Image Steganography Based on Hamming Code and Edge Detection

被引:0
|
作者
Sun, Shuliang [1 ]
机构
[1] Fujian Normal Univ, Sch Elect & Informat Engn, Fuqing Branch, Fuzhou, Fujian, Peoples R China
关键词
Hamming code; 2(k) correction; coherent bit length; canny edge detector;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper a novel algorithm which is based on hamming code and 2(k) correction is proposed. The new method also utilizes canny edge detection and coherent bit length. Firstly, canny edge detector is applied to detect the edge of cover image and only edge pixels are selected for embedding payload. In order to enhance security, the edge pixels are scrambled. Then hamming encoding is practiced to code the secret data before embedded. Calculate coherent bit length L on the base of relevant edge pixels and replace with L bits of payload message. Finally, the method of 2(k) correction is applied to achieve better imperceptibility in stego image. The experiment shows that the proposed method is more advantage in Peak Signal-to-Noise Ratio (PSNR), capacity and universal image quality index (Q) than other methods.
引用
收藏
页码:875 / 880
页数:6
相关论文
共 50 条
  • [11] High-capacity adaptive steganography based on LSB and Hamming code
    Wang, Yanting
    Tang, Mingwei
    Wang, Zhen
    OPTIK, 2020, 213 (213):
  • [12] High performance image steganography integrating IWT and Hamming code within secret sharing
    Saeidi, Zahra
    Yazdi, Ameneh
    Mashhadi, Samaneh
    Hadian, Masoud
    Gutub, Adnan
    IET IMAGE PROCESSING, 2024, 18 (01) : 129 - 139
  • [13] Edge-based image steganography
    Islam, Saiful
    Modi, Mangat R.
    Gupta, Phalguni
    EURASIP JOURNAL ON INFORMATION SECURITY, 2014, Springer International Publishing (01):
  • [14] Steganography Based on Grayscale Images Using (5,3) Hamming Code
    Kim, Cheonshik
    Yang, Ching-Nung
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 588 - 598
  • [15] A Huffman Code Based Image Steganography Technique
    Nag, Amitava
    Singh, Jyoti Prakash
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha Pratim
    APPLIED ALGORITHMS, 2014, 8321 : 257 - 265
  • [16] Key Dependent Image Steganography Using Edge Detection
    Alam, Shahzad
    Kumar, Vipin
    Siddiqui, Waseem A.
    Ahmad, Musheer
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 85 - 88
  • [17] Edge Based Image Steganography: Problems and Solution
    Rashid, Rasber Dh.
    Majeed, Taban F.
    2019 3RD INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND THEIR APPLICATIONS (ICCSPA), 2019,
  • [18] Edge based image steganography with variable threshold
    Mukherjee, Srilekha
    Sanyal, Goutam
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) : 16363 - 16388
  • [19] A novel technique for image steganography based on a high payload method and edge detection
    Ioannidou, Anastasia
    Halkidis, Spyros T.
    Stephanides, George
    EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (14) : 11517 - 11524
  • [20] Hybrid Edge Detection-Based Image Steganography Technique for Color Images
    Singla, Deepali
    Juneja, Mamta
    INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, 2015, 309 : 277 - 280