CFP last date
20 May 2024
Reseach Article

Adaptive Method of Data Hiding using Edge Detection

by Harpreet Kaur, Ajay Kakkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 172 - Number 2
Year of Publication: 2017
Authors: Harpreet Kaur, Ajay Kakkar
10.5120/ijca2017915093

Harpreet Kaur, Ajay Kakkar . Adaptive Method of Data Hiding using Edge Detection. International Journal of Computer Applications. 172, 2 ( Aug 2017), 41-45. DOI=10.5120/ijca2017915093

@article{ 10.5120/ijca2017915093,
author = { Harpreet Kaur, Ajay Kakkar },
title = { Adaptive Method of Data Hiding using Edge Detection },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 172 },
number = { 2 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume172/number2/28227-2017915093/ },
doi = { 10.5120/ijca2017915093 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:19:18.012328+05:30
%A Harpreet Kaur
%A Ajay Kakkar
%T Adaptive Method of Data Hiding using Edge Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 172
%N 2
%P 41-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data security is of utmost importance for an institution, organization and many government sectors to keep the confidential information protected from different competitors. It will help to make sure that the security of user’s data is maintained. In today’s time most of the information is first received, processed and finally is get saved within the computers and further transmitted across different networks, therefore, it is required to preserve the data in order to maintain confidentiality. Keeping in mind the importance of steganography for transmission of secret data a data hiding algorithm using edge detection and clustering mechanism is proposed. Data is embedded using LSB scheme. Also, comparison using two edge detection algorithms has been done. Simulation results of the proposed algorithm show good value of PSNR as well as an acceptable quality of the stego image which makes it difficult to detect any presence of embedded data in the cover image and hence make it secure for transmission.

References
  1. Z. Zhang, C. Zhu, and Y. Zhao 2008. Two-Description Image Coding With Steganography. IEEE Signal Processing Letters, 15, 887-890.
  2. S. Sarreshtedari and M.A.Akhaee 2014. One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme. IET Image Process, 8(2), 78-89.
  3. X. Liao, Q.Y. Wen, J. Zhang 2011. A steganographic method for digital images with four-pixel differencing and modified LSB substitution, Journal of visual communication and image representation, 22 (1), 1-8.
  4. C.L.Hou, C.C. Lu, S.C. Tsai and W.G. Tzeng 2011. An Optimal Data Hiding Scheme with tree-based parity check. IEEE Transactions on Image Processing,. 20(3).
  5. S. Bhati, A. Bhati and S. K. Sharma 2012. A New Approach towards Encryption Schemes:Byte- Rotation Encryption Algorithm. Proceedings of the World Congress on Engineering and Computer Science 2012, 2.
  6. M.S. Subhedar and V.H. Mankar 2014. Current status and key issues in image steganography: A survey. Computer Science Review, 13, 95-113.
  7. R. Pakshwar, V.K. Trivedi and V. Richhariya 2013. Survey On Different Image Encryption and Decryption Techniques. International Journal of Computer Science and Information Technologies, 4 (1), 113-116.
  8. M. Jain and S.M. Lenka 2016. A Review of Digital Image Steganography using LSB and LSB Array, International Journal of Applied Engineering Research, 11(3), 1820-1824.
  9. H.R. Kanan and B. Nazeri 2014. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm, Expert Systems with Applications, 41, 6123-6130.
  10. A. Kakkar, M.L. Singh and P.K. Bansal 2012. Mathematical Analysis and Simulation of Multiple Keys and S-Boxes in a Multi-node network for Secure Transmission, International Journal of Computer Mathematics, 89(16), 2123-2142.
  11. V. Agrawal, S. Agrawal and R. Deshmukh 2014. Analysis and Review of Encryption and Decryption for Secure Communication, International Journal of Scientific Engineering and Research, 2(2), 1-3.
  12. S.U. Maheswari and D.J. Hemanth 2015. Frequency domain QR code based image steganography using Fresnelet transform, International Journal of Electronics and Communication, 69, 539-544.
  13. H. Sajedi 2016. Steganalysis based on steganography pattern discovery, Journal of Information Security and Applications, 30, 3-14.
  14. H. Dadgostar, F. Afsari 2016. Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. Journal of Information Security and Applications, 1-11.
  15. A. Malik, G. Sikka and H.K. Verma 2017. A high capacity text steganography scheme based on LZW compression and color coding, Engineering Science and Technology, an International Journal, 20, 72-7.
  16. Maninder singh and Dhanwant singh (2015). Energy efficient key management scheme for wireless sensor networks. International Journal of Research in Information Technology, 3 (8), 166-173.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Fuzzy Edge detection Clustering Data Embedding