2020
DOI: 10.1007/s00530-020-00703-3
|View full text |Cite
|
Sign up to set email alerts
|

Image steganography based on Kirsch edge detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…StegExpose iterates over a number of stages to only analyze potentially probable stego files in order to execute a quick fusion and save calculation time. A detector component is connected, and the cumulative arithmetic mean is updated at each step 10 . The image is considered manipulated if this mean falls below a specified threshold.…”
Section: Experiments Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…StegExpose iterates over a number of stages to only analyze potentially probable stego files in order to execute a quick fusion and save calculation time. A detector component is connected, and the cumulative arithmetic mean is updated at each step 10 . The image is considered manipulated if this mean falls below a specified threshold.…”
Section: Experiments Resultsmentioning
confidence: 99%
“…A detector component is connected, and the cumulative arithmetic mean is updated at each step. 10 The image is considered manipulated if this mean falls below a specified threshold. Table 6 shows that test images are all under the stego threshold that is, the steganalysis fails the test because it does not detect the presence of stego images.…”
Section: Poof Of Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…However, the technique can be further enhanced in the security domain. In 2021, Ghosal et al [ 60 ] have suggested an image hiding approach based on the Kirsch edge detector. In this method, the data has been embedded into both edge and non-edge regions of an image in such a way that image distortion is minimized.…”
Section: Literature Surveymentioning
confidence: 99%
“…They used the renown LSB substitution method to implant data bits. In [29], Ghosal proposed a steganography scheme using the Kirsch edge detection method where they implanted the message bits into each triplet of pixels. Therefore, the embedding capacity is low.…”
Section: Introductionmentioning
confidence: 99%