Computerised Information Security Using Texture Based Fuzzy Cryptosystem

Authors

  • A. A. Alghamdi College of Computer Science and IT, Shaqra University, Saudi Arabia
Volume: 8 | Issue: 6 | Pages: 3598-3602 | December 2018 | https://doi.org/10.48084/etasr.2353

Abstract

The main objective of this study is to form a unique and economical steganographic technique for digital pictures employed for secret transmission using texture and fuzzy logic. This technique is employed to embed data in the carrier image and to extract the hidden message within the same carrier image. Initially, fuzzification is completed which transforms the carrier and the secret image into numerous bitplanes. Afterward, the pixel number calculation is completed within the original image. Then feature extraction is completed within the secret image so as to represent the data in it. Finally, pixel merging follows within the sender region by assignment of white and black pixels in the original image and in the secret pictures. Pixel numbers and texture features are extracted and can be used as a key for retrieving the embedded image from the receiver. This modified approach can be applied in various images. Experimental results reveal that this method will hide and retrieve the secret messages in a carrier accurately.

Keywords:

information security, fuzzy logic, texture features, carrier image, secret image, steganography

Downloads

Download data is not yet available.

References

R. C. Gonzalez, R. E. Woods, Digital Image Processing, Pearson, 2008

N. F. Johnson, S. Jajodia, “Steganalysis: The Investigation of Hidden Information”, IEEE Information Technology Conference, Information Environment for the Future, Syracuse, New York, USA, September 3, 1998

I. Avcibas, N. D. Memon, B. Sankur, “Steganalysis based on image quality metrics”, IEEE Fourth Workshop on Multimedia Signal Processing, Cannes, France, October 3-5, 2001

A. S. Abdullah, “Text Hiding Based On Hue Content In HSV Color Space”, International Journal of Emerging Trends & Technology in Computer Science, Vol. 4, No. 2, pp. 170-173, 2015

Z. K. Al-Ani, A. A. Zaidan, B. B. Zaidan, H. O. Alanazi, “Overview: Main Fundamentals for Steganography”, Computer Engineering, Vol. 2, pp. 158-165, 2010

F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information hiding-a survey”, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 87, No. 7, pp. 1062-1078, 1999 DOI: https://doi.org/10.1109/5.771065

S. Craver, B. L. Yeo, M. Yeung, “Technical trials and legal tribulations”, Communications of the A.C.M., Vol. 41, No. 7, pp. 44-54, 1998 DOI: https://doi.org/10.1145/278476.278486

R. J. Anderson, F. A. P. Petitcolas, “On the limits of steganography”, IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 474-481, 1998 DOI: https://doi.org/10.1109/49.668971

A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods”, Signal Processing, Vol. 90, pp. 727-752, 2010 DOI: https://doi.org/10.1016/j.sigpro.2009.08.010

N. F. Johnson, S. Jajodia, “Exploring steganography: seeing the unseen”, Computer, Vol. 31, No. 2, pp. 26-34, 1998 DOI: https://doi.org/10.1109/MC.1998.4655281

W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, “Applications for data hiding”, IBM Systems Journal, Vol. 39, No. 3-4, pp. 547-568, 2000 DOI: https://doi.org/10.1147/sj.393.0547

F. A. P. Petitcolas, “Introduction to information hiding”, in: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Inc., Norwood, 2000

S. G. Miaou, C. M. Hsu, Y. S. Tsai, H. M. Chao, “A secure data hiding technique with heterogeneous data-combining capability for electronic patient records”, 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, USA, July 23-28, 2000

Fujitsu Ltd., Tackling New Challenges, Annual Report 2007, Fujitsu Ltd., 2007

N. Provos, P. Honeyman, “Hide and seek: an introduction to steganography”, IEEE Security and Privacy, Vol. 99, No. 3, pp. 32-44, 2003 DOI: https://doi.org/10.1109/MSECP.2003.1203220

F. Khursheed, A. H. Mir, “Fuzzy logic-based data hiding”, Proceeding of Cyber Security, Cyber Crime, and Cyber Forensics, Department of Electronics and Communication, National Institute of Technology, Srinagar, India, 2009

A. H. Mir, “Fuzzy entropy based interactive enhancement of radiographic images”, Journal of Medical Engineering and Technology, Vol. 31, No. 3, pp. 220-231, 2007 DOI: https://doi.org/10.1080/03091900600824374

V. K. Munirajan, E. Cole, S. Ring, “Transform domain steganography detection using fuzzy inference systems”, IEEE Sixth International Symposium on Multimedia Software Engineering, Miami, USA, December 13-15, 2004

A. A. Alghamdi, “Computerized Steganographic Technique using Fuzzy Logic”, International Journal of Advanced Computer Science and Applications, Vol. 9, No. 3, pp. 155-159, 2018 DOI: https://doi.org/10.14569/IJACSA.2018.090323

A. A. Alghamdi, “Information Security using Steganographic Method: Genetic Algorithm and Texture Features”, Indian Journal of Science and Technology, Vol. 11, No. 34, pp. 1-6, 2018 DOI: https://doi.org/10.17485/ijst/2018/v11i36/131381

Downloads

How to Cite

[1]
A. A. Alghamdi, “Computerised Information Security Using Texture Based Fuzzy Cryptosystem”, Eng. Technol. Appl. Sci. Res., vol. 8, no. 6, pp. 3598–3602, Dec. 2018.

Metrics

Abstract Views: 426
PDF Downloads: 290

Metrics Information