94
Views
16
CrossRef citations to date
0
Altmetric
Articles

An improved image steganography technique using edge based data hiding in DCT domain

&

References

  • B. Lakshmi Sirisha , S. Srinivas Kumar & B. Chandra Mohan (2016) Steganography based image sharing with reversibility, Journal of Discrete Mathematical Sciences and Cryptography , 19:1, 67–80, DOI: 10.1080/09720529.2015.1086109.
  • Huang Po-Hsian (2010) A weight-based data hiding method for binary image using selective binary numeral system, Journal of Discrete Mathematical Sciences and Cryptography , 13:5, 429-444, DOI: 10.1080/09720529.2010.10698305.
  • T. Morkel , M. S. Olivier , and S. Africa , “AN OVERVIEW OF IMAGE STEGANOGRAPHY”
  • K. N. Brahmateja , G. L. Madhumati , and K. R. K. Rao , “Data Hiding Using EDGE Based Steganography,” vol. 2, no. 11, pp. 285–290, 2012.
  • A. A. Attaby , M. F. M. Mursi Ahmed , and A. K. Alsammak , “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3,” Ain Shams Eng. J ., 2016.
  • S. A. El Rahman , “algorithm and steganography tool to hide nuclear reactors,” Comput. Electr. Eng ., vol. 0, pp. 1–20, 2016.
  • S. O. Akinola and A. A. Olatidoye , “On the Image Quality and Encoding Times of LSB, MSB and Combined LSB-MSB Steganography Algorithms Using Digital Images,” Int. J. Comput. Sci. Inf. Technol ., vol. 7, no. 4, pp. 79–91, 2015.
  • G. T. Shrivakshan and C. Chandrasekar , “A Comparison of various Edge Detection Techniques used in Image Processing,” Int. J. Comput. Sci. Issues , vol. 9, no. 5, pp. 269–276, 2012.
  • C. H. Shreya Gupta , Akshay Kalra , “A Hybrid Technique for Spatial Image Steganography,” 3rd Int. Conf. onComputing Sustain. Glob. Dev., pp. 643–647, 2016.
  • S. Islam , M. R. Modi , and P. Gupta , “Edge-based image steganography,” EURASIP J. Inf. Secur., vol. 2014, no. 1, p. 8, 2014.
  • S. Sharma and U. Kumar , “Review of Transform Domain Techniques for Image Steganography,” Int. J. Sci. Res. ISSN (Online Index Copernicus Value Impact Factor , vol. 4, no. 5, pp. 194–197, 2015.
  • M. Jain and S. K. Lenka , “A Review of Digital Image Steganography using LSB and LSB Array,” vol. 11, no. 3, pp. 1820–1824, 2016.
  • A. S. Kelsey and C. M. Akujuobi , “A Discrete Wavelet Transform Approach for Enhanced Security in Image Steganography,” vol. 5, no. 1, pp. 10–20, 2016.
  • V. R. Kukapalli , B. T. Rao , and B. S. Reddy , “Image Steganography by Enhanced Pixel Indicator Method Using Most Significant Bit ( MSB ) Compare,” vol. 15, no. 3, pp. 97–101, 2014.
  • T. Johnson et al. , “Improved steganography using enhanced k strange points clustering,” Int. J. Appl. Eng. Res ., vol. 11, no. 9, pp. 6881–6885, 2016.
  • G. Singh , “MRI Medical Image and Steganography,” vol. 4, no. 2, pp. 2–5, 2016.
  • S. Lahiri , P. Paul , S. Banerjee , S. Mitra , A. Mukhopadhyay , and M. Gangopadhyaya , “Image Steganography On Coloured Images Using Edge Based Data Hiding In DCT Domain,” Inf. Technol. Electron. Mob. Commun. Conf. (IEMCON), 2016 IEEE 7th Annu., 2016.
  • M. Gunjal and J. Jha , “Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm,” Int. J. Comput. Trends Technol ., vol. 11, no. 4, pp. 144–150, 2014. doi: 10.14445/22312803/IJCTT-V11P131
  • S. Sugathan , “An improved LSB embedding technique for image steganography,” Proc. 2016 2nd Int. Conf. Appl. Theor. Comput. Commun. Technol. iCATccT 2016, no. 4, pp. 609–612, 2017.
  • B. S. Champakamala , K. Padmini , R. D. K. A. Professors , and D. Bosco , “Least Significant Bit algorithm for image steganography Overview of Steganography,” Int. J. Adv. Comput. Technol ., vol. 3, no. 4, p. 5, 2014.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.