2019 International Conference on Communications, Signal Processing, and Their Applications (ICCSPA) 2019
DOI: 10.1109/iccspa.2019.8713712
|View full text |Cite
|
Sign up to set email alerts
|

Edge Based Image Steganography: Problems and Solution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Similarly, instead of LBP, the edges of the color cover images are obtained. Then, the binary bits of the secret information is hidden in the edges discovered in the cover images [20]. Other methods of the traditional steganography methods are described below.…”
Section: A Traditional-based Steganography Methodsmentioning
confidence: 99%
“…Similarly, instead of LBP, the edges of the color cover images are obtained. Then, the binary bits of the secret information is hidden in the edges discovered in the cover images [20]. Other methods of the traditional steganography methods are described below.…”
Section: A Traditional-based Steganography Methodsmentioning
confidence: 99%
“…Optimal choices often revolve around carrier mediums with high redundancy. Several commonly utilized mediums include as shown in Figure (1) [13]: Steganography is a method of concealing data for various purposes, primarily to prevent unauthorized access or awareness of a message. It finds applications in radio monitoring, automatic systems for detecting specific stego messages, and modern technologies like web hosting for secret information transfer.…”
Section: Steganography Definition and Types And Applicationsmentioning
confidence: 99%
“…Table (1) provides a comprehensive overview of various steganography types, elucidating their distinct characteristics, techniques employed, applicable file formats, and inherent challenges. Steganography, the art of covert communication, manifests through diverse forms such as Image Steganography, where data is concealed within pixel intensities of digital images.…”
Section: Steganography Definition and Types And Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Starting from the centre pixel in the B channel, the method embedded two secret bits in the smooth pixels and three bits in the sharp pixels using the LSB method. Rashid and Majeed [33] proposed a technique that applied edge detection on the Blue component and used the edge positions as indicators of the existence of data in the Green component. This method used only the edge positions that satisfied a threshold value, which increased the security of the method.…”
Section: Literature Reviewmentioning
confidence: 99%