Open Access   Article Go Back

Image Steganography Using Edge Detection Technique

Kirti Chopra1 , Ishpreet Singh Virk2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 222-227, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.222227

Online published on Dec 31, 2018

Copyright © Kirti Chopra, Ishpreet Singh Virk . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kirti Chopra, Ishpreet Singh Virk, “Image Steganography Using Edge Detection Technique,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.222-227, 2018.

MLA Style Citation: Kirti Chopra, Ishpreet Singh Virk "Image Steganography Using Edge Detection Technique." International Journal of Computer Sciences and Engineering 6.12 (2018): 222-227.

APA Style Citation: Kirti Chopra, Ishpreet Singh Virk, (2018). Image Steganography Using Edge Detection Technique. International Journal of Computer Sciences and Engineering, 6(12), 222-227.

BibTex Style Citation:
@article{Chopra_2018,
author = {Kirti Chopra, Ishpreet Singh Virk},
title = {Image Steganography Using Edge Detection Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {222-227},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3319},
doi = {https://doi.org/10.26438/ijcse/v6i12.222227}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.222227}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3319
TI - Image Steganography Using Edge Detection Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Kirti Chopra, Ishpreet Singh Virk
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 222-227
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
577 304 downloads 241 downloads
  
  
           

Abstract

Nowadays, the mechanisms are growing among the high speed and novel developments are accomplished day by day. Every day as a huge amount of data shared within the diverse users on the internet so the sharing of data is enhanced. In order to hide the occurrence of the communication, the steganography is utilized. In a suitable carrier such as image, video or audio this mechanism deals among the insertion of the secret message. Due to its broad utilization on the internet, the digital images are majorly preferred over the other carriers. For the implementation, the MATLAB software is utilized. In this paper, a couple of methods are utilized to embed the secret message. Those methods are original binary form and complemented form of a binary converted message, to advance security. For the embedding purpose, fuzzy edge detection technique is utilized and in order to hide the information into an image, the LSB mechanism is proposed. In the proposed work fuzzy technique will be utilized to offer more sharp edges having more data and to acquire the continuity. Huffman coding compression technique is utilized to compress the data and also to send more data on less space. The MSE, BER, and PSNR are utilized as a calculation of performance analysis.

Key-Words / Index Term

PSNR, Bit Error Rate, MSE, Stegnography, Huffman Coding

References

[1] Soni, A.; Jain, J.; Roshan, R., "Image Steganography using discrete fractional Fourier transform," Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on , vol., no., pp.97,100, 1-2 March 2013.
[2] Masud Karim, S.M.; Rahman, M.S.; Hossain, M.I., "A new approach for LSB based image Steganography using secret key," Computer and Information Technology (ICCIT), 2011 14th International Conference on , vol., no., pp.286,291, 22-24 Dec. 2011.
[3] Shrutika Suri,” Comparative Analysis of Steganography for Coloured Images”, JCSE, vol 2(4), Pp 180-184, 2014
[4] Sabyasachi Pramanik,” Image Steganography Using Wavelet Transform And Genetic Algorithm”, IJIRAE, vol 1(1), Pp 17-20,2014
[5] Chin-Chen Chang,” Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques”, journal of information hiding and data processing, vol 5(3), Pp 342-352, 2014
[6] Komal Hirachandani, “New Approach of Information Security through Steganography by using Wavelet Transformation and Symmetric Encryption”, IJCSIT, vol 5(5), Pp 6253-6260,
[7] Shemi P B,” An Enhanced Image Steganography Technique in Art Images”, IJCSMC, Vol.3 Issue.8, August- 2014, pg. 613-621
[8] Mohammad Sajid Khan, “Encryption Based Steganography- Modern Approach for Information Security”, IJCSIT, Vol. 5 (3) , Pp 2914-2917, 2014
[9] Takashi Mihara,” A New Framework of Steganography Using the Content of Cover Data”, Journal of information hiding and multimedia signal processing, Vol 5(2), Pp 117-123, 2014
[10] Prof.Pramod Khandare,” Data Hiding Technique Using Steganography”, IJCSIT, Vol. 5 (2) , Pp 1785-1787, 2014
[11] Shikha Mohan,” Image Steganography: Classification, Application and Algorithms”, IJCEM, Vol 1(10), Pp 93-97, 2015
[12] M. Kameswara Rao, ” Security Enhancement in Image Steganography a MATLAB Approach”, Journal of scientific research, Vol 23(2), Pp 357-361, 2015
[13] Chaitali R. Gaidhani, ” Image Steganography for Message Hiding Using Genetic”, IJCSE, vol 2(3), Pp 67-70, 2014
[14] Mamta Juneja, “Improved LSB based Steganography Techniques for Color Images in Spatial Domain”, IJNS, vol 16(6), Pp 452-462, 2014
[15] Bhattacharjee, T., Nov. 2014 “Progressive quality access through secret sharing and data hiding scheme”Pp 5-7,2014
[16] Preeti Parashar ,2014“A Survey: Digital Image Watermarking Techniques”, ijsp, Vol. 7(6), pp. 111-124, 2014
[17] Monika Patel,Priti Srinivas Sajja,” Analysis and Survey of Digital Watermarking Techniques”, ijarcsse, Vol 3, Pp 203-210, 2013
[18] Sahar A. El_Rahman, “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information”, ELSEVIER, Pp 1-20, 2016
[19] Abhinav Shrivastav,”Survey report on Different Techniques of Image Encrption”, IJETAE, vol 2, Issue 6, Pp 163-167, 2012
[20] Lauren Dubreuil,”Spread Spectrum, Cryptography and information Hiding”,
[21] Swati malik, Ajit “Securing Data by Using Cryptography with Steganography”,IJARCSSE Volume 3, Issue 5, May 2013
[22] Anil Kumar (2013), “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, Pp 363-372
[23] Mehdi Hussain , A “Survey of Image Steganography Techniques”, IJAST Vol. 54,Pp 113-124, 2013
[24] Dr. Mahesh Kumar,”Image Steganography using Frequency domain”, IJST, vol 3, Issue 9, Pp 226-230, 2014
[25] Akanksha Kaushal,”Secured Image steganography using Different Transform Domain”, IJCA, vol 77, Issue 2, Pp 24-38, 2013
[26] C.P.Sumathi, “A Study of Various Steganography Techniques Used for Information Hiding “,IJCSES) Vol.4, No.6, Issue 9,Pp 9-25, 2013
[27] Amritpal Singh,”An overview of Image Steganography Techniques”, IJECS, vol 3, Issue 7, Pp 7341-7345, 2014
[28] Parmar Ajit Kumar Maganbha,” A Study and literature Review on Image Steganography”, IJCSIT, vol 6, Issue 1, Pp 686-688, 2015