Queen’s University, Kingston, Canada

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Extension Principle Adriano Cruz ©2002 NCE e IM/UFRJ
0 - 0.
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Fuzzy Inference Systems
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
An Introduction to Type-2 Fuzzy Sets and Systems
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Rule-Based Fuzzy Model. In rule-based fuzzy systems, the relationships between variables are represented by means of fuzzy if–then rules of the following.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Digital Image Processing In The Name Of God Digital Image Processing Lecture8: Image Segmentation M. Ghelich Oghli By: M. Ghelich Oghli
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Fuzzy Inference Systems. Fuzzy inference (reasoning) is the actual process of mapping from a given input to an output using fuzzy logic. The process involves.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Detection of Image Alterations Using Semi-fragile Watermarks
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Reversible Data Hiding for Point-Sampled Geometry JOURNAL OF INFORMATION SCIENCE AND ENGINEERING Vol. 23, pp , 2007 PENG-CHENG WANG AND CHUNG-MING.
Using Multiple Diacritics in Arabic Scripts for Steganography By Yousef Salem Elarian Aleem Khalid Alvi.
Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/11/16 1 Steganalysis of LSB matching based on statistical modeling of pixel difference distributions.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Fuzzy Technique for Color Quality Transformation.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
VIDYA PRATISHTHAN’S COLLEGE OF ENGINEERING, BARAMATI.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
(k, n)-Image Reversible Data Hiding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Information Hiding Technology: Current Research and Future Trend
Visible Watermarking of An Image Using DCT Technique
DONE BY S.MURALIRAJAN M.NIRMAL
Image Watermarking Chu, Hsi-Cheng.
منطق فازی.
Pei Qi ECE at UW-Madison
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
A Data Hiding Scheme Based Upon Block Truncation Coding
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Fuzzy Logic Colter McClure.
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Hiding and Its Applications
High Capacity Data Hiding for Grayscale Images
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Data hiding method using image interpolation
Fuzzy Inference Systems
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Recent Developments in Information Hiding
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Queen’s University, Kingston, Canada Image Steganography Using Fuzzy Domain Transformation and Pixel Classification Aleem Khalid Alvi Robin Dawes School of Computing Queen’s University, Kingston, Canada

Contents Information Hiding Methods Proposed Technique Fuzzy Image Representation and Domain Transformation Gaussian Membership Function (GMF) Fuzzy Inference System (FIS) Methodology Using Image Processing for Fuzzy Pixel Classification Analysis and Results Conclusion

Information Hiding Methods Attributes for classification of information hiding methods Cover objects Secret objects Hiding techniques Current technologies Steganography system characteristics Robustness Security Un-detectability Imperceptibility (invisibility or perceptual transparency) High capacity

Proposed Technique Proposed technique is the combination of Domain transformation Data conversion Substitution Image properties It is kind of private-key steganography technique

Fuzzy Image Representation and Domain Transformation An image representation in spatial and fuzzy

Gaussian Membership Function (GMF) We use GMF for image transformation from the spatial domain into the fuzzy domain The specific image transformation function with fuzzifier Where fh = fuzzifier, Imax = maximum pixel value of an image, Imn = any gray level pixel value of an image I

Fuzzy Inference System (FIS) We use Mamdani fuzzy interference system (FIS) Using the fuzzy inference process, A given input (a crisp input) maps to an output (a crisp output) using fuzzy logic methods. The fuzzy inference process requires membership functions, logical operations, and If-Then rules. Implementation steps Fuzzify inputs Apply fuzzy operator Apply implication method Aggregate all outputs Defuzzify

Methodology The step-by-step methodological information for embedding process on the sending end of the steganography System.

Using Image Processing for Fuzzy Pixel Classification Use fuzzy based If-Then rules to apply fuzzy classification Select the appropriate cover pixel for embedding secret data Produce less disturbance and distortion in the embedded cover image with respect to Human Visual System (HVS) Use texture and silhouette (edge) properties of an image

Analysis and Results Using Lena (Cover) and Tomahawk Missile (Secret) Images Lena.jpg available capacity = 145,313 pixels Secret data uses 17.62% of the available capacity HVS testing shows that original and stego images have significant difference and visible as light shades Statistical testing shows differences Cover histograms looks similar

Analysis and Results contd.. Using Baboon (Cover) and Tomahawk Missile (Secret) Images Baboon.jpg has available capacity = 138,518 pixels Uses 18.48% available capacity HVS testing shows that no difference in visibility Statistical testing shows the difference between their statistical values Cover histograms looks similar

Conclusion Proposed steganography algorithm based on fuzzy inference system Fuzzy inference system uses fuzzy transformation and pixel classification techniques The fuzzy pixel classification uses the image processing techniques by exploiting texture and silhouette properties The exploitation of the image processing techniques with fuzzy logic increase imperceptibility in stego image significantly

Thank You!