharp edges having more data and to acquire the continuity. Huffman coding compression technique is utilized to compress the data and also to send more data on less space. The MSE, BER, and PSNR are utilized as a calculation of performance analysis.
References
[1] Soni, A.; Jain, J.; Roshan, R., "Image Steganography using discrete fractional Fourier transform," Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on , vol., no., pp.97,100, 1-2 March 2013.
[2] Masud Karim, S.M.; Rahman, M.S.; Hossain, M.I., "A new approach for LSB based image Steganography using secret key," Computer and Information Technology (ICCIT), 2011 14th International Conference on , vol., no., pp.286,291, 22-24 Dec. 2011.
[3] Shrutika Suri,” Comparative Analysis of Steganography for Coloured Images”, JCSE, vol 2(4), Pp 180-184, 2014
[4] Sabyasachi Pramanik,” Image Steganography Using Wavelet Transform And Genetic Algorithm”, IJIRAE, vol 1(1), Pp 17-20,2014
[5] Chin-Chen Chang,” Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques”, journal of information hiding and data processing, vol 5(3), Pp 342-352, 2014
[6] Komal Hirachandani, “New Approach of Information Security through Steganography by using Wavelet Transformation and Symmetric Encryption”, IJCSIT, vol 5(5), Pp 6253-6260,
[7] Shemi P B,” An Enhanced Image Steganography Technique in Art Images”, IJCSMC, Vol.3 Issue.8, August- 2014, pg. 613-621
[8] Mohammad Sajid Khan, “Encryption Based Steganography- Modern Approach for Information Security”, IJCSIT, Vol. 5 (3) , Pp 2914-2917, 2014
[9] Takashi Mihara,” A New Framework of Steganography Using the Content of Cover Data”, Journal of information hiding and multimedia signal processing, Vol 5(2), Pp 117-123, 2014
[10] Prof.Pramod Khandare,” Data Hiding Technique Using Steganography”, IJCSIT, Vol. 5 (2) , Pp 1785-1787, 2014
[11] Shikha Mohan,” Image Steganography: Classification, Application and Algorithms”, IJCEM, Vol 1(10), Pp 93-97, 2015
[12] M. Kameswara Rao, ” Security Enhancement in Image Steganography a MATLAB Approach”, Journal of scientific research, Vol 23(2), Pp 357-361, 2015
[13] Chaitali R. Gaidhani, ” Image Steganography for Message Hiding Using Genetic”, IJCSE, vol 2(3), Pp 67-70, 2014
[14] Mamta Juneja, “Improved LSB based Steganography Techniques for Color Images in Spatial Domain”, IJNS, vol 16(6), Pp 452-462, 2014
[15] Bhattacharjee, T., Nov. 2014 “Progressive quality access through secret sharing and data hiding scheme”Pp 5-7,2014
[16] Preeti Parashar ,2014“A Survey: Digital Image Watermarking Techniques”, ijsp, Vol. 7(6), pp. 111-124, 2014
[17] Monika Patel,Priti Srinivas Sajja,” Analysis and Survey of Digital Watermarking Techniques”, ijarcsse, Vol 3, Pp 203-210, 2013
[18] Sahar A. El_Rahman, “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information”, ELSEVIER, Pp 1-20, 2016
[19] Abhinav Shrivastav,”Survey report on Different Techniques of Image Encrption”, IJETAE, vol 2, Issue 6, Pp 163-167, 2012
[20] Lauren Dubreuil,”Spread Spectrum, Cryptography and information Hiding”,
[21] Swati malik, Ajit “Securing Data by Using Cryptography with Steganography”,IJARCSSE Volume 3, Issue 5, May 2013
[22] Anil Kumar (2013), “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, Pp 363-372
[23] Mehdi Hussain , A “Survey of Image Steganography Techniques”, IJAST Vol. 54,Pp 113-124, 2013
[24] Dr. Mahesh Kumar,”Image Steganography using Frequency domain”, IJST, vol 3, Issue 9, Pp 226-230, 2014
[25] Akanksha Kaushal,”Secured Image steganography using Different Transform Domain”, IJCA, vol 77, Issue 2, Pp 24-38, 2013
[26] C.P.Sumathi, “A Study of Various Steganography Techniques Used for Information Hiding “,IJCSES) Vol.4, No.6, Issue 9,Pp 9-25, 2013
[27] Amritpal Singh,”An overview of Image Steganography Techniques”, IJECS, vol 3, Issue 7, Pp 7341-7345, 2014
[28] Parmar Ajit Kumar Maganbha,” A Study and literature Review on Image Steganography”, IJCSIT, vol 6, Issue 1, Pp 686-688, 2015
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
