Computerised Information Security Using Texture Based Fuzzy Cryptosystem

A. A. Alghamdi

Abstract


The main objective of this study is to form a unique and economical steganographic technique for digital pictures employed for secret transmission using texture and fuzzy logic. This technique is employed to embed data in the carrier image and to extract the hidden message within the same carrier image. Initially, fuzzification is completed which transforms the carrier and the secret image into numerous bitplanes. Afterward, the pixel number calculation is completed within the original image. Then feature extraction is completed within the secret image so as to represent the data in it. Finally, pixel merging follows within the sender region by assignment of white and black pixels in the original image and in the secret pictures. Pixel numbers and texture features are extracted and can be used as a key for retrieving the embedded image from the receiver. This modified approach can be applied in various images. Experimental results reveal that this method will hide and retrieve the secret messages in a carrier accurately.


Keywords


information security; fuzzy logic; texture features; carrier image; secret image; steganography

Full Text:

PDF

References


R. C. Gonzalez, R. E. Woods, Digital Image Processing, Pearson, 2008

N. F. Johnson, S. Jajodia, “Steganalysis: The Investigation of Hidden Information”, IEEE Information Technology Conference, Information Environment for the Future, Syracuse, New York, USA, September 3, 1998

I. Avcibas, N. D. Memon, B. Sankur, “Steganalysis based on image quality metrics”, IEEE Fourth Workshop on Multimedia Signal Processing, Cannes, France, October 3-5, 2001

A. S. Abdullah, “Text Hiding Based On Hue Content In HSV Color Space”, International Journal of Emerging Trends & Technology in Computer Science, Vol. 4, No. 2, pp. 170-173, 2015

Z. K. Al-Ani, A. A. Zaidan, B. B. Zaidan, H. O. Alanazi, “Overview: Main Fundamentals for Steganography”, Computer Engineering, Vol. 2, pp. 158-165, 2010

F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information hiding-a survey”, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 87, No. 7, pp. 1062-1078, 1999

S. Craver, B. L. Yeo, M. Yeung, “Technical trials and legal tribulations”, Communications of the A.C.M., Vol. 41, No. 7, pp. 44-54, 1998

R. J. Anderson, F. A. P. Petitcolas, “On the limits of steganography”, IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 474-481, 1998

A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods”, Signal Processing, Vol. 90, pp. 727-752, 2010

N. F. Johnson, S. Jajodia, “Exploring steganography: seeing the unseen”, Computer, Vol. 31, No. 2, pp. 26-34, 1998

W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, “Applications for data hiding”, IBM Systems Journal, Vol. 39, No. 3-4, pp. 547-568, 2000

F. A. P. Petitcolas, “Introduction to information hiding”, in: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Inc., Norwood, 2000

S. G. Miaou, C. M. Hsu, Y. S. Tsai, H. M. Chao, “A secure data hiding technique with heterogeneous data-combining capability for electronic patient records”, 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, USA, July 23-28, 2000

Fujitsu Ltd., Tackling New Challenges, Annual Report 2007, Fujitsu Ltd., 2007

N. Provos, P. Honeyman, “Hide and seek: an introduction to steganography”, IEEE Security and Privacy, Vol. 99, No. 3, pp. 32-44, 2003

F. Khursheed, A. H. Mir, “Fuzzy logic-based data hiding”, Proceeding of Cyber Security, Cyber Crime, and Cyber Forensics, Department of Electronics and Communication, National Institute of Technology, Srinagar, India, 2009

A. H. Mir, “Fuzzy entropy based interactive enhancement of radiographic images”, Journal of Medical Engineering and Technology, Vol. 31, No. 3, pp. 220-231, 2007

V. K. Munirajan, E. Cole, S. Ring, “Transform domain steganography detection using fuzzy inference systems”, IEEE Sixth International Symposium on Multimedia Software Engineering, Miami, USA, December 13-15, 2004

A. A. Alghamdi, “Computerized Steganographic Technique using Fuzzy Logic”, International Journal of Advanced Computer Science and Applications, Vol. 9, No. 3, pp. 155-159, 2018

A. A. Alghamdi, “Information Security using Steganographic Method: Genetic Algorithm and Texture Features”, Indian Journal of Science and Technology, Vol. 11, No. 34, pp. 1-6, 2018




eISSN: 1792-8036     pISSN: 2241-4487