158
Views
3
CrossRef citations to date
0
Altmetric
Research Article

Graded fuzzy edge detection for imperceptibility optimization of image steganography

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Received 20 Mar 2023, Accepted 25 May 2023, Published online: 06 Jun 2023

References

  • Cheddad A, Condell J, Curran K, et al. Digital image steganography: survey and analysis of current methods. Signal Process. 2010. doi:10.1016/j.sigpro.2009.08.010
  • Setiadi DRIM, Rustad S, Andono PN, et al. Digital image steganography survey and investigation (Goal, assessment, method, development, and dataset). Signal Process. 2023;206. doi:10.1016/j.sigpro.2022.108908
  • Sahu AK, Sahu M. Digital image steganography and steganalysis: a journey of the past three decades. Open Comput Sci. 2020;10(1):296–342. doi:10.1515/comp-2020-0136
  • Hassaballah M, Hameed MA, Alkinani MH. Introduction to digital image steganography. in digital media steganography: principles. Algorithms Adv. 2020: 1–15. doi:10.1016/B978-0-12-819438-6.00009-8.
  • Shi H, Yan K, Hu B, et al. Integrating multi-predictions encryption with histogram shifting secret-sharing for high-capacity two-layer image data hiding. Imaging Sci J. 2022: 1–30. doi:10.1080/13682199.2022.2150131
  • Yadav GS, Ojha A. Improved security in the genetic algorithm-based image steganography scheme using Hilbert space-filling curve. Imaging Sci J. 2019;67(3):148–158.doi:10.1080/13682199.2019.1570678
  • Hassaballah M, Hameed MA, Awad AI, et al. A novel image steganography method for industrial Internet of things security. IEEE Trans Ind Informatics. 2021;17(11):7743–7751. doi:10.1109/TII.2021.3053595
  • Hameed MA, Abdel-Aleem OA, Hassaballah M. A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J Ambient Intell Humaniz Comput. 2022;0123456789. doi:10.1007/s12652-022-04366-y.
  • Khan S, et al. A modulo function-based robust asymmetric variable data hiding using DCT. Symmetry (Basel). 2020;12(10):1–23. doi:10.3390/sym12101659
  • Setyono A, Setiadi DRIM, Muljono M. Stegocrypt method using wavelet transform and one-time pad for secret image delivery. 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE). 2017: 203–207. doi:10.1109/ICITACEE.2017.8257703.
  • Jafar I, Jubair F, Darabkh K. Separable high capacity reversible data hiding algorithm for encrypted images. Int Arab J Inf Technol. 2022;19(5):812–821. doi:10.34028/iajit/19/5/13
  • Abduljaleel IQ, Abduljabbar ZA, Al Sibahee MA, et al. A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques. J Sens Actuator Networks. 2022;11(4):66. doi:10.3390/jsan11040066
  • Najih MNM, Setiadi DRIM, Rachmawanto EH, et al. An improved secure image hiding technique using PN-sequence based on DCT-OTP. 1st International Conference on Informatics and Computational Sciences (ICICoS). 2017: 47–52. doi:10.1109/ICICOS.2017.8276336
  • Kim C. Dual reversible data hiding based on AMBTC using hamming code and LSB replacement. Electronics. 2022;11:3210.
  • Setiadi DRIM. Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J King Saud Univ - Comput Inf Sci. 2022;34(2):104–114. doi:10.1016/j.jksuci.2019.12.007
  • Gaurav K, Ghanekar U. Image steganography based on Canny edge detection, dilation operator and hybrid coding. J Inf Secur Appl. 2018;41:41–51. doi:10.1016/j.jisa.2018.05.001
  • Bai J, Chang C-C, Nguyen T-S, et al. A high payload steganographic algorithm based on edge detection. Displays. 2017;46:42–51. doi:10.1016/j.displa.2016.12.004
  • Sahu AK, Swain G. Dual Stego-imaging based reversible data hiding using improved LSB matching. Int J Intell Eng Syst. 2019;12(5). doi:10.22266/ijies2019.1031.07
  • Sahu AK, Swain G. High fidelity based reversible data hiding using modified LSB matching and pixel difference. J King Saud Univ - Comput Inf Sci. 2022;34(4):1395–1409. doi:10.1016/J.JKSUCI.2019.07.004
  • S. Rustad, D. R. I. M. Setiadi, A. Syukur, and P. N. Andono, “Inverted LSB image steganography using adaptive pattern to improve imperceptibility,” J King Saud Univ - Comput Inf Sci., vol. 34, no. 6, pp. 3559–3568, Jun. 2022, doi:10.1016/J.JKSUCI.2020.12.017.
  • Andono PN, Setiadi DRIM. Quantization selection based on characteristic of cover image for PVD steganography to optimize imperceptibility and capacity. Multimed Tools Appl. 2023;82(3):3561–3580. doi:10.1007/s11042-022-13393-y
  • Prasad S, Pal AK. An RGB colour image steganography scheme using overlapping block-based pixel-value differencing. R Soc Open Sci. 2017;4(4). doi:10.1098/rsos.161066
  • Pradhan A, Sekhar KR, Swain G. Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks. Secur Commun Networks. 2017;2017. doi:10.1155/2017/1924618
  • Cevik N, Cevik T, Osman O, et al. Improved exploiting modification direction steganography for hexagonal image processing. J King Saud Univ - Comput Inf Sci. 2022;34(10):9273–9283. doi:10.1016/j.jksuci.2022.09.007
  • Tseng HW, Leng HS. A reversible modified least significant bit (LSB) matching revisited method. Signal Process Image Commun. 2022;101(August 2020):116556. doi:10.1016/j.image.2021.116556
  • Wu NI, Hwang MS. A novel LSB data hiding scheme with the lowest distortion. Imaging Sci J 2017;65(6):371–378. doi:10.1080/13682199.2017.1355089
  • Yang A, Bai Y, Xue T, et al. A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Futur Gener Comput Syst. 2023;145:293–302. doi:10.1016/j.future.2023.03.035
  • Lee C-F, Chang C-C, Xie X, et al. An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes. Displays. 2018;53:30–39. doi:10.1016/J.DISPLA.2018.06.001
  • Wang Y, Tang M, Wang Z. High-capacity adaptive steganography based on LSB and hamming code. Optik (Stuttg). 2020;213:164685. doi:10.1016/j.ijleo.2020.164685
  • Dhargupta S, Chakraborty A, Ghosal SK, et al. Fuzzy edge detection based steganography using modified Gaussian distribution. Multimed Tools Appl. 2019;78(13):17589–17606. doi:10.1007/s11042-018-7123-x
  • Mukherjee S, Sanyal G. Edge based image steganography with variable threshold. Multimed Tools Appl 2019;78(12):16363–16388. doi:10.1007/s11042-018-6975-4
  • Ghosal SK, Mandal JK, Sarkar R. High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multimed Tools Appl. 2018;77(23):30403–30418. doi:10.1007/s11042-018-6126-y
  • Ray B, Mukhopadhyay S, Hossain S, et al. Image steganography using deep learning based edge detection. Multimed Tools Appl. 2021;80(24):33475–33503. doi:10.1007/s11042-021-11177-4
  • Xie J, Wang H, Wu D. Adaptive Image Steganography using Fuzzy Enhancement and Grey Wolf optimizer. IEEE Trans Fuzzy Syst. 2022;30(11):4953–4964. doi:10.1109/TFUZZ.2022.3164791
  • Liu J, Zhang R, Li J, et al. A reversible data hiding algorithm based on Image Camouflage and Bit-Plane compression. Comput Mater Contin. 2021;68(2):2633–2649. doi:10.32604/cmc.2021.016605
  • Jing J, Liu S, Wang G, et al. Recent advances on image edge detection: A comprehensive review. Neurocomputing. 2022;503:259–271. doi:10.1016/j.neucom.2022.06.083
  • Mostafa K, Chiang JY, Her I. Edge-detection method using binary morphology on hexagonal images. Imaging Sci J. 2015;63(3):168–173. doi:10.1179/1743131X14Y.0000000098
  • Patwari B, Nandi U, Ghosal SK. Image steganography based on difference of Gaussians edge detection. Multimed Tools Appl. 2023;0123456789; doi:10.1007/s11042-023-15360-7.
  • Sultana H, Kamal AHM, Hossain G, et al. A novel hybrid edge detection and LBP Code-Based Robust Image Steganography method. Futur Internet. 2023;15(3):108. doi:10.3390/fi15030108
  • He X, Zhang W, Zhang H, et al. Reversible data hiding for high dynamic range images using edge information. Multimed Tools Appl. 2019;78(20):29137–29160. doi:10.1007/s11042-018-6589-x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.