COI code: COMCO04_119
Paper Language: English
How to Download This Paper
For Downloading the Fulltext of CIVILICA papers please visit the orginal Persian Section of website.
Authors Steganography of Confidential Information in Digital Images Based on Fuzzy Edge DetectionSina Bageri - Islamic Azad University Bilehsavar Branch, Bilehsavar, Iran
Hekmat Mohammadzadeh - Islamic Azad University Parsabad Moghan Branch, Parsabad, Iran
Davar Eslampanah - Islamic Azad University Bilehsavar Branch, Bilehsavar, Iran
Vahid bargar - Islamic Azad University Germi Branch, Germi, Iran
Abstract:Steganography is the science of invisible telecommunication. This science aims to provide secure and inconspicuous communication. In fact, a steganography system should hide a confidential message in a media medium (voice, image, video, etc.), such that no tangible change is made in the media and the unauthorized eavesdropper of the channel (attacker) cannot notice the existence of hidden information. Steganography is the art and science of information embedding in a media medium with an increasing application considering digital communications. The main objective of steganography is security in the lack of proving the existence of a message. Most existing methods use common image steganography approaches, where attacks are discussed for decrypting the hidden message. Therefore, this paper provides a method based on fuzzy edge detection to embed information in digital images. Results of the proposed method show the high quality of the steganography image.
Keywords:Steganography, Edge detection, Fuzzy, Security systems
COI code: COMCO04_119
how to cite to this paper:If you want to refer to this article in your research, you can easily use the following in the resources and references section:
Bageri, Sina; Hekmat Mohammadzadeh; Davar Eslampanah & Vahid bargar, 2017, Steganography of Confidential Information in Digital Images Based on Fuzzy Edge Detection, 4th International Conference on Knowledge Based Research in Computer Engineering and Information Technology, تهران, دانشگاه ابرار, https://www.civilica.com/Paper-COMCO04-COMCO04_119.htmlInside the text, wherever referred to or an achievement of this article is mentioned, after mentioning the article, inside the parental, the following specifications are written.
First Time: (Bageri, Sina; Hekmat Mohammadzadeh; Davar Eslampanah & Vahid bargar, 2017)
Second and more: (Bageri; Mohammadzadeh; Eslampanah & bargar, 2017)
For a complete overview of how to citation please review the following CIVILICA Guide (Citation)
Research Info Management
Export Citation info of this paper to research management softwares
New Related Papers
- Novel Drone Guidance Based on Bee Algorithm Optimization
- Planning Considerations for Cluster Scheduling Algorithms Performance Evaluating of Cluster Job Schedulering Mechanism
- Wireless network testbed for reliability assessment of OMNeT++ simulation tool
- Design and Implementation an RFID System for Optimizing Surgery Process in Hospital, Based On Simulation
- The iterative method for solving non-linear equations
The Above articles are recently indexed in the related subjects
Iran Scientific Advertisment Netword
Share this paper
WHAT IS COI?
COI is a national code dedicated to all Iranian Conference and Journal Papers. the COI of each paper can be verified online.