A novel approach of steganography by using strong edge detection and chaos theory

被引:0
|
作者
Omar Younis Abdulhammed
机构
[1] University of Garmian,Department of Computer Science, College of Science
来源
Multimedia Tools and Applications | 2022年 / 81卷
关键词
Security; Steganography; Edges detection; Strong edges detection; Chirikov;
D O I
暂无
中图分类号
学科分类号
摘要
The growth of the Internet and rapid development of digital devices and network technology led to increase the risks and threats of attackers, therefore the important data that is sent via the Internet must be preserved, one of the most substantial security methods utilized to protect this data is steganography, so this technology must be developed and strengthened in order to face the modern technologies used by the attackers. The aim of this paper is to preserve the data sent via internet by proposing a new method that treats to solve the gaps and weakness of previous methods. Since the edge region of the image is more permissive of alteration, therefore is more convenient for concealing secret information. A novel schema of concealing secret information is suggested by creating new algorithm in the name of strong edges detection algorithm (SEDA) to detect strong edges of the image and using chaotic mapping method to generate random numbers. This schema consist of five stages, where in the first stage the canny algorithm is utilized to reveal edges of the carrier media and store it in the new array called (na1), secondly, the SEDA is used to identified strong edges of the (na1) and the results is stored in the new array called (na2) as the strong edges are utilized to conceal mystery information. Thirdly, chirikov map method are using to generate random keys, where these keys are used to choose the locations in the (na2) and which are used to hide secret information. In the fourth stage, the important data is hidden in the chosen pixel locations. The extraction of important information carry out in the fifth stage, which is the opposite of concealing stage. The results proved that the proposed system increase security, robustness, payload capacity, efficiency and maintaining stego image’s quality.
引用
收藏
页码:17875 / 17888
页数:13
相关论文
共 50 条
  • [31] A Novel Approach for Edge Detection using HBT Filter and Logarithmic Transform
    Nair, Madhu S.
    Vrinthavani, R.
    Wilscy, M.
    ICDIP 2009: INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING, PROCEEDINGS, 2009, : 243 - 246
  • [32] Image steganography based on Kirsch edge detection
    Sudipta Kumar Ghosal
    Agneet Chatterjee
    Ram Sarkar
    Multimedia Systems, 2021, 27 : 73 - 87
  • [33] Image Steganography Based on Edge Detection Algorithm
    Kich, Ismail
    Ameur, El Bachir
    Taouil, Youssef
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, CONTROL, OPTIMIZATION AND COMPUTER SCIENCE (ICECOCS), 2018,
  • [34] Image steganography based on Kirsch edge detection
    Ghosal, Sudipta Kumar
    Chatterjee, Agneet
    Sarkar, Ram
    MULTIMEDIA SYSTEMS, 2021, 27 (01) : 73 - 87
  • [35] A Novel Edge Based Image Steganography Technique
    Seeja, K. R.
    Rana, Jyoti
    Priya, Srishti
    Ahuja, Latika
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 66 - 75
  • [36] Computational Analysis of Arabic Cursive Steganography using Complex Edge Detection Techniques
    Ibrahim, Anwar H.
    Alturki, Abdulrahman S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (09) : 496 - 500
  • [37] Image steganography using hybrid edge detection and first component alteration technique
    Kaur, Sarabjeet
    Jindal, Sonika
    International Journal of Hybrid Information Technology, 2013, 6 (05): : 59 - 66
  • [38] Edge detection steganography and quantum circuit design based on a novel fractal chaotic system
    Sun, Jing-yu
    Wang, Wan-ting
    Jun, Zhang
    Shuang, Zhou
    Hao, Zhang
    QUANTUM INFORMATION PROCESSING, 2024, 23 (04)
  • [39] Edge detection steganography and quantum circuit design based on a novel fractal chaotic system
    Sun Jing-yu
    Wang Wan-ting
    Zhang Jun
    Zhou Shuang
    Zhang Hao
    Quantum Information Processing, 23
  • [40] A Novel Approach for JPEG Steganography
    Sachnev, Vasiliy
    Kim, Hyoung Joong
    Zhang, Rongyue
    Choi, Yong Soo
    DIGITAL WATERMARKING, 2009, 5450 : 209 - 217