The great and rapid development that is taking place in the areas of data transmission, the Internet, and multimedia has become a basic approach to life, and because of that, it has become necessary to provide modern and developed methods to protect private information from theft and eavesdropping by unauthorized persons. Steganography, a form of art or science that is used to conceal private information from uninvited parties, is one of the most crucial of these techniques. This technique is distinguished by hiding the secret message in a different medium known as the cover medium, in addition to obscuring the fact that there is a data transfer. In this research, a new method was proposed and applied to hide the data. The discrete shearlet transform is applied to transform the cover image into a frequency domain where the secret message will be hidden. The quad chain code technique is then used to extract the boundaries of the object in the cover image, and a series of pixels are taken from these edges to include the secret message and then hide it using the least significant bit (LSB).

1.
P.
Sarkar
,
S. K.
Ghosal
, and
M.
Sarkar
,
Stego-chain: A framework to mine encoded stego-block in a decentralized network
.
Journal of King Saud University-Computer and Information Sciences
,
2022
.
34
(
8
): p.
5349
5365
.
2.
A.K.
Sahu
, and
M.
Sahu
,
Digital image steganography and steganalysis: A journey of the past three decades
.
Open Computer Science
,
2020
.
10
(
1
): p.
296
342
.
3.
S.
Patidar
,
S.
Khan
, and
S.
Singh
. “
Security for Digital Image and Text Message with Steganography and Watermarking Technique
.” in
2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)
.
2019
.
IEEE
.
4.
M.A.
Hasso
,
S.A.
Hasso
, and
B.G.
Maayouf
,
Encrypt and Hide Data in True Color Image Classes.
AL-Rafidain Journal of Computer Sciences and Mathematics
,
2013
.
10
(
3
): p.
75
89
.
5.
J.
Fridrich
,
Steganography in digital media: principles, algorithms, and applications
. (
Cambridge University Press
,
UK
,
2009
).
6.
M.S.
Taha
, et al "Combination of steganography and cryptography: A short survey." in
IOP conference series: materials science and engineering
.
2019
.
IOP Publishing
.
7.
P.
Premaratne
, and
F.
Safaei
. “
2D barcodes as watermarks in image authentication
,” in
6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007)
.
2007
.
IEEE
.
8.
A.S.
Ansari
,
M.S.
Mohammadi
, and
M.T.
Parvez
,
A comparative study of recent steganography techniques for multiple image formats
.
International Journal of Computer Network and Information Security
,
2019
.
11
(
1
): p.
11
25
.
9.
D.D.
Shankar
, and
A.S.
Azhakath
,
Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization
.
Scientific Reports
,
2023
.
13
(
1
): p.
2359
.
10.
D.
Indra
,
Recognition of Bisindo alphabets based on chain code contour and similarity of Euclidean distance.
International Journal on Advanced Science Engineering and Information Technology
,
2017
.
7
(
5
).
11.
G.
Kutyniok
, and
D.
Labate
,
Introduction to shearlets.
Shearlets: Multiscale analysis for multivariate data
,
2012
: p.
1
38
.
12.
D.
Kushwahah
, et al “
Text Message and Digital Image Secure for Discrete Shearlet Transform.
,” in
2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)
.
2020
.
IEEE
.
13.
Y.A.
Hamza
,
N.E.
Tewfiq
, and
M.Q.
Ahmed
,
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
.
Baghdad Science Journal
,
2022
.
19
(
1
): p.
0197
0197
.
14.
M.A.F.
Al-Husainy
, and
D.M.
Uliyan
,
A secret-key image steganography technique using random chain codes
.
International Journal of Technology
,
2019
.
10
(
4
): p.
731
740
.
15.
T.A.
Al-asadi
,
A New Steganography Method for Hiding Message in Image Based on Quad Chain Code and DCT.
European Academic Research
,
2016
.
II
(
10
): January
2015
.
16.
S.
Li
, et al,
Pixel-level image fusion: A survey of the state of the art
.
information Fusion
,
2017
.
33
: p.
100
112
.
17.
B.
Ahmaderaghi
, et al,
Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory
.
IEEE Transactions on Computational Imaging
,
2018
.
4
(
1
): p.
46
59
.
18.
E.L.
Lydia
, et al,
Application of discrete transforms with selective coefficients for blind image watermarking
.
Transactions on Emerging Telecommunications Technologies, y2021.
32
(
2
): p.
e3771
.
19.
A.
Sezer
,
H.B.
Sezer
, and
S.
Albayrak
. “
Classification of bone pathologies with finite discrete shearlet transform based shape descriptors
.” in
2015 International Conference on Image Processing Theory, Tools and Applications (IPTA)
.
2015
.
IEEE
.
20.
P.
Kittipoom
,
G.
Kutyniok
, and
W.-Q.
Lim
,
Construction of compactly supported shearlet frames
.
Constructive Approximation
,
2012
.
35
: p.
21
72
.
21.
T.
Brinda
, and
D.
Dharma
,
Enhancing the compression performance in medical images using a novel hex-directional chain code (Hex DCC) representation. Soft Computing
,
2021
.
25
: p.
5807
5830
.
22.
T.A.A.F.A.
Joda
,
Locational Image Compression based on Chain Code Representation.
International organization of Scientific Research 2014.
4
(ISSN (e): 2250-3021, ISSN (p): 2278-8719).
23.
R.
Sheth
, et al “
Handwritten character recognition system using chain code and correlation coefficient
." in
International Conference on Recent Trends in Information Technology and Computer Science (IRCTITCS) 2011 Proceedings
published in International Journal of Computer Applications (IJCA).
2011
. Citeseer.
24.
B.
Žalik
, et al,
Lossless chain code compression with an improved Binary Adaptive Sequential Coding of zero-runs
.
Journal of Visual Communication and Image Representation
,
2021
.
75
: p.
103050
.
25.
A.K.A.K.A. Kadhem, Determine Blocks of Image for Hiding Operation Based on Quad Chain Code and DCT.
26.
G.
Peter
, et al,
Histogram shifting-based quick response steganography method for secure communication
.
Wireless Communications and Mobile Computing
,
2022
. 2022.
27.
U.
Sara
,
M.
Akter
, and
M.S.
Uddin
,
Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study
.
Journal of Computer and Communications
,
2019
.
7
(
3
): p.
8
18
.
This content is only available via PDF.
You do not currently have access to this content.