image steganography using fuzzy domain transformation and pixel classification aleem khalid alvi...
TRANSCRIPT
![Page 1: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/1.jpg)
Image Steganography Using Fuzzy Domain Transformation
and Pixel Classification
Aleem Khalid AlviRobin Dawes
School of ComputingQueen’s University, Kingston, Canada
![Page 2: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/2.jpg)
2
Contents
Information Hiding MethodsProposed TechniqueFuzzy Image Representation and Domain TransformationGaussian Membership Function (GMF)Fuzzy Inference System (FIS)Methodology Using Image Processing for Fuzzy Pixel ClassificationAnalysis and ResultsConclusion
![Page 3: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/3.jpg)
3
Information Hiding Methods
Attributes for classification of information hiding methods 4 Cover objects4 Secret objects4 Hiding techniques4 Current technologies
Steganography system characteristics4 Robustness4 Security4 Un-detectability4 Imperceptibility (invisibility or perceptual
transparency)4 High capacity
![Page 4: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/4.jpg)
4
Proposed Technique
Proposed technique is the combination of4 Domain transformation4 Data conversion 4 Substitution4 Image properties
It is kind of private-key steganography technique
![Page 5: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/5.jpg)
5
Fuzzy Image Representation and Domain Transformation
An image representation in spatial and fuzzy
M
m
N
nmns II
1 1
M
m
N
nmnxf I
1 1
)(
![Page 6: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/6.jpg)
6
Gaussian Membership Function (GMF)
We use GMF for image transformation from the spatial domain into the fuzzy domain
The specific image transformation function with fuzzifier
Where fh = fuzzifier, Imax = maximum pixel value of an image, Imn = any gray level pixel value of an image I
2
2max
2
)(
h
mn
f
II
mn e
![Page 7: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/7.jpg)
7
Fuzzy Inference System (FIS)
We use Mamdani fuzzy interference system (FIS)4 Using the fuzzy inference process, 4 A given input (a crisp input) maps to an output (a
crisp output) using fuzzy logic methods. 4 The fuzzy inference process requires membership
functions, logical operations, and If-Then rules.
Implementation steps4 Fuzzify inputs4 Apply fuzzy operator4 Apply implication method4 Aggregate all outputs4 Defuzzify
![Page 8: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/8.jpg)
8
Methodology
The step-by-step methodological information for embedding process on the sending end of the steganography System.
![Page 9: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/9.jpg)
9
Using Image Processing for Fuzzy Pixel Classification
Use fuzzy based If-Then rules to apply fuzzy classification
Select the appropriate cover pixel for embedding secret data
Produce less disturbance and distortion in the embedded cover image with respect to Human Visual System (HVS)
Use texture and silhouette (edge) properties of an image
![Page 10: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/10.jpg)
10
Analysis and Results
Using Lena (Cover) and Tomahawk Missile (Secret) Images
Lena.jpg available capacity= 145,313 pixels
Secret data uses 17.62% of the available capacity
HVS testing shows that original and stego images have significant difference and visible as light shades
Statistical testing shows differencesCover histograms looks similar
![Page 11: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/11.jpg)
11
Analysis and Results contd..
Using Baboon (Cover) and Tomahawk Missile (Secret) Images
Baboon.jpg has available capacity = 138,518 pixels
Uses 18.48% available capacityHVS testing shows that no
difference in visibilityStatistical testing shows the
difference between their statistical values
Cover histograms looks similar
![Page 12: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/12.jpg)
12
Conclusion
Proposed steganography algorithm based on fuzzy inference system
Fuzzy inference system uses fuzzy transformation and pixel classification techniques
The fuzzy pixel classification uses the image processing techniques by exploiting texture and silhouette properties
The exploitation of the image processing techniques with fuzzy logic increase imperceptibility in stego image significantly
![Page 13: Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queens University, Kingston,](https://reader035.vdocuments.site/reader035/viewer/2022062417/5517e3d7550346d5568b4624/html5/thumbnails/13.jpg)
13
Thank You!