TY - GEN
T1 - Sobel Edges Key-Based Method for Steganography in Spatial Domain Images
AU - Haq, Thoha Ikhwanul
AU - Mafazy, Muhammad Meftah
AU - Agustinus, Jeems Terri
AU - De La Croix, Ntivuguruzwa Jean
AU - Ahmad, Tohari
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Safeguarding confidential messages has emerged as a central concern within the domain of network security, prompted by issues related to breaches of network usage policies and unauthorized access to public networks. Various data protection techniques, including cryptography and steganography, have been devised to counter these challenges. Cryptography involves encrypting secret messages into ciphertext, while steganography conceals secret messages within codes embedded in digital files, such as images, audio, and videos. Unlike cryptography, steganography focuses on securely transmitting secret messages over public networks by concealing them. This paper introduces a novel steganographic algorithm that addresses these challenges by leveraging the Sobel algorithm to detect image edges. The algorithm combines identified edges with a secret key. It applies a modulus function to the cover image for data concealment. Experimental results showcase the algorithm's efficacy, revealing a stego image of superior quality with a peak signal-to-noise ratio of 53.18 dB. This marks a substantial enhancement over existing methods, particularly noteworthy considering our approach's accommodation of a sizable payload.
AB - Safeguarding confidential messages has emerged as a central concern within the domain of network security, prompted by issues related to breaches of network usage policies and unauthorized access to public networks. Various data protection techniques, including cryptography and steganography, have been devised to counter these challenges. Cryptography involves encrypting secret messages into ciphertext, while steganography conceals secret messages within codes embedded in digital files, such as images, audio, and videos. Unlike cryptography, steganography focuses on securely transmitting secret messages over public networks by concealing them. This paper introduces a novel steganographic algorithm that addresses these challenges by leveraging the Sobel algorithm to detect image edges. The algorithm combines identified edges with a secret key. It applies a modulus function to the cover image for data concealment. Experimental results showcase the algorithm's efficacy, revealing a stego image of superior quality with a peak signal-to-noise ratio of 53.18 dB. This marks a substantial enhancement over existing methods, particularly noteworthy considering our approach's accommodation of a sizable payload.
KW - Information security
KW - data hiding
KW - national security
KW - network infrastructure
KW - steganography
UR - http://www.scopus.com/inward/record.url?scp=85186965398&partnerID=8YFLogxK
U2 - 10.1109/ICMNWC60182.2023.10435975
DO - 10.1109/ICMNWC60182.2023.10435975
M3 - Conference contribution
AN - SCOPUS:85186965398
T3 - 3rd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2023
BT - 3rd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 3rd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2023
Y2 - 4 December 2023 through 5 December 2023
ER -