2018
DOI: 10.2478/cait-2018-0029
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection

Abstract: The Internet is a public network with many issues of data transfer security. Steganography is a data transmission security technique that is done by hiding the message in a container media, such as an image. The media certainly has its limited payload to accommodate the embedded data. This paper proposes a method for increasing the payload of secret messages in an image. The edge area is used to accommodate more message bits because the image edge area can better tolerate pixel value changes. In this research … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 48 publications
(35 citation statements)
references
References 17 publications
0
27
0
1
Order By: Relevance
“…of LSBs (or bits) that would be modified during the embedding process of each technique is shown in the last column of the table. As can be observed in all the aforementioned LSB-based techniques; these were mainly focused on following steganography objectives, i.e., to increase the embedding capacity [8,10,[13][14][15], to enhance visual imperceptibility [13,15,18,23] and to improve security against detectability and hidden data [13,14,20,21]. However, we found tradeoffs among all these objectives because these are correlated to one another.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…of LSBs (or bits) that would be modified during the embedding process of each technique is shown in the last column of the table. As can be observed in all the aforementioned LSB-based techniques; these were mainly focused on following steganography objectives, i.e., to increase the embedding capacity [8,10,[13][14][15], to enhance visual imperceptibility [13,15,18,23] and to improve security against detectability and hidden data [13,14,20,21]. However, we found tradeoffs among all these objectives because these are correlated to one another.…”
Section: Related Workmentioning
confidence: 97%
“…Usually, in LSB-based methods, the secret data bits are substituted in k-least significant bits of each pixel. In the literature, various types of LSB-based techniques have been proposed [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] targeted at high capacity, visual quality and security.…”
Section: Related Workmentioning
confidence: 99%
“…Namun, dari berbagai uji coba penelitian, keberadaan pesan tersembunyi LSB masih sangat mudah untuk dideteksi menggunakan algoritma steganalytic pada tingkat embedding yang rendah. Sehingga perlu peningkatan kemampuan agar pesan tersembunyi teserbut tidak mudah untuk ditemukan [9], [10].…”
Section: Pendahuluanunclassified
“…An interesting example of how to deal with the Chi square [13] and LSB enhancement attack in the LSB method we can find in Reference [14]. And finally hybrid Canny-Sobel edge detection was used by Setiadi [15]. We find these methods to be one of the most interesting.…”
Section: Introductionmentioning
confidence: 99%