Skip to main content
Top

2023 | OriginalPaper | Chapter

Fuzzy Logic with Superpixel-Based Block Similarity Measures for Secured Data Hiding Scheme

Authors : Prabhash Kumar Singh, Biswapati Jana, Kakali Datta, Prasenjit Mura, Partha Chowdhuri, Pabitra Pal

Published in: Proceedings of International Conference on Frontiers in Computing and Systems

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With time, humans have realized, the internet is the best alternative for exchange of messages through multimedia documents, especially images. Thus, its imperceptibility and security are big concerns. Recently, Ashraf et al. (Heliyon 6(5):e03771, [1]) evaluated similarity for image steganography using interval type-2 fuzzy logic, but the visual quality (PSNR) is not as good as current demand. To solve the problem, we have proposed a data hiding scheme by combining distinct and vague characteristics of an image through the techniques of superpixel and fuzzy logic respectively. Superpixel and TSK Fuzzy logic model with rule base is used to identify non-uniform regions of the image where secret bits are embedded in coefficients of quantized Discrete Cosine Transform (DCT). This technique can be used for secret data communications. With an average PSNR of 58 dB, the proposed approach provides excellent visual quality. Finally, in order to illustrate the efficacy of our technique, we compared the proposed system to existing methodologies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ashraf Z, Roy ML, Muhuri PK, Lohani QD (2020) Interval type-2 fuzzy logic system based similarity evaluation for image steganography. Heliyon 6(5):e03771 Ashraf Z, Roy ML, Muhuri PK, Lohani QD (2020) Interval type-2 fuzzy logic system based similarity evaluation for image steganography. Heliyon 6(5):e03771
2.
go back to reference Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10(9):1905–1917CrossRef Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10(9):1905–1917CrossRef
3.
go back to reference Roy R, Laha S (2015) Optimization of stego image retaining secret information using genetic algorithm with 8-connected PSNR. Procedia Comput Sci 60:468–477CrossRef Roy R, Laha S (2015) Optimization of stego image retaining secret information using genetic algorithm with 8-connected PSNR. Procedia Comput Sci 60:468–477CrossRef
4.
go back to reference Nipanikar SI, Deepthi VH, Kulkarni N (2018) A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria Eng J 57(4):2343–2356CrossRef Nipanikar SI, Deepthi VH, Kulkarni N (2018) A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria Eng J 57(4):2343–2356CrossRef
5.
go back to reference Sajasi S, Moghadam AME (2013) A high quality image steganography scheme based on fuzzy inference system. In: 2013 13th Iranian conference on fuzzy systems (IFSC). IEEE, pp 1–6 Sajasi S, Moghadam AME (2013) A high quality image steganography scheme based on fuzzy inference system. In: 2013 13th Iranian conference on fuzzy systems (IFSC). IEEE, pp 1–6
6.
go back to reference Chao RM, Wu HC, Lee CC, Chu YP (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 2009:1–9CrossRef Chao RM, Wu HC, Lee CC, Chu YP (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 2009:1–9CrossRef
7.
go back to reference Hussain M, Wahab AWA, Ho AT, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process: Image Commun 50:44–57 Hussain M, Wahab AWA, Ho AT, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process: Image Commun 50:44–57
8.
go back to reference Pal P, Chowdhuri P, Jana B (2018) Weighted matrix based reversible watermarking scheme using color image. Multimedia Tools Appl 77(18):23073–23098CrossRef Pal P, Chowdhuri P, Jana B (2018) Weighted matrix based reversible watermarking scheme using color image. Multimedia Tools Appl 77(18):23073–23098CrossRef
9.
go back to reference Dey A, Pal P, Chowdhuri P, Singh PK, Jana B (2020) Center-Symmetric Local Binary Pattern-Based image authentication using local and global features vector. In: Computational intelligence in pattern recognition. Springer, Singapore, pp 489–501 Dey A, Pal P, Chowdhuri P, Singh PK, Jana B (2020) Center-Symmetric Local Binary Pattern-Based image authentication using local and global features vector. In: Computational intelligence in pattern recognition. Springer, Singapore, pp 489–501
10.
go back to reference Pal P, Jana B, Bhaumik J (2021) A secure reversible color image watermarking scheme based on LBP, Lagrange interpolation polynomial and weighted matrix. Multimedia Tools Appl 1-28 Pal P, Jana B, Bhaumik J (2021) A secure reversible color image watermarking scheme based on LBP, Lagrange interpolation polynomial and weighted matrix. Multimedia Tools Appl 1-28
11.
go back to reference Rabie T, Baziyad M, Kamel I (2018) Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimedia Tools Appl 77(18):23673–23698CrossRef Rabie T, Baziyad M, Kamel I (2018) Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimedia Tools Appl 77(18):23673–23698CrossRef
12.
go back to reference Kadhim IJ, Premaratne P, Vial PJ (2018) Adaptive image steganography based on edge detection over dual-tree complex wavelet transform. In: International conference on intelligent computing. Springer, Cham, pp 544–550 Kadhim IJ, Premaratne P, Vial PJ (2018) Adaptive image steganography based on edge detection over dual-tree complex wavelet transform. In: International conference on intelligent computing. Springer, Cham, pp 544–550
13.
go back to reference Miaou SG, Hsu CM, Tsai YS, Chao HM (2000) A secure data hiding technique with heterogeneous data-combining capability for electronic patient records. In: Proceedings of the 22nd annual international conference of the IEEE engineering in medicine and biology society (Cat. No. 00CH37143), vol 1. IEEE, pp 280–283 Miaou SG, Hsu CM, Tsai YS, Chao HM (2000) A secure data hiding technique with heterogeneous data-combining capability for electronic patient records. In: Proceedings of the 22nd annual international conference of the IEEE engineering in medicine and biology society (Cat. No. 00CH37143), vol 1. IEEE, pp 280–283
14.
go back to reference Sridevi T, Fathima SS (2013) Digital image watermarking using fuzzy logic approach based on DWT and SVD. Int J Comput Appl 74(13) Sridevi T, Fathima SS (2013) Digital image watermarking using fuzzy logic approach based on DWT and SVD. Int J Comput Appl 74(13)
15.
go back to reference Jamali M, Rafiei S, Soroushmehr SM, Karimi N, Shirani S, Najarian K, Samavi S (2017) Adaptive blind image watermarking using fuzzy inference system based on human visual perception. arXiv:1709.06536 Jamali M, Rafiei S, Soroushmehr SM, Karimi N, Shirani S, Najarian K, Samavi S (2017) Adaptive blind image watermarking using fuzzy inference system based on human visual perception. arXiv:​1709.​06536
16.
go back to reference Zadeh LA, Klir GJ, Yuan B (1996) Fuzzy sets, fuzzy logic, and fuzzy systems: selected papers, vol 6. World Scientific Zadeh LA, Klir GJ, Yuan B (1996) Fuzzy sets, fuzzy logic, and fuzzy systems: selected papers, vol 6. World Scientific
17.
go back to reference Ren X, Malik J (2003) Learning a classification model for segmentation. In: Null. IEEE, p 10 Ren X, Malik J (2003) Learning a classification model for segmentation. In: Null. IEEE, p 10
18.
go back to reference Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst video Technol 19(6):906–910CrossRef Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst video Technol 19(6):906–910CrossRef
19.
go back to reference Chang CC, Liu Y, Nguyen TS (2014) A novel turtle shell based scheme for data hiding. In: 2014 Tenth international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 89–93 Chang CC, Liu Y, Nguyen TS (2014) A novel turtle shell based scheme for data hiding. In: 2014 Tenth international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 89–93
20.
go back to reference Parah SA, Sheikh JA, Loan NA, Bhat GM (2017) A robust and computationally efficient digital watermarking technique using inter block pixel differencing. In: Multimedia forensics and security. Springer, Cham, pp 223–252 Parah SA, Sheikh JA, Loan NA, Bhat GM (2017) A robust and computationally efficient digital watermarking technique using inter block pixel differencing. In: Multimedia forensics and security. Springer, Cham, pp 223–252
21.
go back to reference Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process: Image Commun 65:11–25 Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process: Image Commun 65:11–25
Metadata
Title
Fuzzy Logic with Superpixel-Based Block Similarity Measures for Secured Data Hiding Scheme
Authors
Prabhash Kumar Singh
Biswapati Jana
Kakali Datta
Prasenjit Mura
Partha Chowdhuri
Pabitra Pal
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-0105-8_44