Skip to main content
Log in

A novel digital image covert communication scheme based on generalized FCM in DCT domain

  • Original Article
  • Published:
Fuzzy Information and Engineering

Abstract

A novel covert communication method of digital image is presented, based on generalized fuzzy c-means clustering (GFCM), human visual system (HVS) and discrete cosine transform (DCT). Therefore, the original image blocks are classified into two classes according to specified characteristic parameters. So one block is suited for embedding security information, but the other block is not. Hence the appropriate blocks can be selected in an image to embed the security information by selectively modifying the middle-frequency part of the original image in conjunction with HVS and DCT. Furthermore the maximal information strength is fixed based to the frequency masking. Also to improve performances of the proposed algorithm, the security information is modulated into the chaotic modulation array. The simulation results show that we can remarkably extract the hiding security information and can achieve good robustness with common signal distortion or geometric distortion and the quality of the embedded image is guaranteed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cox I J, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Transactions On Image Processing 6(12): 1673–1687

    Article  Google Scholar 

  2. Yang E H, Sun W (2008) On information embedding when watermarks and covertexts are correlated. IEEE transactions on Information Theory 54(7): 3340–3345

    Article  MathSciNet  Google Scholar 

  3. Hung K M (2008) A novel robust watermarking technique using int DCT based AC prediction. WSEAS Transactions on Computers 7(1): 16–24

    Google Scholar 

  4. Tang S F, Ma H, Song E B, Su L Y (2006) An adaptive blind scheme for readable watermark based on ALE. International Conference on Signal Processing Proceedings 1: 2982–2986

    Google Scholar 

  5. Damien D, Benoit M (2006) Watermarking relying on cover signal content to hide synchronization marks. IEEE Transactions on Information Forensics and Security 1(1): 87–101

    Article  Google Scholar 

  6. Su L Y, Ma H, Tang S F (2006) Adaptive image digital watermarking with DCT and FCM. Wuhan University Journal of Natural Sciences 11(6): 1657–1660

    Article  MATH  Google Scholar 

  7. Peng J, Su L Y, Li Z, Tang S F (2007) A novel algorithm of covert image communication with wavelet transform and information fusion. International Conference on Image and Graphics 1: 307–312

    Google Scholar 

  8. Su L Y (2010) Prediction of multivariate chaotic time series with local polynomial fitting. Computers & Mathematics with Applications 59(2): 737–744

    Article  MathSciNet  MATH  Google Scholar 

  9. Su L Y, Liu R H, Li F L, and Li J J (2010) Prediction comparative study of complex multivariate systems with AGA-BP. International Conference on Computer Application and System Modeling 10: 50–54

    Google Scholar 

  10. Jayant N H, Nstok J (1993) Signal compression based on model of human perception. Proceeding of the IEEE 81(10): 1385–1422

    Article  Google Scholar 

  11. Yu J, Yang MS (2005) Optimality test for generalized FCM and its application to parameter selection. IEEE Transactions on Fuzzy Systems 13(1): 164–176

    Article  Google Scholar 

  12. Yu J, Yang M S (2007) A generalized fuzzy clustering regularization model with optimality tests and model complexity analysis. IEEE Trans. on Fuzzy Systems 15(5): 904–915

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li-yun Su.

About this article

Cite this article

Su, Ly., Li, Fl., Li, Jj. et al. A novel digital image covert communication scheme based on generalized FCM in DCT domain. Fuzzy Inf. Eng. 3, 127–136 (2011). https://doi.org/10.1007/s12543-011-0071-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12543-011-0071-z

Keywords

Navigation