Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility

被引:16
作者
Vanmathi, C. [1 ]
Prabu, S. [2 ]
机构
[1] VIT Univ, Sch Informat Technol & Engn, Informat Technol, Vellore, Tamil Nadu, India
[2] VIT Univ, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
关键词
Stego image; Histogram; Cover image; Steganography; PSNR; LSB; ENCRYPTION ALGORITHM; EDGE-DETECTION; OPERATOR; SYSTEMS;
D O I
10.1007/s40815-017-0420-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security is one of the most important processes and methodologies which have to be considered when any information is communicated secretly between two parties. Cryptography and steganography are the two important practices used for this purpose. Cryptography changes the secret message into unintelligible text; however, it reveals the existence of the secret message. Steganography technique on the other hand hides the secret message such that no one can notice the presence of it. Current paper presents an image steganographic technique exploiting fuzzy logic edge detection and chaotic method. The fuzzy logic approach for image processing allows defining the degree to which a pixel belongs to an edge. Least significant bit substitution approach is used for data hiding in the carrier image. The combination of chaotic theory with steganography is emerging and gets attracted by researchers. Chaotic method is applied to the original message to generate the random sequence of binary equivalent secret message which prevents the secret message from attackers. The proposed method hides large amount of data with good quality of stage image of the human visual system and guarantees the confidentiality in the communication. The experimental results shows better peak signal-to-noise ratio, image quality index and payload for evaluating the stego image compared to the existing methods.
引用
收藏
页码:460 / 473
页数:14
相关论文
共 28 条
[1]  
Aborisade D.O., 2011, INT J ADV SCI TECHNO, V29, P75
[2]   Improving BTC image compression using a fuzzy complement edge operator [J].
Amarunnishad, T. M. ;
Govindan, V. K. ;
Mathew, Abraham T. .
SIGNAL PROCESSING, 2008, 88 (12) :2989-2997
[3]  
Bandyopadhyay D., 2014, Int J Secur Priv Trust Manage (IJSPTM), V3, P11, DOI [10.5121/ijsptm.2014.3102, DOI 10.5121/IJSPTM.2014.3102]
[4]  
Bassil Y., 2012, ARXIV12126259
[6]   High payload steganography mechanism using hybrid edge detector [J].
Chen, Wen-Jan ;
Chang, Chin-Chen ;
Le, T. Hoang Ngan .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (04) :3292-3301
[7]  
Cox I, 2007, Digital watermarking and steganography
[8]   Chaos and cryptography [J].
Dachselt, F ;
Schwarz, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (12) :1498-1509
[9]  
El-Khamy S., 2000, P RAD SCI C
[10]   Chaos-based image encryption algorithm [J].
Guan, ZH ;
Huang, FJ ;
Guan, WJ .
PHYSICS LETTERS A, 2005, 346 (1-3) :153-157