Abstract
In this paper a novel edge adaptive data hiding method is proposed. The proposed edge adaptive steganography method is improved version of the Bai et al.’s [31] (A high payload steganographic algorithm based on edge detection) method. The main aim of the proposed method is to achieve high payload with high visual quality. This method consists of pre-processing, edge detection, classification of the secret data, data embedding and data extraction phases. In the pre-processing phase 6 and 7 least significant bits (LSB) elimination are applied on the cover image to get a better edge detection in the next phase. As edge detection methods Sobel, Canny, Laplacian Of Gaussian (LOG), block based edge detection and hybrid edge detectors are used. After the edge detection, secret data is divided into 2 classes and then these are embedded into edge pixels and texture pixels of the image. In order to increase the visual quality 2k correction is applied on the stego images. Modulus operator is utilized in the data extraction phase. In the experimental results, payload and visual quality measurements demonstrated the success of the proposed method.
Highlights
THE ERA we live in is called information era
A novel edge adaptive data hiding method is presented with high payload and high visual quality
Edge detectors are used as data hiding map. 6LSBs and 7LSBs elimination methods are utilized to increase the capacity in the preprocessing phase
Summary
THE ERA we live in is called information era. The vast majority of information is stored as digital media. Bai et al [31] suggested an edge detection based image data hiding algorithm with high payload Capacity. This method consisted of 5LSBs elimination, edge detection by using Canny [32], Sobel [33] and Fuzzy Logic Edge Detector (FLED) [34], secret message classification in two sub-class, data hiding and data extraction phases. Sun [35] presented a edge based image data hiding method In this method, Canny Edge Detector (CED) was used for edge detection, Huffman was used for secret data compression and 2k correction was used for data hiding and data extraction. By using 2k correction, higher visual quality is achieved than Bai et al.’s method
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Balkan Journal of Electrical and Computer Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.