ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Image Steganography Based on Hamming Code and Edge Detection

Journal: The International Arab Journal of Information Technology (Vol.15, No. 5)

Publication Date:

Authors : ;

Page : 875-880

Keywords : Hamming code; 2 k correction; coherent bit length; canny edge detector.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this paper a novel algorithm which is based on hamming code and 2k correction is proposed. The new method also utilizes canny edge detection and coherent bit length. Firstly, canny edge detector is applied to detect the edge of cover image and only edge pixels are selected for embedding payload. In order to enhance security, the edge pixels are scrambled. Then hamming encoding is practiced to code the secret data before embedded. Calculate coherent bit length L on the base of relevant edge pixels and replace with L bits of payload message. Finally, the method of 2k correction is applied to achieve better imperceptibility in stego image. The experiment shows that the proposed method is more advantage in Peak Signal-toNoise Ratio (PSNR), capacity and universal image quality index (Q) than other methods.

Last modified: 2019-04-30 20:32:02