CFP last date
20 May 2024
Reseach Article

A Novel Steganographic Method based on Edge Detection and Adaptive Multiple Bits Substitution

Published on February 2015 by Keerthi K M
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 2
February 2015
Authors: Keerthi K M
06076509-de4a-4f52-a361-5fbcf1ba9fa8

Keerthi K M . A Novel Steganographic Method based on Edge Detection and Adaptive Multiple Bits Substitution. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 2 (February 2015), 1-4.

@article{
author = { Keerthi K M },
title = { A Novel Steganographic Method based on Edge Detection and Adaptive Multiple Bits Substitution },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 2 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/icaccthpa2014/number2/19436-6015/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Keerthi K M
%T A Novel Steganographic Method based on Edge Detection and Adaptive Multiple Bits Substitution
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 2
%P 1-4
%D 2015
%I International Journal of Computer Applications
Abstract

This paper proposes a novel method for grayscale image steganography based on edge detection and adaptive multiple bits substitution. The pixels located in the edge regions usually present more random characteristics than the smooth regions. In proposed method, the Sobel operator is used to compute the gradient magnitude of the pixels of the cover image. As a result, all edges of the cover image, both horizontal and vertical, are fully detected. The sharper edges are adaptively preserved and the weaker edges are suppressed, according to the length of secret data. Therefore, the sharper edges will be used in advance of the weaker edges and the smooth regions for data embedding. Next, the data embedding route is determined using a pseudorandom number generator (PRNG) and multiple bits of secret data are adaptively embedded into k- LSBs of the pixels in the route. The value k depends on the gradient magnitude of each pixel . The larger the gradient magnitude, the larger the value k. .

References
  1. Pratap Chandra Mandal, "Modern Steganographic technique: A survey" IJCSET, 2012.
  2. Mehran Iranpour. , "A Novel Steganographic Method Based on Edge Detection and Adaptive Multiple Bits Substitution", IEEE transaction 2013.
  3. G. T. Shrivakshan, Dr. C. Chandrasekar "A Comparison of various Edge Detection Techniques used in Image Processing" IJCSI, 2012.
  4. Sneha Arora, Sanyam Anand "A Proposed Method for Image Steganography Using Edge Detection" International Journal of Engineering Sciences, 2013.
  5. Junji Shikata, Tsutomu Matsumoto, "Unconditionally Secure Steganography against Active Attacks" IEEE transactions on information theory, vol. 54, no. 6, June 2008.
  6. Nitin Jain, Sachin Meshram, Shikha Dubey "Image Steganography Using LSB and Edge – Detection Technique" International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012.
  7. AlaaA. Jabbar, Altaay, Melaka, ShahrinbinSahib, Mazdak Zamani, "An Introduction to Image Steganography Techniques", 2012 International Conference on Advanced Computer Science Applications and Technologies.
  8. Babloo Saha and Shuchi Sharma, "Steganographic Techniques of Data Hiding using Digital Images", Defence Science Journal, Vol. 62, No. 1, January 2012, pp. 11-18,2012.
Index Terms

Computer Science
Information Sciences

Keywords

The Sobel Operator Adaptive Lsb Substitution.