IBM Systems Journal
Introductory Techniques for 3-D Computer Vision
Introductory Techniques for 3-D Computer Vision
Detecting LSB Steganography in Color and Gray-Scale Images
IEEE MultiMedia
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Statistical characterisation of MP3 encoders for steganalysis
Proceedings of the 2004 workshop on Multimedia and security
Image Processing, Analysis, and Machine Vision
Image Processing, Analysis, and Machine Vision
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Improving BTC image compression using a fuzzy complement edge operator
Signal Processing
An efficient image interpolation increasing payload in reversible data hiding
Expert Systems with Applications: An International Journal
A novel technique for image steganography based on a high payload method and edge detection
Expert Systems with Applications: An International Journal
Data hiding method based on local image features
AMT'12 Proceedings of the 8th international conference on Active Media Technology
A novel approach to digital watermarking, exploiting colour spaces
Signal Processing
Expert Systems with Applications: An International Journal
Hi-index | 12.06 |
Steganography is the art and science of hiding data into information. The secret message is hidden in such a way that no one can apart from the sender or the intended recipient. The least significant bit (LSB) substitution mechanism is the most common steganographic technique for embedding a secret message in an image with high capacity, while the human visual system (HVS) would be unable to notice the hidden message in the cover image. In this paper, besides employing the LSB substitution technique as a fundamental stage, we take advantage of edge detection technique. The experimental results show that the proposed scheme not only achieves high embedding capacity but also enhances the quality of the stego image from the HVS by an edge detection technique. Moreover, based on that the secret message is replaced with different LSBs, our scheme can effectively resist the image steganalysis.