Image Steganography based on 2k Correction and Coherent Bit Length

被引:0
|
作者
Sun, Shuliang [1 ]
Guo, Yongning [1 ]
机构
[1] Fujian Normal Univ, Fuqing Branch, Dept Math & Comp Sci, Fuzhou, Peoples R China
关键词
coherent bit length; Canny operator; 2k correction;
D O I
10.1063/1.4897776
中图分类号
O59 [应用物理学];
学科分类号
摘要
In this paper, a novel algorithm is proposed. Firstly, the edge of cover image is detected with Canny operator and secret data is embedded in edge pixels. Sorting method is used to randomize the edge pixels in order to enhance security. Coherent bit length L is determined by relevant edge pixels. Finally, the method of 2k correction is applied to achieve better imperceptibility in stego image. The experiment shows that the proposed method is better than LSB-3 and Jae-Gil Yu's in PSNR and capacity.
引用
收藏
页码:475 / 478
页数:4
相关论文
共 50 条
  • [31] Image Steganography System Based on Optimal Most Significant Bit Ranking and Particle Swarm Optimization
    Al-Salhi, Yahya E. A.
    Lu, Song-Feng
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 331 - 337
  • [32] Steganography Based on Least Significant Bit Method was designed for Digital Image with Lossless Compression Technique
    Wiryawan, I. Gede
    Sariyasa
    Gunadi, I. Gede Aris
    2018 INTERNATIONAL CONFERENCE ON SIGNALS AND SYSTEMS (ICSIGSYS), 2018, : 98 - 102
  • [33] A novel color image steganography algorithm based on bit counting and multiple-base system
    Xie, Hong-wei
    Gao, Ya-jun
    Zhang, Hao
    Sun, Jing-yu
    OPTIK, 2022, 269
  • [34] On Rank and MDR Cyclic Codes of Length 2k Over Z8
    Garg, Arpana
    Dutt, Sucheta
    ALGORITHMS AND DISCRETE APPLIED MATHEMATICS, 2017, 10156 : 177 - 186
  • [35] A Parity Check Matrix Design for Irregular LDPC Codes with 2K Block Length
    Prasartkaew, Chutima
    Choomchuay, Somsak
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2009), 2009, : 550 - +
  • [36] Image-to-Image Steganography with Josephus Permutation and Least Significant Bit (LSB) 3-3-2 Embedding
    Yanuar, Muhammad Rafly
    Suryadi, M. T.
    Apriono, Catur
    Syawaludin, Muhammad Firdaus
    APPLIED SCIENCES-BASEL, 2024, 14 (16):
  • [37] ON EQUIDISTANT BINARY-CODES OF LENGTH N=4K+1 WITH DISTANCE D=2K
    VANLINT, JH
    COMBINATORICA, 1984, 4 (04) : 321 - 323
  • [38] GF(2K) multipliers based on montgomery multiplication algorithm
    Fournaris, AP
    Koufopavlou, O
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 2, PROCEEDINGS, 2004, : 849 - 852
  • [39] Atmosphere turbulence blurred image restoration based on atmosphere coherent length
    Wen, Changli
    Xu, Rong
    Men, Tao
    Liu, Changhai
    Guangxue Xuebao/Acta Optica Sinica, 2014, 34 (03):