دراسة مقارنة: اكتشاف حافة Canny-LoG باستخدام اكتشاف حافة Canny-Prewitt باستخدام ترميز Huffman لإخفاء الصور
DOI:
https://doi.org/10.36602/ijeit.v13i2.550الكلمات المفتاحية:
Least Significant Bit, image steganography, hybrid edge detection, dilation, Canny, LoG, Prewittالملخص
إن أمن تدفق البيانات يشكل مصدر قلق كبير للشبكة العامة التي هي الإنترنت. تقوم طريقة أمان نقل البيانات التي تسمى التخفي بإخفاء الرسالة داخل حاوية وسائط، مثل الصورة. مما لا شك فيه أن الوسائط لا يمكنها حمل الكثير من البيانات المضمنة. نظرًا لأن منطقة حافة الصورة يمكنها تحمل تقلبات قيمة البكسل بشكل أفضل من المركز، يتم استخدام منطقة الحافة لاستيعاب بتات الرسالة الإضافية. في هذه الدراسة، تمت مقارنة كاشفات Canny-Log الهجينة وكاشفات Canny-Prewitt الهجينة ببعضها البعض في الصور الملونة وتوسيع حوافها بواسطة عنصر البنية [5 × 5]، وإخفاء صورة الدرجات الرمادية في اكتشافات تلك الحواف بعد ضغطها بواسطة تشفير هوفمان. توفر طريقة الكاشفين المدمجة هذه مساحة حافة أكبر لزيادة حمولة الرسالة مع الحفاظ على الصور المخفية غير المحسوسة. كان الكاشف الهجين Canny-LoG أفضل في سعة التضمين (EC) فيما يتعلق بعدد البكسلات المتاحة للإخفاء. بالإضافة إلى ذلك، تم الحصول على نتائج جيدة في مقاييس الجودة متوسط الخطأ التربيعي (MSE)، ونسبة الإشارة إلى الضوضاء القصوى (PSNR) لصورة ستيجو.
التنزيلات
المراجع
J. Jumanto, "An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection," Cybernetics and Information Technologies, vol. 18, pp. 74-88, 2018.
I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, "Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research," Neurocomputing, vol. 335, pp. 299-326, 2019.
R. K. MR and T. Mithun, "Edge Connectivity Techniques for Image Analysis–A Survey," 2020.
R. Sun, T. Lei, Q. Chen, Z. Wang, X. Du, W. Zhao, et al., "Survey of image edge detection," Frontiers in Signal Processing, vol. 2, p. 826967, 2022.
D. Mathur and D. P. Mathur, "Edge Detection Techniques In Image Processing With Elaborative Approach Towards Canny," Computer Science Department, Lachoo Memorial College Of Science & Technology, 2016.
S. Singh and A. Datar, "Improved hash based approach for secure color image steganography using canny edge detection method," International Journal of Computer Science and Network Security (IJCSNS), vol. 15, p. 92, 2015.
S. K. Ghosal, J. K. Mandal, and R. Sarkar, "High payload image steganography based on Laplacian of Gaussian (LoG) edge detector," Multimedia Tools and Applications, vol. 77, pp. 30403-30418, 2018.
S. Gupta, C. Gupta, and S. Chakarvarti, "Image edge detection: a review," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, pp. 2246-2251, 2013.
A. S. Ahmed, "Comparative study among Sobel, Prewitt and Canny edge detection operators used in image processing," J. Theor. Appl. Inf. Technol, vol. 96, pp. 6517-6525, 2018.
N. A. Mohsin and H. A. Alameen, "A hybrid method for payload enhancement in image steganography based on edge area detection," Cybernetics and Information Technologies, vol. 21, pp. 97-107, 2021.
A. J. Hussain, A. Al-Fayadh, and N. Radi, "Image compression techniques: A survey in lossless and lossy algorithms," Neurocomputing, vol. 300, pp. 44-69, 2018.
R. P. Jasmi, B. Perumal, and M. P. Rajasekaran, "Comparison of image compression techniques using huffman coding, DWT and fractal algorithm," in 2015 International Conference on Computer Communication and Informatics (ICCCI), 2015, pp. 1-5.
K. Gaurav and U. Ghanekar, "Image steganography based on Canny edge detection, dilation operator and hybrid coding," Journal of Information Security and Applications, vol. 41, pp. 41-51, 2018.
D. R. I. M. Setiadi, "Improved payload capacity in LSB image steganography uses dilated hybrid edge detection," 2019.
J. C. T. Arroyo, C. P. Barbosa, M. V. Aborde, F. B. Yara, and A. J. P. Delima, "An improved image steganography through least significant bit embedding technique with data encryption and compression using polybius cipher and huffman coding algorithm," International Journal, vol. 9, 2020.
M. Alanezi, I. S. M. Altaay, and S. Y. H. Mallaàloo, "Payload and quality augmentation using steganographic optimization technique based on edge detection," Indones. J. Electr. Eng. Comput. Sci, vol. 23, pp. 529-539, 2021.
W. A. Awadh, A. S. Alasady, and A. K. Hamoud, "Hybrid information security system via combination of compression, cryptography, and image steganography," International Journal of Electrical and Computer Engineering, vol. 12, p. 6574, 2022.
F. F. Yahia and A. M. Abushaala, "Cryptography using Affine Hill Cipher Combining with Hybrid Edge Detection (Canny-LoG) and LSB for Data Hiding," in 2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), 2022, pp. 379-384.
Ming Hsieh Department of Electrical Engineering USC Viterbi School of Engineering SIPI Image Database. Available: https://sipi.usc.edu/database/database.php?volume=misc&image=39#top
R. Mishra, A. Mishra, and P. Bhanodiya, "An edge based image steganography with compression and encryption," in 2015 International Conference on Computer, Communication and Control (IC4), 2015, pp. 1-4.
F. Şahin, T. Çevik, and M. Takaoğlu, "Review of the Literature on the Steganography Concept," International Journal of Computer Applications, vol. 975, p. 8887.
H. A. W. J. Albayati and S. A. Ali, "A Comparative Study of Image Steganography Based on Edge Detection," in Journal of Physics: Conference Series, 2021, p. 012032.
R. Patel, V. Kumar, V. Tyagi, and V. Asthana, "A fast and improved Image Compression technique using Huffman coding," in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 2283-2286.
التنزيلات
منشور
الرخصة
الحقوق الفكرية (c) 2025 The International Journal of Engineering & Information Technology (IJEIT)

هذا العمل مرخص بموجب Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.









