Advertisement

Adaptive Block Based Steganographic Model with Dynamic Block Estimation with Fuzzy Rules

  • Mohanjeet KaurEmail author
  • Mamta Juneja
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 8)

Abstract

Steganography is a technique, which can be used for the purpose of hiding the data into similar form or other form of data to create the covert channel among the internet or intranet links to protect it from the various kinds of masquerading or snooping attacks. In this paper, we have proposed the dynamic fuzzifier for the robust image embedding. The dynamic fuzzifier module (DFM) is responsible for the segmentation, selection and fuzzy weight calculation among the input cover and secret image. The embedding algorithm has been designed with the spatio-temporal ability to embed the secret data in the block edges of the cover image, while utilizing the non-overlapping block-based division. The proposed method is able to achieve better PSNR than the existing algorithm while embedding the data into the cover image.

Keywords

Dynamic fuzzy rule set determination (DFRSD) Decision logic for embedding decision (DLED) Fuzzy weight calculation algorithm PSNR MSE Embedding capacity 

References

  1. 1.
    Artz, D.: ‘Digital steganographic: hiding data within data’, IEEE Int. Comput., 2001, 5, (3), pp. 75–80.Google Scholar
  2. 2.
    Lee, Y.K., Chen, L.H.: ‘High capacity image steganography model’, Proc. of IEEE on Vision, Image and Signal Process., vol. 147, no. 3, pp. 288–294, 2000.Google Scholar
  3. 3.
    Benlcouiri, Y., Ismaili, M., Azizi, A., and Benabdellah, M., “Securing images by secret key steganography,” Applied Mathematical Sciences, vol. 6, no. 111, pp. 5513–5523, 2012.Google Scholar
  4. 4.
    Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin (2000), “Hiding Data in Images by Optimal Moderately Significant Bit Replacement” IET Electronics Letters, vol. 36, no. 25, pp. 2069–2070.Google Scholar
  5. 5.
    J. Canny, “A Computational Approach to Edge Detection,” IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 8, pp. 679–687, 1986.Google Scholar
  6. 6.
    H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” Proceedings of 2005 Instrument Electric Engineering, Vis. Images Signal Process, vol. 152, no. 5 pp. 611–615, 2005.Google Scholar
  7. 7.
    Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems”. IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp. 488–497, 2008.Google Scholar
  8. 8.
    Weiqi luo, member, IEEE, fangjun huang, member, IEEE et al., ‘‘edge adaptive image steganography based on LSB matching revisited’’, IEEE transactions on information forensics and security, vol. 5, no. 2, June 2010.Google Scholar
  9. 9.
    Santosh Arjun, N. and Atul Negi, “A Filtering Based Approach to Adaptive Steganography,” 10th Conference, TENCON 2006, IEEE, pp. 1–4, Nov 2006.Google Scholar
  10. 10.
    Manglem Singh, Birendra Singh, Shyam Sundar Singh, “Hiding Encrypted Message in the Features of Images”, IJCSNS, VOL. 7, No.4. April, 2007.Google Scholar
  11. 11.
    Chen, W.-J., Chang, C.-C., and Le, T., “High payload steganography mechanism using hybrid edge detector,” Expert Systems with Applications, vol. 37, no. 4, pp. 3292–3301, 2010.Google Scholar
  12. 12.
    Hsien-Wen Tseng, Hui-Shih Leng, “high-payload block-based data hiding scheme using hybrid edge detector with minimal distortion”, IET Image Process, Vol. 8, Iss. 11, pp. 647–654, 2014.Google Scholar
  13. 13.
    Anastasia Ioannidou, Spyros T. Halkidis, George Stephanides, “A novel technique for image steganography based on a high payload method and edge detection”, Expert Systems with Applications, Vol. 39, pp. 11517–11524, 2012.Google Scholar
  14. 14.
    Hussain, M. and Hussain, “Embedding data in edge boundaries with high PSNR”, Proceedings of 7th International Conference on Emerging Technologies (ICET 2011), pp. 1–6, Sept 2011.Google Scholar
  15. 15.
    Mamta Juneja and Parvinder S. Sandhu, “A New Approach for Information Security using an Improved Steganography Technique,” J Inf Process Syst, vol. 9, no. 4, 2013.Google Scholar
  16. 16.
    Deepali Singla and Mamta Juneja, ‘‘Hybrid Edge Detection-Based Image Steganography Technique for Color Images”, Intelligent Computing, Communication and Devices, Advances in Intelligent Systems and Computing, Springer India, 2015.Google Scholar
  17. 17.
    Wu, D.C., and Tsai, W.H.: ‘A steganographic method for images by pixel-value differencing’, Pattern Recognit. Lett., 2003, 24, (9–10), pp. 1613–1626.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.CSE DepartmentUIET, Panjab UniversityChandigarhIndia

Personalised recommendations