Convergence between fuzzy logic and steganography for high payload data embedding and more security

Steganography is the science and art of concealing data into common form of information. The private data is hidden so that unauthorized access to its content is prevented. There are rules for this action; The least significant bit (LSB) substitution is a well-known mechanism for implementation of steganography technique. It simply embeds data by replacing the LSBs of the image pixels and the human visual system (HVS) would be unable to sense that. In this regard, either loosely or lossless techniques may be applied for embedding data. Although loosely methods provide large hiding capacity, host files cannot be recovered completely via these methods. In some applications host images need to be recovered actually and completely such as medical reports in which data must be embedded without any change in image size in extracting phase. In this paper, we propose a hybrid edge detection method consisted of Canny Edge Detection (CED) and Fuzzy Edge Detection (FED). The experimental results prove that the proposed scheme not only achieves high embedding capacity, and increases the quality of the stego image from the HVS by embedding data in edge areas but also it can effectively resist the image steganalysis.

[1]  Mahdi Hassani Goodarzi A web-based Implementation of a Student Education Advisor System based on Fuzzy Expert Systems , 2008 .

[2]  Milan Sonka,et al.  Image Processing, Analysis and Machine Vision , 1993, Springer US.

[3]  V. K. Govindan,et al.  Improving BTC image compression using a fuzzy complement edge operator , 2008, Signal Process..

[4]  Chin-Chen Chang,et al.  A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy , 2009, J. Syst. Softw..

[5]  Cheng-Hsing Yang,et al.  Varied PVD + LSB evading detection programs to spatial domain in data embedding systems , 2010, J. Syst. Softw..

[6]  Qingzhong Liu,et al.  An improved approach to steganalysis of JPEG images , 2010, Inf. Sci..

[7]  Lily R. Liang,et al.  Competitive fuzzy edge detection , 2003, Appl. Soft Comput..

[8]  Florin Moldoveanu,et al.  A FUZZY LOGIC BASED METHOD FOR EDGE DETECTION , 2011 .

[9]  Qiaoyan Wen,et al.  A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..

[10]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[11]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[12]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[13]  Rainer Böhme,et al.  Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.

[14]  William A. Pearlman,et al.  Kernel Fisher discriminant for steganalysis of JPEG hiding methods , 2004, IS&T/SPIE Electronic Imaging.

[15]  Chun-Shien Lu,et al.  Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .

[16]  Rainer Bhme Advanced Statistical Steganalysis , 2010 .

[17]  Ayman A. Aly,et al.  Edge Detection in Digital Images Using Fuzzy Logic Technique , 2009 .

[18]  Samir I. Shaheen,et al.  High capacity lossless data embedding technique for palette images based on histogram analysis , 2010, Digit. Signal Process..

[19]  Farhad Mehmanpazir,et al.  A WEB-BASED IMPLEMENTATION OF A PORTFOLIO ADVISOR SYSTEM BASED ON FUZZY EXPERT SYSTEMS , 2010 .

[20]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .

[21]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[22]  Cheng-Hsing Yang,et al.  A data hiding scheme using the varieties of pixel-value differencing in multimedia images , 2011, J. Syst. Softw..