CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

by Geetha C.r., H. D. Giriprakash
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 16
Year of Publication: 2012
Authors: Geetha C.r., H. D. Giriprakash
10.5120/7431-0369

Geetha C.r., H. D. Giriprakash . Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator. International Journal of Computer Applications. 48, 16 ( June 2012), 15-19. DOI=10.5120/7431-0369

@article{ 10.5120/7431-0369,
author = { Geetha C.r., H. D. Giriprakash },
title = { Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 16 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number16/7431-0369/ },
doi = { 10.5120/7431-0369 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:44:13.025051+05:30
%A Geetha C.r.
%A H. D. Giriprakash
%T Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 16
%P 15-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes a method for image steganography. According to Human Visual System, any variation in the edges shown in the images has a low probability of being perceived by the human eyes, thus data can be hidden in the pixel of the cover image. These edges can be detected by using sophisticated operators like Canny edge detection operator. The gradient of the pixel of the image is determined and the image edges are detected by taking a threshold value of the gradient image. Here we go for multiple edge detection so that more number of pixels around the edge area is detected using the above method. Thus resulting in embedding of more information bits in the LSB of the image pixels further again we go for variable embedding so the combination of multiple edge detection and variable embedding improves the data hiding capacity. The multiple edge detection is limited to three times so as to reduce the distortions. To further increase the data hiding capacity and at the same time maintain a respectable PSNR variable embedding method is employed. For extraction of data the stego image is compared with the cover image, and the variation in the pixel values are detected, thus the embedded data is efficiently extracted.

References
  1. Marghny Mohamed, Fadwa Al-Afari, and Mohammed Bamatrf "Data Hiding by LSB substitution using Genetic Optimal Key Permutation", International Arab Journal of e-technology, vol 2, No. 1 January 2011.
  2. Moazzam Hossain, Sadia Al Haque, Farhana Sharmin. "Variable Rate Steganography in Gray Scale Digital images Using Neighborhood pixel information", The International Arab Journal of information technology, vol. 7, No. 1, January 2010.
  3. Chen, W. Y. , "Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation," Applied Mathematics and computation, 2007, vol. 185, pp. 432-448.
  4. Chen, W. Y. , "Color image steganography scheme using DFT, SPIHT codec, and modified differential phase shift keying techniques," Applied Mathematics and computation 2008, vol. 196, pp. 40-54.
  5. Li Li, Bin Luo, and Qiang Li Xiaojun Fang. , "A color Images steganography method by multiple embedding strategy based on Sobel operator," International conference on multimedia information networking and security, IEEE 2009, 978-0-7695-3843-3/09.
  6. Andrew D Ker. , "Steganalysis of LSB Matching in Gray scale Images", IEEE signal Processing letters, volume 12, NO 6, June 2005.
  7. R Amirtharanjan, R Akila, P Deepikachowdavarapu, "A Comparative Analysis of Image Steganography, " International Journal of Computer Application, 0975-8887 volume-2-no 3, May 2010.
  8. PRSS Venkatapathi Raju, Y Vamsidhar, Ravi Chandra Sriram, "Edge Adaptive Image Steganography on LSB using Godel numbering," IJCST volume 2,SP1, December 2011,ISSN 0976-8491.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Multiple Edge Detection Variable Embedding Canny Operator