Image Steganography using Edge Based Data Hiding in Dct Domain An Overview

2018 ◽  
Vol 06 (03) ◽  
pp. 46-50
Author(s):  
Nadish Ayub ◽  
Arvind Selwal
Author(s):  
Sounak Lahiri ◽  
Pritom Paul ◽  
Supriyo Banerjee ◽  
Souvik Mitra ◽  
Arunava Mukhopadhyay ◽  
...  

Symmetry ◽  
2019 ◽  
Vol 11 (6) ◽  
pp. 765 ◽  
Author(s):  
Chia-Chen Lin ◽  
Ching-Chun Chang ◽  
Zhi-Ming Wang

In this paper, we provide a novel reversible data hiding method using adaptive block truncation coding based on an edge-based quantization (ABTC-EQ) approach. We exploit the characteristic not being used in ABTC-EQ. To accomplish this, we first utilized a Canny edge detector to obtain an edge image and classify each block in a cover image into two versions, edge-block and non-edge-block. Subsequently, k-means clustering was used to obtain three quantization levels and derive the corresponding bit map while the current processing block was the case of an edge-block. Then Zero-Point Fixed Histogram Shifting (ZPF-HS) was applied to embed the secret information into compressed code. The experimental results show that our method provides a high embedding capacity for each test image and performance is better than other methods.


The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


2014 ◽  
Vol 496-500 ◽  
pp. 1986-1990
Author(s):  
Jia Min Zhou ◽  
Yang Pan ◽  
Ren Er Yang

In order to solve the security problem of the multimedia in the communication process, steganography plays a vital role. In this paper, the DCT domain of digital image steganography is to study the impact of image quality with different embedding positions, the secret information in the DCT domain of an image, different carrier images and the amount of information. Studies show that: embedding the information in the low frequency part of the image, selecting the image with the rich distribution pixel value, is conducive to improve the steganography effects of the information in the image, enhance the concealment of the secret information.


Sign in / Sign up

Export Citation Format

Share Document