A novel approach of steganography by using strong edge detection and chaos theory

被引:0
|
作者
Omar Younis Abdulhammed
机构
[1] University of Garmian,Department of Computer Science, College of Science
来源
Multimedia Tools and Applications | 2022年 / 81卷
关键词
Security; Steganography; Edges detection; Strong edges detection; Chirikov;
D O I
暂无
中图分类号
学科分类号
摘要
The growth of the Internet and rapid development of digital devices and network technology led to increase the risks and threats of attackers, therefore the important data that is sent via the Internet must be preserved, one of the most substantial security methods utilized to protect this data is steganography, so this technology must be developed and strengthened in order to face the modern technologies used by the attackers. The aim of this paper is to preserve the data sent via internet by proposing a new method that treats to solve the gaps and weakness of previous methods. Since the edge region of the image is more permissive of alteration, therefore is more convenient for concealing secret information. A novel schema of concealing secret information is suggested by creating new algorithm in the name of strong edges detection algorithm (SEDA) to detect strong edges of the image and using chaotic mapping method to generate random numbers. This schema consist of five stages, where in the first stage the canny algorithm is utilized to reveal edges of the carrier media and store it in the new array called (na1), secondly, the SEDA is used to identified strong edges of the (na1) and the results is stored in the new array called (na2) as the strong edges are utilized to conceal mystery information. Thirdly, chirikov map method are using to generate random keys, where these keys are used to choose the locations in the (na2) and which are used to hide secret information. In the fourth stage, the important data is hidden in the chosen pixel locations. The extraction of important information carry out in the fifth stage, which is the opposite of concealing stage. The results proved that the proposed system increase security, robustness, payload capacity, efficiency and maintaining stego image’s quality.
引用
收藏
页码:17875 / 17888
页数:13
相关论文
共 50 条
  • [21] Novel Reservoir Computing Approach for the Detection of Chaos
    Ismail, Ali Rida
    Jovanovic, Slavisa
    Petit-Watelot, Sebastien
    Rabah, Hassan
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [22] Fuzzy edge detection based steganography using modified Gaussian distribution
    S. Dhargupta
    A. Chakraborty
    S. K. Ghosal
    S. Saha
    R. Sarkar
    Multimedia Tools and Applications, 2019, 78 : 17589 - 17606
  • [23] Fuzzy edge detection based steganography using modified Gaussian distribution
    Dhargupta, S.
    Chakraborty, A.
    Ghosal, S. K.
    Saha, S.
    Sarkar, R.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 17589 - 17606
  • [24] A novel technique for image steganography based on a high payload method and edge detection
    Ioannidou, Anastasia
    Halkidis, Spyros T.
    Stephanides, George
    EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (14) : 11517 - 11524
  • [25] Novel Approach For Image Steganography Using Classification Algorithm
    Vasoya, Daxa L.
    Vekariya, Vipul M.
    Kotak, P. P.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1079 - 1082
  • [26] A Novel Approach for Edge Detection of Images
    Ganguly, Debashis
    Mukherjee, Swarnendu
    Mitra, Kheyali
    Mukherjee, Partha
    2009 INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING, PROCEEDINGS, 2009, : 49 - 53
  • [27] A Novel Approach to Secure Communication using Audio Steganography
    Srivastava, Mayank
    Rafiq, Mohd Qasim
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 963 - +
  • [28] A Novel Edge Based Chaotic Steganography Method Using Neural Network
    Alam, Shahzad
    Ahmad, Tanvir
    Doja, M. N.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 467 - 475
  • [29] A Novel Approach to Image Steganography using Quadtree Partition
    Kumar, Jeet
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 93 - 98
  • [30] Automatic Detection of Chaos Phenomenon in Tornadoes Prediction Using Edge Detection
    Wanayumini
    Sitompul, Opim Salim
    Zarlis, Muhammad
    Suwilo, Saib
    2019 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL, TELECOMMUNICATION AND COMPUTER ENGINEERING (ELTICOM), 2019, : 48 - 52