Computerised Information Security Using Texture Based Fuzzy Cryptosystem
The main objective of this study is to form a unique and economical steganographic technique for digital pictures employed for secret transmission using texture and fuzzy logic. This technique is employed to embed data in the carrier image and to extract the hidden message within the same carrier image. Initially, fuzzification is completed which transforms the carrier and the secret image into numerous bitplanes. Afterward, the pixel number calculation is completed within the original image. Then feature extraction is completed within the secret image so as to represent the data in it. Finally, pixel merging follows within the sender region by assignment of white and black pixels in the original image and in the secret pictures. Pixel numbers and texture features are extracted and can be used as a key for retrieving the embedded image from the receiver. This modified approach can be applied in various images. Experimental results reveal that this method will hide and retrieve the secret messages in a carrier accurately.
Keywords:information security, fuzzy logic, texture features, carrier image, secret image, steganography
R. C. Gonzalez, R. E. Woods, Digital Image Processing, Pearson, 2008
N. F. Johnson, S. Jajodia, “Steganalysis: The Investigation of Hidden Information”, IEEE Information Technology Conference, Information Environment for the Future, Syracuse, New York, USA, September 3, 1998
I. Avcibas, N. D. Memon, B. Sankur, “Steganalysis based on image quality metrics”, IEEE Fourth Workshop on Multimedia Signal Processing, Cannes, France, October 3-5, 2001
A. S. Abdullah, “Text Hiding Based On Hue Content In HSV Color Space”, International Journal of Emerging Trends & Technology in Computer Science, Vol. 4, No. 2, pp. 170-173, 2015
Z. K. Al-Ani, A. A. Zaidan, B. B. Zaidan, H. O. Alanazi, “Overview: Main Fundamentals for Steganography”, Computer Engineering, Vol. 2, pp. 158-165, 2010
F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information hiding-a survey”, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 87, No. 7, pp. 1062-1078, 1999 DOI: https://doi.org/10.1109/5.771065
S. Craver, B. L. Yeo, M. Yeung, “Technical trials and legal tribulations”, Communications of the A.C.M., Vol. 41, No. 7, pp. 44-54, 1998 DOI: https://doi.org/10.1145/278476.278486
R. J. Anderson, F. A. P. Petitcolas, “On the limits of steganography”, IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 474-481, 1998 DOI: https://doi.org/10.1109/49.668971
A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods”, Signal Processing, Vol. 90, pp. 727-752, 2010 DOI: https://doi.org/10.1016/j.sigpro.2009.08.010
N. F. Johnson, S. Jajodia, “Exploring steganography: seeing the unseen”, Computer, Vol. 31, No. 2, pp. 26-34, 1998 DOI: https://doi.org/10.1109/MC.1998.4655281
W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, “Applications for data hiding”, IBM Systems Journal, Vol. 39, No. 3-4, pp. 547-568, 2000 DOI: https://doi.org/10.1147/sj.393.0547
F. A. P. Petitcolas, “Introduction to information hiding”, in: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Inc., Norwood, 2000
S. G. Miaou, C. M. Hsu, Y. S. Tsai, H. M. Chao, “A secure data hiding technique with heterogeneous data-combining capability for electronic patient records”, 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, USA, July 23-28, 2000
Fujitsu Ltd., Tackling New Challenges, Annual Report 2007, Fujitsu Ltd., 2007
N. Provos, P. Honeyman, “Hide and seek: an introduction to steganography”, IEEE Security and Privacy, Vol. 99, No. 3, pp. 32-44, 2003 DOI: https://doi.org/10.1109/MSECP.2003.1203220
F. Khursheed, A. H. Mir, “Fuzzy logic-based data hiding”, Proceeding of Cyber Security, Cyber Crime, and Cyber Forensics, Department of Electronics and Communication, National Institute of Technology, Srinagar, India, 2009
A. H. Mir, “Fuzzy entropy based interactive enhancement of radiographic images”, Journal of Medical Engineering and Technology, Vol. 31, No. 3, pp. 220-231, 2007 DOI: https://doi.org/10.1080/03091900600824374
V. K. Munirajan, E. Cole, S. Ring, “Transform domain steganography detection using fuzzy inference systems”, IEEE Sixth International Symposium on Multimedia Software Engineering, Miami, USA, December 13-15, 2004
A. A. Alghamdi, “Computerized Steganographic Technique using Fuzzy Logic”, International Journal of Advanced Computer Science and Applications, Vol. 9, No. 3, pp. 155-159, 2018 DOI: https://doi.org/10.14569/IJACSA.2018.090323
A. A. Alghamdi, “Information Security using Steganographic Method: Genetic Algorithm and Texture Features”, Indian Journal of Science and Technology, Vol. 11, No. 34, pp. 1-6, 2018 DOI: https://doi.org/10.17485/ijst/2018/v11i36/131381
How to Cite
MetricsAbstract Views: 326
PDF Downloads: 208
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.