Top Banner
Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queen’s University, Kingston, Canada
13

Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

Mar 29, 2015

Download

Documents

Ashlyn Brim
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

Image Steganography Using Fuzzy Domain Transformation

and Pixel Classification

Aleem Khalid AlviRobin Dawes

School of ComputingQueen’s University, Kingston, Canada

Page 2: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

2

Contents

Information Hiding MethodsProposed TechniqueFuzzy Image Representation and Domain TransformationGaussian Membership Function (GMF)Fuzzy Inference System (FIS)Methodology Using Image Processing for Fuzzy Pixel ClassificationAnalysis and ResultsConclusion

Page 3: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

3

Information Hiding Methods

Attributes for classification of information hiding methods 4 Cover objects4 Secret objects4 Hiding techniques4 Current technologies

Steganography system characteristics4 Robustness4 Security4 Un-detectability4 Imperceptibility (invisibility or perceptual

transparency)4 High capacity

Page 4: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

4

Proposed Technique

Proposed technique is the combination of4 Domain transformation4 Data conversion 4 Substitution4 Image properties

It is kind of private-key steganography technique

Page 5: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

5

Fuzzy Image Representation and Domain Transformation

An image representation in spatial and fuzzy

M

m

N

nmns II

1 1

M

m

N

nmnxf I

1 1

)(

Page 6: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

6

Gaussian Membership Function (GMF)

We use GMF for image transformation from the spatial domain into the fuzzy domain

The specific image transformation function with fuzzifier

Where fh = fuzzifier, Imax = maximum pixel value of an image, Imn = any gray level pixel value of an image I

2

2max

2

)(

h

mn

f

II

mn e

Page 7: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

7

Fuzzy Inference System (FIS)

We use Mamdani fuzzy interference system (FIS)4 Using the fuzzy inference process, 4 A given input (a crisp input) maps to an output (a

crisp output) using fuzzy logic methods. 4 The fuzzy inference process requires membership

functions, logical operations, and If-Then rules.

Implementation steps4 Fuzzify inputs4 Apply fuzzy operator4 Apply implication method4 Aggregate all outputs4 Defuzzify

Page 8: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

8

Methodology

The step-by-step methodological information for embedding process on the sending end of the steganography System.

Page 9: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

9

Using Image Processing for Fuzzy Pixel Classification

Use fuzzy based If-Then rules to apply fuzzy classification

Select the appropriate cover pixel for embedding secret data

Produce less disturbance and distortion in the embedded cover image with respect to Human Visual System (HVS)

Use texture and silhouette (edge) properties of an image

Page 10: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

10

Analysis and Results

Using Lena (Cover) and Tomahawk Missile (Secret) Images

Lena.jpg available capacity= 145,313 pixels

Secret data uses 17.62% of the available capacity

HVS testing shows that original and stego images have significant difference and visible as light shades

Statistical testing shows differencesCover histograms looks similar

Page 11: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

11

Analysis and Results contd..

Using Baboon (Cover) and Tomahawk Missile (Secret) Images

Baboon.jpg has available capacity = 138,518 pixels

Uses 18.48% available capacityHVS testing shows that no

difference in visibilityStatistical testing shows the

difference between their statistical values

Cover histograms looks similar

Page 12: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

12

Conclusion

Proposed steganography algorithm based on fuzzy inference system

Fuzzy inference system uses fuzzy transformation and pixel classification techniques

The fuzzy pixel classification uses the image processing techniques by exploiting texture and silhouette properties

The exploitation of the image processing techniques with fuzzy logic increase imperceptibility in stego image significantly

Page 13: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,

13

Thank You!