Menu
×
Main Library
9 a.m. - 8 p.m.
Phone: (843) 805-6930
West Ashley Library
9 a.m. - 7 p.m.
Phone: (843) 766-6635
Folly Beach Library
Closed for renovations
Phone: (843) 588-2001
John L. Dart Library
9 a.m. - 7 p.m.
Phone: (843) 722-7550
St. Paul's/Hollywood Library
9 a.m. - 8 p.m.
Phone: (843) 889-3300
Mt. Pleasant Library
9 a.m. – 8 p.m.
Phone: (843) 849-6161
Dorchester Road Library
9 a.m. - 8 p.m.
Phone: (843) 552-6466
Edgar Allan Poe/Sullivan's Island Library
9 p.m. - 6 p.m.
Phone: (843) 883-3914
John's Island Library
9 a.m. - 8 p.m.
Phone: (843) 559-1945
McClellanville Library
Closed for renovations
Phone: (843) 887-3699
Edisto Library
9 a.m. - 4 p.m.
Phone: (843) 869-2355
Wando Mount Pleasant Library
9 a.m. - 8 p.m.
Phone: (843) 805-6888
Otranto Road Library
9 a.m. - 8 p.m.
Phone: (843) 572-4094
Hurd/St. Andrews Library
Closed (Toddler Storytime)
Phone: (843) 766-2546
Baxter-Patrick James Island
9 a.m. - 8 p.m.
Phone: (843) 795-6679
Bees Ferry West Ashley Library
9 p.m. - 8 p.m.
Phone: (843) 805-6892
Village Library
9 a.m. - 6 p.m.
Phone: (843) 884-9741
Keith Summey North Charleston Library
9 a.m. – 8 p.m.
Phone: (843) 744-2489
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Today's Hours
Main Library
9 a.m. - 8 p.m.
Phone: (843) 805-6930
West Ashley Library
9 a.m. - 7 p.m.
Phone: (843) 766-6635
Folly Beach Library
Closed for renovations
Phone: (843) 588-2001
John L. Dart Library
9 a.m. - 7 p.m.
Phone: (843) 722-7550
St. Paul's/Hollywood Library
9 a.m. - 8 p.m.
Phone: (843) 889-3300
Mt. Pleasant Library
9 a.m. – 8 p.m.
Phone: (843) 849-6161
Dorchester Road Library
9 a.m. - 8 p.m.
Phone: (843) 552-6466
Edgar Allan Poe/Sullivan's Island Library
9 p.m. - 6 p.m.
Phone: (843) 883-3914
John's Island Library
9 a.m. - 8 p.m.
Phone: (843) 559-1945
McClellanville Library
Closed for renovations
Phone: (843) 887-3699
Edisto Library
9 a.m. - 4 p.m.
Phone: (843) 869-2355
Wando Mount Pleasant Library
9 a.m. - 8 p.m.
Phone: (843) 805-6888
Otranto Road Library
9 a.m. - 8 p.m.
Phone: (843) 572-4094
Hurd/St. Andrews Library
Closed (Toddler Storytime)
Phone: (843) 766-2546
Baxter-Patrick James Island
9 a.m. - 8 p.m.
Phone: (843) 795-6679
Bees Ferry West Ashley Library
9 p.m. - 8 p.m.
Phone: (843) 805-6892
Village Library
9 a.m. - 6 p.m.
Phone: (843) 884-9741
Keith Summey North Charleston Library
9 a.m. – 8 p.m.
Phone: (843) 744-2489
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Patron Login
menu
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
A novel approach of steganography by using strong edge detection and chaos theory.
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
- Author(s): Abdulhammed, Omar Younis
- Source:
Multimedia Tools & Applications; May2022, Vol. 81 Issue 13, p17875-17888, 14p- Subject Terms:
- Source:
- Additional Information
- Abstract: The growth of the Internet and rapid development of digital devices and network technology led to increase the risks and threats of attackers, therefore the important data that is sent via the Internet must be preserved, one of the most substantial security methods utilized to protect this data is steganography, so this technology must be developed and strengthened in order to face the modern technologies used by the attackers. The aim of this paper is to preserve the data sent via internet by proposing a new method that treats to solve the gaps and weakness of previous methods. Since the edge region of the image is more permissive of alteration, therefore is more convenient for concealing secret information. A novel schema of concealing secret information is suggested by creating new algorithm in the name of strong edges detection algorithm (SEDA) to detect strong edges of the image and using chaotic mapping method to generate random numbers. This schema consist of five stages, where in the first stage the canny algorithm is utilized to reveal edges of the carrier media and store it in the new array called (na1), secondly, the SEDA is used to identified strong edges of the (na1) and the results is stored in the new array called (na2) as the strong edges are utilized to conceal mystery information. Thirdly, chirikov map method are using to generate random keys, where these keys are used to choose the locations in the (na2) and which are used to hide secret information. In the fourth stage, the important data is hidden in the chosen pixel locations. The extraction of important information carry out in the fifth stage, which is the opposite of concealing stage. The results proved that the proposed system increase security, robustness, payload capacity, efficiency and maintaining stego image's quality. [ABSTRACT FROM AUTHOR]
- Abstract: Copyright of Multimedia Tools & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Abstract:
Contact CCPL
Copyright 2022 Charleston County Public Library Powered By EBSCO Stacks 3.3.0 [350.3] | Staff Login
No Comments.