Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queen’s University, Kingston, Canada
Mar 29, 2015
Image Steganography Using Fuzzy Domain Transformation
and Pixel Classification
Aleem Khalid AlviRobin Dawes
School of ComputingQueen’s University, Kingston, Canada
2
Contents
Information Hiding MethodsProposed TechniqueFuzzy Image Representation and Domain TransformationGaussian Membership Function (GMF)Fuzzy Inference System (FIS)Methodology Using Image Processing for Fuzzy Pixel ClassificationAnalysis and ResultsConclusion
3
Information Hiding Methods
Attributes for classification of information hiding methods 4 Cover objects4 Secret objects4 Hiding techniques4 Current technologies
Steganography system characteristics4 Robustness4 Security4 Un-detectability4 Imperceptibility (invisibility or perceptual
transparency)4 High capacity
4
Proposed Technique
Proposed technique is the combination of4 Domain transformation4 Data conversion 4 Substitution4 Image properties
It is kind of private-key steganography technique
5
Fuzzy Image Representation and Domain Transformation
An image representation in spatial and fuzzy
M
m
N
nmns II
1 1
M
m
N
nmnxf I
1 1
)(
6
Gaussian Membership Function (GMF)
We use GMF for image transformation from the spatial domain into the fuzzy domain
The specific image transformation function with fuzzifier
Where fh = fuzzifier, Imax = maximum pixel value of an image, Imn = any gray level pixel value of an image I
2
2max
2
)(
h
mn
f
II
mn e
7
Fuzzy Inference System (FIS)
We use Mamdani fuzzy interference system (FIS)4 Using the fuzzy inference process, 4 A given input (a crisp input) maps to an output (a
crisp output) using fuzzy logic methods. 4 The fuzzy inference process requires membership
functions, logical operations, and If-Then rules.
Implementation steps4 Fuzzify inputs4 Apply fuzzy operator4 Apply implication method4 Aggregate all outputs4 Defuzzify
8
Methodology
The step-by-step methodological information for embedding process on the sending end of the steganography System.
9
Using Image Processing for Fuzzy Pixel Classification
Use fuzzy based If-Then rules to apply fuzzy classification
Select the appropriate cover pixel for embedding secret data
Produce less disturbance and distortion in the embedded cover image with respect to Human Visual System (HVS)
Use texture and silhouette (edge) properties of an image
10
Analysis and Results
Using Lena (Cover) and Tomahawk Missile (Secret) Images
Lena.jpg available capacity= 145,313 pixels
Secret data uses 17.62% of the available capacity
HVS testing shows that original and stego images have significant difference and visible as light shades
Statistical testing shows differencesCover histograms looks similar
11
Analysis and Results contd..
Using Baboon (Cover) and Tomahawk Missile (Secret) Images
Baboon.jpg has available capacity = 138,518 pixels
Uses 18.48% available capacityHVS testing shows that no
difference in visibilityStatistical testing shows the
difference between their statistical values
Cover histograms looks similar
12
Conclusion
Proposed steganography algorithm based on fuzzy inference system
Fuzzy inference system uses fuzzy transformation and pixel classification techniques
The fuzzy pixel classification uses the image processing techniques by exploiting texture and silhouette properties
The exploitation of the image processing techniques with fuzzy logic increase imperceptibility in stego image significantly
13
Thank You!