Open Access Open Access  Restricted Access Subscription Access

A Novel Approach for Information Security based on Feature and Fuzzy Inference System


Affiliations
1 Department of Computer Science, DCC Shaqra University, Saudi Arabia
 

Objectives: In this study, features of the pixel and Fuzzy Inference System (FIS) are combined to hide the secret image in the pixels of an image. Method/Statistical Analysis: Features such as texture and edge sensitivity were calculated and combined with the FIS for hiding the information in a carrier image. Findings: Results reveal that this system hides the secret information more effectively. The results of the experiment reveal an accurate information hiding rate of PSNR 53.6592. Application/Improvements: Future enhancements in this work are to propose an efficient algorithm to hide images of group in a single image.
User

  • Ahvanooey MT, Li Q, Shim HJ, Huang Y. A comparative analysis of information hiding techniques for copyright protection of text documents. Journal of Security and Communication Networks. 2018; 5325040:1–22.
  • Provos N, Honeyman P. Hide and seek: An introduction to steganography. IEEE Security and Privacy. 2003; 1(3):32– 44. https://doi.org/10.1109/MSECP.2003.1203220
  • Mazurczyk W, Wendzel S. Information hiding: Challenges for forensic experts. Communications of the ACM. 2018; 61(1):86–94. https://doi.org/10.1145/3158416
  • Dumitrescu S, Wu X, Wang Z. Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing. 2003; 51(7):1995–2007.https://doi.org/10.1109/TSP.2003.812753
  • Chang CC, Lin MH, Hu YC. A fast and secure image hiding scheme based on LSB substitution. International Journal of Pattern Recognition and Artificial Intelligence. 2002; 16(4):399–418. https://doi.org/10.1142/S0218001402001770
  • Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia. 2001; 8(4):22–8. https://doi.org/10.1109/93.959097
  • Chen WJ, Chang CC, Le THN. High payload steganography mechanism using hybrid edge detector. Expert Systems with Applications. 2010; 37(4):3292–301.https://doi.org/10.1016/j.eswa.2009.09.050
  • Wu DC, Tsai WH. A steganographic method for images by pixel-value differencing. Pattern Recognition Letters. 2003; 24(910):1613–26. https://doi.org/10.1016/S0167-8655(02)00402-6
  • Liao X, Wen QY, Zhang J. A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation. 2011; 22(1):1–8. https://doi.org/10.1016/j.jvcir.2010.08.007
  • Ker AD. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters. 2005; 12(6):441–4. https:// doi.org/10.1109/LSP.2005.847889
  • Cavallaro F. A Takagi-Sugeno Fuzzy Inference System for developing a sustainability index of biomass. Sustainability. 2015; 7(9):12359–71. https://doi.org/10.3390/su70912359
  • Harralick R, Shanmugam K, Dinstein H. Textural features for image classification. IEEE Transactions on Systems, Man and Cybernetics. 1973; 3(6):610–21. https://doi.org/10.1109/TSMC.1973.4309314

Abstract Views: 236

PDF Views: 0




  • A Novel Approach for Information Security based on Feature and Fuzzy Inference System

Abstract Views: 236  |  PDF Views: 0

Authors

Abdalhakeem T. E. Issa
Department of Computer Science, DCC Shaqra University, Saudi Arabia

Abstract


Objectives: In this study, features of the pixel and Fuzzy Inference System (FIS) are combined to hide the secret image in the pixels of an image. Method/Statistical Analysis: Features such as texture and edge sensitivity were calculated and combined with the FIS for hiding the information in a carrier image. Findings: Results reveal that this system hides the secret information more effectively. The results of the experiment reveal an accurate information hiding rate of PSNR 53.6592. Application/Improvements: Future enhancements in this work are to propose an efficient algorithm to hide images of group in a single image.

References





DOI: https://doi.org/10.17485/ijst%2F2018%2Fv11i45%2F137413