Image Steganography based on 2k Correction and Coherent Bit Length

被引:0
|
作者
Sun, Shuliang [1 ]
Guo, Yongning [1 ]
机构
[1] Fujian Normal Univ, Fuqing Branch, Dept Math & Comp Sci, Fuzhou, Peoples R China
关键词
coherent bit length; Canny operator; 2k correction;
D O I
10.1063/1.4897776
中图分类号
O59 [应用物理学];
学科分类号
摘要
In this paper, a novel algorithm is proposed. Firstly, the edge of cover image is detected with Canny operator and secret data is embedded in edge pixels. Sorting method is used to randomize the edge pixels in order to enhance security. Coherent bit length L is determined by relevant edge pixels. Finally, the method of 2k correction is applied to achieve better imperceptibility in stego image. The experiment shows that the proposed method is better than LSB-3 and Jae-Gil Yu's in PSNR and capacity.
引用
收藏
页码:475 / 478
页数:4
相关论文
共 50 条
  • [1] A new image steganography based on 2k correction and edge-detection
    Yu, Jae-Gil
    Yoon, Eun-Joon
    Shin, Sang-Ho
    Yoo, Kee-Young
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 563 - +
  • [2] A novel edge based image steganography with 2k correction and Huffman encoding
    Sun, Shuliang
    INFORMATION PROCESSING LETTERS, 2016, 116 (02) : 93 - 99
  • [3] IMPROVED REFERENCE IMAGE ENCRYPTION METHODS BASED ON 2K CORRECTION IN THE INTEGER WAVELET DOMAIN
    Tuncer, Turker
    Dogan, Sengul
    Tadeusiewicz, Ryszard
    Plawiak, Pawel
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2019, 29 (04) : 817 - 829
  • [4] 2K×2K image acquisition system using four CMD imagers
    NHK Science and Technical Research, Lab, Tokyo, Japan
    Terebijon Gakkaishi, 2 (295-301):
  • [5] Finding paths of length k in O*(2k) time
    Williams, Ryan
    INFORMATION PROCESSING LETTERS, 2009, 109 (06) : 315 - 318
  • [6] Image Steganography and Steganalysis Based on Least Significant Bit (LSB)
    Rachael, Olomo
    Misra, Sanjay
    Ahuja, Ravin
    Adewumi, Adewole
    Ayeni, Foluso
    Mmaskeliunas, Rytis
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 1100 - 1111
  • [7] A novel image gravity transform based on least significant bit in image steganography
    Nikpour, Mehdi
    Kheirabadi, Mohammad Taghi
    Nodehi, Ali
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2025, 234 : 396 - 418
  • [8] Steganography for a low bit-rate wavelet based image coder
    Areepongsa, S
    Syed, YF
    Kaewkamnerd, N
    Rao, KR
    2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL I, PROCEEDINGS, 2000, : 597 - 600
  • [9] Multi-bit robust image steganography based on modular arithmetic
    Biswajita Datta
    Sudipta Roy
    Subhranil Roy
    Samir Kumar Bandyopadhyay
    Multimedia Tools and Applications, 2019, 78 : 1511 - 1546
  • [10] Multi-bit robust image steganography based on modular arithmetic
    Datta, Biswajita
    Roy, Sudipta
    Roy, Subhranil
    Bandyopadhyay, Samir Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 1511 - 1546