Image Steganography Based on Hamming Code and Edge Detection

被引:0
|
作者
Sun, Shuliang [1 ]
机构
[1] Fujian Normal Univ, Sch Elect & Informat Engn, Fuqing Branch, Fuzhou, Fujian, Peoples R China
关键词
Hamming code; 2(k) correction; coherent bit length; canny edge detector;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper a novel algorithm which is based on hamming code and 2(k) correction is proposed. The new method also utilizes canny edge detection and coherent bit length. Firstly, canny edge detector is applied to detect the edge of cover image and only edge pixels are selected for embedding payload. In order to enhance security, the edge pixels are scrambled. Then hamming encoding is practiced to code the secret data before embedded. Calculate coherent bit length L on the base of relevant edge pixels and replace with L bits of payload message. Finally, the method of 2(k) correction is applied to achieve better imperceptibility in stego image. The experiment shows that the proposed method is more advantage in Peak Signal-to-Noise Ratio (PSNR), capacity and universal image quality index (Q) than other methods.
引用
收藏
页码:875 / 880
页数:6
相关论文
共 50 条
  • [21] Image steganography based on Canny edge detection, dilation operator and hybrid coding
    Gaurav, Kumar
    Ghanekar, Umesh
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 41 - 51
  • [22] A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection
    Mohsin, Nadia A.
    Alameen, Huda A.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (03) : 97 - 107
  • [23] An efficient image authentication method based on Hamming code
    Chan, Chi-Shiang
    Chang, Chin-Chen
    PATTERN RECOGNITION, 2007, 40 (02) : 681 - 690
  • [24] An Edge Based Image Steganography with Compression and Encryption
    Mishra, Rina
    Mishra, Atish
    Bhanodiya, Praveen
    2015 International Conference on Computing, Communication and Security (ICCCS), 2015,
  • [25] A Novel Edge Based Image Steganography Technique
    Seeja, K. R.
    Rana, Jyoti
    Priya, Srishti
    Ahuja, Latika
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 66 - 75
  • [26] An Edge Based Image Steganography with Compression and Encryption
    Mishra, Rina
    Mishra, Atish
    Bhanodiya, Praveen
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [27] Edge based image steganography with variable threshold
    Srilekha Mukherjee
    Goutam Sanyal
    Multimedia Tools and Applications, 2019, 78 : 16363 - 16388
  • [28] Chaos based Edge Adaptive Image Steganography
    Roy, Ratnakirti
    Sarkar, Anirban
    Changder, Suvamoy
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 138 - 146
  • [29] IMAGE SEGMENTATION BASED ON EDGE DETECTION USING BOUNDARY CODE
    Uemura, Takumi
    Koutaki, Gou
    Uchimura, Keiichi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (10): : 6073 - 6083
  • [30] A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images
    Sara Charoghchi
    Samaneh Mashhadi
    Multimedia Tools and Applications, 2024, 83 : 31933 - 31955