Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques

Abstract This paper presents a comparative study of evaluation and benchmarking information hiding approaches based on multi-measurement analysis using the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method in terms of different parameter settings because several settings of TOPSIS are continually making complex decisions within any study case. The problem is extended from original TOPSIS in terms of different contexts, distance and normalisation techniques. However, each technique changes the behaviour of data differently. The literature presents no evidence that any of those techniques affects the final decision. Supporting results are needed to justify which technique is the best for this particular study on evaluation and benchmarking digital watermarking approaches. For these purposes, two experiments are performed. In the first experiment, a noise-gate-based digital watermarking approach is developed, and a scheme for noise gate digital watermarking approach is enhanced. A total of 60 audio samples with different audio styles are tested using the two algorithms. A total of 120 samples are evaluated according to three different metrics, namely, quality, payload and complexity, to generate a set of digital watermarking samples. In the second experiment, three different weights are selected in the decision making process. For the first weight, 50% of importance is given to size and 25% each for quality and complexity. In the second weight, 50% is given to quality and 25% each to size and complexity. In the last weight, 50% of importance is given to complexity and 25% each to size and quality. In the decision making solution, the algorithm adjustment and parameter selection of TOPSIS are identified and tested based on three parameters, namely, normalisation, separation and contexts. In the normalisation process, two different linear normalisation and vector normalisation techniques are used. In the separation process, two different techniques, namely, Manhattan and Euclidean distances, are used, and each of these measurements has different philosophies. In the context process, two different contexts, such as decision making based on signal and group, are used. The results are as follows: (1) The preferred normalisation technique is followed by vector normalisation. (2) We recommend linear normalisation with TOPSIS by integrating the results from our experiment and the literature experiment. (3) The separation measurement has an effect on decision making algorithms, and the Euclidean measurement in the separation process reflects more accurate results than the Manhattan measurement. (4) The framework selects one of the two context settings, that is, group or individual, which will give the same results. However, group decision making is the recommended approach in the case of selection where priority weights are generated from the evaluators.

[1]  E. Stanley Lee,et al.  An extension of TOPSIS for group decision making , 2007, Math. Comput. Model..

[2]  Stelios H. Zanakis,et al.  Multi-attribute decision making: A simulation comparison of select methods , 1998, Eur. J. Oper. Res..

[3]  B. B. Zaidan,et al.  Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS , 2015, J. Biomed. Informatics.

[4]  A. A. Zaidan,et al.  A methodology for football players selection problem based on multi-measurements criteria analysis , 2017 .

[5]  S. Abdul Kather,et al.  Real Steganography in Non Voice Part of the Speech , 2012 .

[6]  B. B. Zaidan,et al.  Towards on Develop a Framework for the Evaluation and Benchmarking of Skin Detectors Based on Artificial Intelligent Models Using Multi-Criteria Decision-Making Techniques , 2017, Int. J. Pattern Recognit. Artif. Intell..

[7]  B. B. Zaidan,et al.  New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques , 2010, ArXiv.

[8]  Dubravka M. Pavlicic,et al.  Normalisation affects the results of MADM methods , 2001 .

[9]  Zarinah Mohd Kasirun,et al.  On the capacity and security of steganography approaches: An overview , 2010 .

[10]  A. A. Zaidan,et al.  On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .

[11]  Ghazali Sulong,et al.  A new fuzzy performance modeling for evaluating the trade-off among robustness, quality and capacity in watermaking algorithms , 2012 .

[12]  A. A. Zaidan,et al.  A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared , 2010 .

[13]  Morteza Yazdani,et al.  A state-of the-art survey of TOPSIS applications , 2012, Expert Syst. Appl..

[14]  B. Zaidan,et al.  New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm , 2009 .

[15]  B. B. Zaidan,et al.  Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques , 2017, J. Circuits Syst. Comput..

[16]  Sherin M. Youssef,et al.  Adaptive video watermarking integrating a fuzzy wavelet-based human visual system perceptual model , 2013, Multimedia Tools and Applications.

[17]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[18]  Hamid A. Jalab,et al.  An Overview on Hiding Information Technique in Images , 2010 .

[19]  A. A. Zaidan,et al.  A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques , 2017 .

[20]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[21]  A. A. Zaidan,et al.  Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .

[22]  Ahmed Wathik Naji,et al.  Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography , 2009 .

[23]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[24]  Binh Pham,et al.  Semi fragile watermark with self authentication and self recovery , 2009 .

[25]  Jeng-Shyang Pan,et al.  Tabu search based multi-watermarks embedding algorithm with multiple description coding , 2011, Inf. Sci..

[26]  Jiwu Huang,et al.  Twenty years of digital audio watermarking - a comprehensive review , 2016, Signal Process..

[27]  Asifullah Khan,et al.  Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding , 2007, Inf. Fusion.

[28]  B. B. Zaidan,et al.  Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.

[29]  Ching-Lai Hwang,et al.  Fuzzy Multiple Attribute Decision Making - Methods and Applications , 1992, Lecture Notes in Economics and Mathematical Systems.

[30]  B. B. Zaidan,et al.  Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.

[31]  Abdullah Gani Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .

[32]  Ali Hamzeh,et al.  A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram , 2010, Multimedia Tools and Applications.

[33]  A. A. Zaidan,et al.  Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .

[34]  B. B. Zaidan,et al.  Novel Methodology for Triage and Prioritizing Using "Big Data" Patients with Chronic Heart Diseases Through Telemedicine Environmental , 2017, Int. J. Inf. Technol. Decis. Mak..

[35]  Francesco G. B. De Natale,et al.  Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms , 2009, IEEE Transactions on Information Forensics and Security.

[36]  Bilal Zaidan,et al.  Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.

[37]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[38]  Zarinah Mohd Kasirun,et al.  On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .

[39]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[40]  A. A. Zaidan,et al.  Comprehensive insights into evaluation and benchmarking of real-time skin detectors: Review, open issues & challenges, and recommended solutions , 2018 .

[41]  A. A. Zaidan,et al.  StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .

[42]  Hong Peng,et al.  An optimal image watermarking approach based on a multi-objective genetic algorithm , 2011, Inf. Sci..

[43]  B. B. Zaidan,et al.  Overview: Main Fundamentals for Steganography , 2010, ArXiv.

[44]  A. A. Zaidan,et al.  A review of audio based steganography and digital watermarking , 2011 .

[45]  Ja-Ling Wu,et al.  Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes , 2009, Inf. Sci..

[46]  A. A. Zaidan,et al.  New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .

[47]  Fazida Othman,et al.  Stego-Image vs Stego-Analysis System , 2009 .

[48]  B. B. Zaidan,et al.  Multi-criteria analysis for OS-EMR software selection problem: A comparative study , 2015, Decis. Support Syst..

[49]  Malay Kumar Kundu,et al.  Genetic algorithms for optimality of data hiding in digital images , 2008, Soft Comput..

[50]  A. A. Zaidan,et al.  Challenges of Hidden Data in the Unused Area Two within Executable Files , 2009 .

[51]  Gwo-Hshiung Tzeng,et al.  Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS , 2004, Eur. J. Oper. Res..

[52]  A. A. Zaidan,et al.  New Technique of Hidden Data in PE-File with in Unused Area One , 2009 .

[53]  A. A. Zaidan,et al.  High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm , 2009 .

[54]  T. Madhloom,et al.  Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis , 2009 .

[55]  Dimitris E. Koulouriotis,et al.  Performance evaluation of moment-based watermarking methods: A review , 2012, J. Syst. Softw..

[56]  Ee-Leng Tan,et al.  Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform , 2015, Signal Process..

[57]  Fazidah Othman,et al.  Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .

[58]  Aydin Çelen,et al.  Comparative Analysis of Normalization Procedures in TOPSIS Method: With an Application to Turkish Deposit Banking Market , 2014, Informatica.

[59]  Mangal V. Pati,et al.  Audio Watermarking: A Way to Copyright Protection , 2012 .