A Radical Image Steganography Method Predicated on Intensity and Edge Detection

A Radical Image Steganography Method Predicated on Intensity and Edge Detection

Abhijit Sarkar, Sabyasachi Samanta
ISBN13: 9781668475249|ISBN10: 1668475243|ISBN13 Softcover: 9781668475256|EISBN13: 9781668475263
DOI: 10.4018/978-1-6684-7524-9.ch010
Cite Chapter Cite Chapter

MLA

Sarkar, Abhijit, and Sabyasachi Samanta. "A Radical Image Steganography Method Predicated on Intensity and Edge Detection." Novel Research and Development Approaches in Heterogeneous Systems and Algorithms, edited by Santanu Koley, et al., IGI Global, 2023, pp. 173-190. https://doi.org/10.4018/978-1-6684-7524-9.ch010

APA

Sarkar, A. & Samanta, S. (2023). A Radical Image Steganography Method Predicated on Intensity and Edge Detection. In S. Koley, S. Barman, & S. Joardar (Eds.), Novel Research and Development Approaches in Heterogeneous Systems and Algorithms (pp. 173-190). IGI Global. https://doi.org/10.4018/978-1-6684-7524-9.ch010

Chicago

Sarkar, Abhijit, and Sabyasachi Samanta. "A Radical Image Steganography Method Predicated on Intensity and Edge Detection." In Novel Research and Development Approaches in Heterogeneous Systems and Algorithms, edited by Santanu Koley, Subhabrata Barman, and Subhankar Joardar, 173-190. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-7524-9.ch010

Export Reference

Mendeley
Favorite

Abstract

The internet has grown to be widely used by billions of individuals in our digital age. The internet is required for a variety of platforms, online apps, and standalone applications. Numerous methods, including cryptography, encryption/decryption, and data concealment algorithms, are developed for this goal. However, the employment of these methods was not very secure, making it simple for hackers to get the secret message. A new method called “steganography” was developed to offer the highest level of protection for sensitive data. Steganography's primary goal is to conceal the presence of concealed messages. Additionally, it seeks out concealed messages using factors like the kind of embedding method, the message's length, its content, or the carrier's secret key. At this point in the chapter, a single bit of data has been embedded into edge-based pixel positions with arbitrary bit positions. The authors have compared their method to three standard edge detection algorithms for a more comprehensive assessment. Different statistical measures also have been made for the uniqueness of the technique.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.