Comparative Study: Canny-LoG  Edge Detection with Canny-Prewitt Edge Detection by using Huffman Encoding of Image Steganography For Grayscale Images

Authors

  • Areej Mokhtar Elgaier Department of Computer Science, Elmergib University, Alkhoms, Libya
  • Ahmed Mohamed Abushaala Department of Computer Science, Misurata University, Misurata, Libya

DOI:

https://doi.org/10.36602/ijeit.v13i2.550

Keywords:

Least Significant Bit, image steganography, hybrid edge detection, dilation, Canny, LoG, Prewitt

Abstract

The security of data flow is a major concern for the public network that is the Internet. A data transmission security method called steganography conceals the message within a media container, like an image. Undoubtedly, the media cannot carry so much embedded data. Because the image edge area can withstand pixel value fluctuations better than the center, the edge area is used to accommodate additional message bits. In this study, the hybrid Canny-Log detector was compared with hybrid Canny-Prewitt detector by compress a grayscale images using the Huffman algorithm and hid them in the edges of other color images. This combined two-detector method provides a larger edge area for increased message payload while keeping hidden images unnoticeable. The hybrid Canny-LoG detector was achieved better results in embedding capacity (EC) in terms of the number of pixels available for hiding. Additionally, good results were obtained in quality metrics, such as the mean squared error (MSE) and peak signal-to-noise ratio (PSNR) for the stego image.

Downloads

Download data is not yet available.

Author Biography

  • Ahmed Mohamed Abushaala, Department of Computer Science, Misurata University, Misurata, Libya

     

     

References

J. Jumanto, "An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection," Cybernetics and Information Technologies, vol. 18, pp. 74-88, 2018.

I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, "Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research," Neurocomputing, vol. 335, pp. 299-326, 2019.

R. K. MR and T. Mithun, "Edge Connectivity Techniques for Image Analysis–A Survey," 2020.

R. Sun, T. Lei, Q. Chen, Z. Wang, X. Du, W. Zhao, et al., "Survey of image edge detection," Frontiers in Signal Processing, vol. 2, p. 826967, 2022.

D. Mathur and D. P. Mathur, "Edge Detection Techniques In Image Processing With Elaborative Approach Towards Canny," Computer Science Department, Lachoo Memorial College Of Science & Technology, 2016.

S. Singh and A. Datar, "Improved hash based approach for secure color image steganography using canny edge detection method," International Journal of Computer Science and Network Security (IJCSNS), vol. 15, p. 92, 2015.

S. K. Ghosal, J. K. Mandal, and R. Sarkar, "High payload image steganography based on Laplacian of Gaussian (LoG) edge detector," Multimedia Tools and Applications, vol. 77, pp. 30403-30418, 2018.

S. Gupta, C. Gupta, and S. Chakarvarti, "Image edge detection: a review," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, pp. 2246-2251, 2013.

A. S. Ahmed, "Comparative study among Sobel, Prewitt and Canny edge detection operators used in image processing," J. Theor. Appl. Inf. Technol, vol. 96, pp. 6517-6525, 2018.

N. A. Mohsin and H. A. Alameen, "A hybrid method for payload enhancement in image steganography based on edge area detection," Cybernetics and Information Technologies, vol. 21, pp. 97-107, 2021.

A. J. Hussain, A. Al-Fayadh, and N. Radi, "Image compression techniques: A survey in lossless and lossy algorithms," Neurocomputing, vol. 300, pp. 44-69, 2018.

R. P. Jasmi, B. Perumal, and M. P. Rajasekaran, "Comparison of image compression techniques using huffman coding, DWT and fractal algorithm," in 2015 International Conference on Computer Communication and Informatics (ICCCI), 2015, pp. 1-5.

K. Gaurav and U. Ghanekar, "Image steganography based on Canny edge detection, dilation operator and hybrid coding," Journal of Information Security and Applications, vol. 41, pp. 41-51, 2018.

D. R. I. M. Setiadi, "Improved payload capacity in LSB image steganography uses dilated hybrid edge detection," 2019.

J. C. T. Arroyo, C. P. Barbosa, M. V. Aborde, F. B. Yara, and A. J. P. Delima, "An improved image steganography through least significant bit embedding technique with data encryption and compression using polybius cipher and huffman coding algorithm," International Journal, vol. 9, 2020.

M. Alanezi, I. S. M. Altaay, and S. Y. H. Mallaàloo, "Payload and quality augmentation using steganographic optimization technique based on edge detection," Indones. J. Electr. Eng. Comput. Sci, vol. 23, pp. 529-539, 2021.

W. A. Awadh, A. S. Alasady, and A. K. Hamoud, "Hybrid information security system via combination of compression, cryptography, and image steganography," International Journal of Electrical and Computer Engineering, vol. 12, p. 6574, 2022.

F. F. Yahia and A. M. Abushaala, "Cryptography using Affine Hill Cipher Combining with Hybrid Edge Detection (Canny-LoG) and LSB for Data Hiding," in 2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), 2022, pp. 379-384.

Ming Hsieh Department of Electrical Engineering USC Viterbi School of Engineering SIPI Image Database. Available: https://sipi.usc.edu/database/database.php?volume=misc&image=39#top

R. Mishra, A. Mishra, and P. Bhanodiya, "An edge based image steganography with compression and encryption," in 2015 International Conference on Computer, Communication and Control (IC4), 2015, pp. 1-4.

F. Şahin, T. Çevik, and M. Takaoğlu, "Review of the Literature on the Steganography Concept," International Journal of Computer Applications, vol. 975, p. 8887.

H. A. W. J. Albayati and S. A. Ali, "A Comparative Study of Image Steganography Based on Edge Detection," in Journal of Physics: Conference Series, 2021, p. 012032.

R. Patel, V. Kumar, V. Tyagi, and V. Asthana, "A fast and improved Image Compression technique using Huffman coding," in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 2283-2286.

Downloads

Published

2025-05-31

How to Cite

Comparative Study: Canny-LoG  Edge Detection with Canny-Prewitt Edge Detection by using Huffman Encoding of Image Steganography For Grayscale Images. (2025). The International Journal of Engineering & Information Technology (IJEIT), 13(2), 62-70. https://doi.org/10.36602/ijeit.v13i2.550

Similar Articles

31-40 of 76

You may also start an advanced similarity search for this article.