Image Steganography based on 2k Correction and Coherent Bit Length

被引:0
|
作者
Sun, Shuliang [1 ]
Guo, Yongning [1 ]
机构
[1] Fujian Normal Univ, Fuqing Branch, Dept Math & Comp Sci, Fuzhou, Peoples R China
关键词
coherent bit length; Canny operator; 2k correction;
D O I
10.1063/1.4897776
中图分类号
O59 [应用物理学];
学科分类号
摘要
In this paper, a novel algorithm is proposed. Firstly, the edge of cover image is detected with Canny operator and secret data is embedded in edge pixels. Sorting method is used to randomize the edge pixels in order to enhance security. Coherent bit length L is determined by relevant edge pixels. Finally, the method of 2k correction is applied to achieve better imperceptibility in stego image. The experiment shows that the proposed method is better than LSB-3 and Jae-Gil Yu's in PSNR and capacity.
引用
收藏
页码:475 / 478
页数:4
相关论文
共 50 条
  • [21] A secure image steganography algorithm based on least significant bit and integer wavelet transform
    Elshazly, Emad
    Abdelwahab, Safey
    Abouzaid, Refaat
    Zahran, Osama
    Elaraby, Sayed
    Elkordy, Mohamed
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2018, 29 (03) : 639 - 649
  • [22] A secure image steganography algorithm based on least significant bit and integer wavelet transform
    ELSHAZLY Emad
    ABDELWAHAB Safey
    ABOUZAID Refaat
    ZAHRAN Osama
    ELARABY Sayed
    ELKORDY Mohamed
    Journal of Systems Engineering and Electronics, 2018, 29 (03) : 639 - 649
  • [23] Exploring steganography for low bit rate wavelet based coder in image retrieval system
    Areepongsa, S
    Kaewkamnerd, N
    Syed, YF
    Rao, KR
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B250 - B255
  • [24] A Survey on Image Steganography Based on Least Significant Bit Matched Revisited (LSBMR) Algorithm
    Smitha, G. L.
    Baburaj, E.
    IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGICAL TRENDS IN COMPUTING, COMMUNICATIONS AND ELECTRICAL ENGINEERING (ICETT), 2016,
  • [25] Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping Insertion
    Mukherjee, Srilekha
    Sanyal, Goutam
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 : 364 - 379
  • [26] SUPER-RESOLUTION FOR 2K/8K TELEVISION USING WAVELET-BASED IMAGE REGISTRATION
    Matsuo, Yasutaka
    Sakaida, Shinichi
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 378 - 382
  • [27] Addition-based exponentiation modulo 2k
    Fit-Florea, A
    Matula, DW
    Thomton, MA
    ELECTRONICS LETTERS, 2005, 41 (02) : 56 - 57
  • [28] A 2K BY 8-BIT STATIC MOS RAM WITH A NEW MEMORY CELL STRUCTURE
    OHZONE, T
    HIRAO, T
    TSUJI, K
    HORIUCHI, S
    TAKAYANAGI, S
    IEEE JOURNAL OF SOLID-STATE CIRCUITS, 1980, 15 (02) : 201 - 205
  • [29] An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud
    Alam, Md. Khorshed
    Nushrat, Samia
    Patwary, Md. Amir Hamza
    Ullah, Ahsan
    Robin, Kazi Hassan
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 215 - 233
  • [30] Hardware implementation of an additive bit-serial algorithm for the discrete logarithm modulo 2k
    Li, L
    Fit-Florea, A
    Thomton, MA
    Matula, DW
    IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: NEW FRONTIERS IN VLSI DESIGN, 2005, : 130 - 135