A novel approach of steganography by using strong edge detection and chaos theory

被引:0
|
作者
Omar Younis Abdulhammed
机构
[1] University of Garmian,Department of Computer Science, College of Science
来源
Multimedia Tools and Applications | 2022年 / 81卷
关键词
Security; Steganography; Edges detection; Strong edges detection; Chirikov;
D O I
暂无
中图分类号
学科分类号
摘要
The growth of the Internet and rapid development of digital devices and network technology led to increase the risks and threats of attackers, therefore the important data that is sent via the Internet must be preserved, one of the most substantial security methods utilized to protect this data is steganography, so this technology must be developed and strengthened in order to face the modern technologies used by the attackers. The aim of this paper is to preserve the data sent via internet by proposing a new method that treats to solve the gaps and weakness of previous methods. Since the edge region of the image is more permissive of alteration, therefore is more convenient for concealing secret information. A novel schema of concealing secret information is suggested by creating new algorithm in the name of strong edges detection algorithm (SEDA) to detect strong edges of the image and using chaotic mapping method to generate random numbers. This schema consist of five stages, where in the first stage the canny algorithm is utilized to reveal edges of the carrier media and store it in the new array called (na1), secondly, the SEDA is used to identified strong edges of the (na1) and the results is stored in the new array called (na2) as the strong edges are utilized to conceal mystery information. Thirdly, chirikov map method are using to generate random keys, where these keys are used to choose the locations in the (na2) and which are used to hide secret information. In the fourth stage, the important data is hidden in the chosen pixel locations. The extraction of important information carry out in the fifth stage, which is the opposite of concealing stage. The results proved that the proposed system increase security, robustness, payload capacity, efficiency and maintaining stego image’s quality.
引用
收藏
页码:17875 / 17888
页数:13
相关论文
共 50 条
  • [41] Detection of Chaos Using Reservoir Computing Approach
    Ismail, Ali Rida
    Jovanovic, Slavisa
    Petit-Watelot, Sebastien
    Rabah, Hassan
    IEEE ACCESS, 2022, 10 : 52686 - 52699
  • [42] Adaptive LSB Steganography Based on Chaos Theory and Random Distortion
    Tutuncu, Kemal
    Demirci, Baris
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2018, 18 (03) : 15 - 22
  • [43] Novel Ransomware Hiding Model Using HEVC Steganography Approach
    Almomani, Iman
    AlKhayer, Aala
    El-Shafai, Walid
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 1209 - 1228
  • [44] A Novel Approach of Bulk Data Hiding using Text Steganography
    Shivani
    Yadav, Virendra Kumar
    Batham, Saumya
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1401 - 1410
  • [45] Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem
    Jain M.
    Kumar A.
    Choudhary R.C.
    Brain Informatics, 2017, 4 (02) : 95 - 106
  • [46] Mean field theory of the edge of chaos
    Gutowitz, H
    Langton, C
    ADVANCES IN ARTIFICIAL LIFE, 1995, 929 : 52 - 64
  • [47] A Novel Approach for Edge Detection for Blurry Images by using Digital Image Processing
    Choudhary, Ravi Raj
    Jangid, Aarati
    Meena, Gaurav
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 1029 - 1034
  • [48] A novel approach using edge detection information for texture based image retrieval
    Zhang, Jing
    Ha, Seok-Wun
    ADVANCES IN NATURAL COMPUTATION, PT 2, 2006, 4222 : 797 - 800
  • [49] A Novel Approach for Fuzzy Edge Detection Using Type II Fuzzy Sets
    Madasu, Vamsi Krishna
    Hanmandlu, Madasu
    Vasikarla, Shantaram
    MATHEMATICS OF DATA/IMAGE PATTERN RECOGNITION, COMPRESSION, AND ENCRYPTION WITH APPLICATIONS XI, 2008, 7075
  • [50] STATISTICAL DETECTION OF JS']JSTEG STEGANOGRAPHY USING HYPOTHESIS TESTING THEORY
    Qiao, Tong
    Zitzmann, Cathel
    Retraint, Florent
    Cogranne, Remi
    2014 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2014, : 5517 - 5521