Computerized Steganographic Technique using Fuzzy Logic
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 3
Abstract
Steganography is the method of providing Computer security in which hiding the required information is done by inserting messages within other messages, which is a string of characters containing the useful information, in a carrier image. Using this technique, the required information from the secret image is embedded into individual rows as well as columns present in the pixels of carrier image. In this paper, a novel fuzzy logic based technique is proposed to hide the secret message in individual rows and in individual columns of pixels of the carrier image and to extract the hidden message in the same carrier image. The fuzzification process transforms the image in to various bitplanes. Pixel number and Correlation Value is computed in the original image for hiding the secret information in to the original image. The pixel number and Correlation value is also used as the key for retrieving the embedded image from the receiver side. Pixel merging is done in the sender side by assigning a steganographic value of white and black pixels in original image based on the fuzzy rules by comparing the pixels present in the original and secret images. The information which is hided can be retrieved by using the same fuzzy rules. Experimental results show that the proposed method can hide and retrieve the secret and important messages in an image more effectively and accurately.
Authors and Affiliations
Abdulrahman Abdullah Alghamdi
A particle swarm optimization algorithm for the continuous absolute p-center location problem with Euclidean distance
The p-center location problem is concerned with determining the location of p centers in a plane/space to serve n demand points having fixed locations. The continuous absolute p-center location problem attempts to locate...
Evaluation of a Behind-the-Ear ECG Device for Smartphone Based Integrated Multiple Smart Sensor System in Health Applications
In this paper, we present a wireless Multiple Smart Sensor System (MSSS) in conjunction with a smartphone to enable an unobtrusive monitoring of electrocardiogram (ear-lead ECG) integrated with multiple sensor system whi...
A Novel Energy Efficient Mobility Aware MAC Protocol for Wireless Sensor Networks
Dealing with mobility at the link layer in an efficient and effective way is a formidable challenge in Wireless Sensor Networks due to recent boom in mobile applications and complex network scenarios. Most of the current...
Analyzing Opinions and Argumentation in News Editorials and Op-Eds
Analyzing opinions and arguments in news editorials and op-eds is an interesting and a challenging task. The challenges lie in multiple levels – the text has to be analyzed in the discourse level (paragraphs and ab...
Cyber Romance Scam Victimization Analysis using Routine Activity Theory Versus Apriori Algorithm
The advance new digital era nowadays has led to the increasing cases of cyber romance scam in Malaysia. These technologies have offered both opportunities and challenge, depending on the purpose of the user. To face this...