CFP last date
20 May 2024
Reseach Article

Proposed Method of Text Hiding in Image Edges

by Nasseer M. Basheer, Ashty M. Aaref, Dhafer J. Ayyed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 11
Year of Publication: 2015
Authors: Nasseer M. Basheer, Ashty M. Aaref, Dhafer J. Ayyed
10.5120/ijca2015906225

Nasseer M. Basheer, Ashty M. Aaref, Dhafer J. Ayyed . Proposed Method of Text Hiding in Image Edges. International Journal of Computer Applications. 126, 11 ( September 2015), 33-37. DOI=10.5120/ijca2015906225

@article{ 10.5120/ijca2015906225,
author = { Nasseer M. Basheer, Ashty M. Aaref, Dhafer J. Ayyed },
title = { Proposed Method of Text Hiding in Image Edges },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 11 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number11/22599-2015906225/ },
doi = { 10.5120/ijca2015906225 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:17:58.346322+05:30
%A Nasseer M. Basheer
%A Ashty M. Aaref
%A Dhafer J. Ayyed
%T Proposed Method of Text Hiding in Image Edges
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 11
%P 33-37
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, information hiding techniques have been beneficial in a many application areas, there are many techniques to achieve hiding data, and hiding text inside image is one field of them. This work shows how the edges of the images will be detected by scanning method using 3x3 window and then the secret message is canceled in edges of a gray scale images (Lena and goldhill) which acts as a cover images using Least Significant Bit (LSB) based Sobel edge detection algorithm. The algorithms are implemented using MATLAB R2014a. The design achieved high embedding capacity and high quality of encoded image. A Four Gray Scale input images with size 1024×1024 is used as a cover image and massage with length 500 character as a secret massage in this work.

References
  1. Frank Y. Shih, Image Processing And Pattern Recognition Fundamentals And Techniques, Published by John Wiley & Sons, Inc., Hoboken, New Jersey. ISBN 978-0-470-40461-4, 2010.
  2. Jamal A. Othman, "Steganographic scheme to avoid statistical Steganalysis", J. Of College Of Education For Women , vol. 25, pp. 249 -256, 2014.
  3. Neil F. Johnson and Sushil Jajodia , " Steganalysis: The Investigation of Hidden Information", IEEE, pp. 113-116, 1998.
  4. W, Peter, Disappearing Cryptography: Information Hiding: Steganography & Watermarking ,3rd edition. San Francisco: Morgan Kaufmann, ISBN 978-0-12-374479-1, 2009.
  5. Saiful Islam, Mangat R Modi and Phalguni Gupta, "Edge-based image steganography", Islam et al. EURASIP Journal on Information Security, pp. 2-14 2014.
  6. Nasseer M. Basheer, Ashty M. Aaref, Dhafer J. Ayyed , " Digital Image Sobel Edge Detection Using FPGA", International Journal of Advanced Research in Computer Science and Software Engineering , vol. 5, pp. 183-190, July 2015.
  7. James Clerk Maxwell, Digital Image Processing Mathematical and Computational Methods, Horwood Publishing, vol: ISBN:1-898563-49-7, 2005.
  8. Rashmi , Mukesh Kumar, and Rohini Saxena, “Algorithm And Technique On Various Edge Detection: A Survey “, Signal & Image Processing: An International Journal (SIPIJ), vol.. 4, pp. 65-75, June 2013.
  9. Fisher, R.; S. W. A. Perkin, and E. Wolfart, Image Processing Learning Resources, HIPR2, Explore with JAVA, 2000.
  10. The MathWorks, Computer Vision System Toolbox™ Reference, by MathWorks, Inc., 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Information Hiding Steganography Cover image secret message LSB.