Design and Implementation of Novel Image Steganography Algorithm (S (1) - 1
Design and Implementation of Novel Image Steganography Algorithm (S (1) - 1
Presented by
Kusum Lata
Department of Mathematics
Maharshi Dayanand University
Rohtak, Haryana
Supervisor Co-Supervisor
Dr Meenakshi Dr Savita Rathee
Assistant Professor Associate Professor
Contents
Introduction
Steganography
Image Steganography
Frequency Domain Image Steganography
Integration of Image Steganography with Fuzzy Set Theory
Literature Review
Future Scope of Various Research Works
Applications of Steganography
Motivation of the Research Study
Objectives of the Reseach Study
Research Plan
References
Introduction
Cryptography
Steganography Watermarking
Steganography
Steganography is
derived from Greek words ‘Stegano’ means
‘Covered/Hidden’ and ‘Graphia’ means ‘Writing’ [3],
an art and science of hiding a secret small multimedia data
inside another but much larger multimedia data such as image,
text, audio or video,
not only the art of hiding data but also hiding the fact of
transmission,
an ancient tool, such methods made use of wax writing tablets,
invisible ink, mask, silver balls and hidden pictures etc. [4],
On the basis of digital media, steganography can be
categorized as shown in Figure 2.
Figure 2: Digital Media to Implement Steganography
Image Steganography
Image steganography is
the most favorable hiding mode for secret
messages due to its high hiding capacity and
good distortion tolerance,
a two-step process,
is classified as shown in Figure 3 [5] .
Figure 3: Classification of Image Steganography
Frequency Domain Image Steganography
Frequency domain techniques are more effective due to their
incorporating hidden information in the transformed coefficients
of cover image instead of directly in the pixel values.
Why frequency domain image steganography?
In the spatial domain secret information is embedded in the
cover image's pixel values directly. These systems are
straightforward and simple to implement. It is vulnerable to
image manipulations, including cropping, rotation, and scaling
[6]. Frequency domain techniques become more robust and
imperceptible than spatial domain methods as secret data is
embedded in coefficients instead in pixel values, resulting in the
least detectable stego image.
Framework of frequency domain image
steganography techniques as shown in Figure 4.
Figure 4: Framework of frequency domain image steganography techniques
Integration of steganographic methods with
fuzzy set theory
Gradual
Boundaries
Membership Uncertainty
Function Management
Many parts of an image are uncertain. To overcome the
challenges in many image processing applications, such as
object recognition and image analysis, we must rely on our
knowledge and skills.
Fuzzy logic and fuzzy set theory provide us with strong
instruments to be processed and representing human
knowledge in the form of fuzzy if-then rules.
Image steganography makes extensive use of fuzzy inference
system which follows the given steps:
Fuzzification
Rule Base
Inference
Defuzzification
Fuzzy Set Applications in Image Steganography
Merging the existing transform methods with other transforms, such as the
Discrete Wavelet Transform (DWT) or Discrete Fourier Transform (DFT).
To increase the hybrid DWT-DCT encryption technique's usefulness in
multimedia security.
Adaptation to various image formats, i.e., examining how the suggested
strategy works with multiple image formats (such as PNG and BMP) could
increase its applicability and evaluate how well it performs with various
compression rates and features.
Security can be increased by integrating the steganography scheme with
advanced cryptographic techniques.
There is a great chance to use the suggested technique in binary images to
color images.
One can extend the proposed methods to increase payload with less effect
on stego image quality.
Depending on the content of the cover image, research could focus on
dynamically modifying the embedding strength parameters.
Future research could concentrate on strengthening the steganographic
scheme's tolerance to different types of attacks, including filtering,
compression.
Based on reviewing the existing techniques,
following Research Gaps in the Study are analysed.
Copyright Control
Covert Communication
Smart ID’s
Printers
Health Applications
Clinical Trials
Data Integrity and Authentication
Access Control
Motivation of the Research Study
To design and test new algorithms for detection of interested areas of
images using fuzzy logics in MATLAB or any other software.
To implement, test and analyse the proposed fuzzy logic based
algorithms for detection of required areas of images.
To design and develop new algorithms using fuzzy logic based pixel
detection for embedding and extracting message in/ from images using
MATLAB or any other software.
To implement, test and analyse the proposed algorithms for
embedding and extracting message in/ from images.
Research Publications.
Thesis Writing.
References
1. Hussain, M., Wahab, A.W.A., Idris, Y.I.B., Hoc, A.T.S., and Jung, K.H. (2018).
Image steganography in spatial domain: A survey. Signal Processing: Image
Communication, Elsevier, 65, 46-66. DOI: 10.1016/j.image.2018.03.012
2. Chuck Easttom, Modern Cryptography Applied Mathematics for Encryption
and Information Security, Second Edition . DOI: 10.1007/978-3-031-12304-7
3. Kombrink, M.H., Geradts, Z. J. M. H., and Worring, M. (2024). Image
Steganography Approaches and Their Detection Strategies: A Survey. ACM
Comput. Surv., 57(2), 33:1-33:40. DOI: 10.1145/3694965
4. NDM: Introduction to Steganography. https://youtu.be/GPdIY6ObKJU?
si=TYxL64IKPulLq9-t
5. Kadhima, I.J., Premaratnea, P., Vial, P.J., and Hallorana, B.(2019).
Comprehensive Survey of Image Steganography: Techniques,Evaluations, and
Trends in Future Research. Neurocomputing, 335, 299–326. DOI:
10.1016/j.neucom.2018.06.075
6. Subhedar, M.S., and Mankar, V.H. (2014). High Capacity Image
Steganography based on Discrete Wavelet Transform and Singular Value
Decomposition. ICTCS’14. http: //dx.doi.org/10.1145/2677855.2677918
7. Zadeh, L.A. (1965). Fuzzy Sets. Information and Control, 8, 338-353.
8. Zadeh, L.A. (1973). Outline of a New Approach to the Analysis of
Complex Systems and Decision Processes. IEEE Transactions on
Systems, Man, and Cybernetics, 3(1), 24-44.
9. Zadeh, L.A. (2008). Is there a Need for Fuzzy Logic?. Information
Sciences, 178, 2751–2779. DOI:10.1016/j.ins.2008.02.012
10. Gonzalez, R.C., Woods, R.E. (2016). Digital Image Processing (3).
Pearson Education India, ISBN 978-9332570320 DOI:
10.4236/ijg.2014.55050.
11. Vanmathi, C., Prabu, S. (2017). Image Steganography Using Fuzzy Logic
and Chaotic for Large Payload and High Imperceptibility. International
Journal of Fuzzy Systems. DOI: 10.1007/%40815-017-0420-0
12. El-Khamy, S.E., Korany, N.O., Mohamed, A.G. (2020). A new Fuzzy-
DNA Image Encryption and Steganography Technique. IEEE Access,
8(99).DOI: 10.1109/ACCESS.2020.3015687
13. Poornima, R., and Iswarya, R. J. (2013). An Overview Of Digital Image
Steganography. International Journal of Computer Science and
Engineering Survey, 4(1), 23-31. DOI: 10.5121/ijcses.2013.4102
14. Gunjal, M., and Jha, J. (2014). Image Steganography Using Discrete
Cosine Transform (DCT) and Blowfish Algorithm. International Journal
of Computer Trends and Technology, 11(4), 144-150.
15. Nagpal, K. D., and Dabhade, D. S. (2015). A Survey on Image
Steganography and its Techniques in Spatial and Frequency Domain.
International Journal on Recent and Innovation Trends in Computing
and Communication, 3(2), 776 – 779.
16. Shafi, I., Noman, M., Gohar, M., Ahmad, A., Khan, M., Din, S.,
Ahmad, S. H., and Ahmad J. (2017). An adaptive hybrid fuzzy-wavelet
approach for image steganography using bit reduction and pixel
adjustment. Soft Computing, 22, 1555–1567. DOI:10.1007/s00500-017-
2944-5
17. Joshi, S. V., Bokil, A. A., Jain, N. A., and Koshti, D. (2012). Image
Steganography Combination of Spatial and Frequency Domain.
International Journal of Computer Applications, 53(5), 25-29.
18. Munirajan, V.K., Cole, E, and Ring, S. (2005). Transform Domain Steganography
Detection Using Fuzzy Inference Systems. IEEE Sixth International Symposium on
Multimedia Software Engineering. DOI: 10.1109/MMSE.2004.83
19. Wanga, W., Liua, X., Lub, M., Liuc, J., and Jiang, P. (2022). Intelligent Fuzzy Approach
Based High-Performance Steganography in Wavelet Domain. Automatic Control and
Computer Sciences, 56(3), 189-197.
20. Subramanian, N., Elharrouss, O., Maadeed, S. A., and Bouridane, A. (2021). Image
Steganography: A Review Of The Recent Advances. IEEE Access, 9, 23409-23423. DOI:
10.1109/ACCESS.2021.3053998
21. Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., and Dutta, P. (2014). A Novel Secure
Image Steganography Method Based on Chaos Theory in Spatial Domain. International
Journal of Security, Privacy and Trust Management, 3(1), 11-22. DOI:
10.5121/ijsptm.2014.3102
22. Setiadi, D. R. I. M. (2020). PSNR vs SSIM: imperceptibility quality assessment for image
steganography. Multimedia Tools and Applications, 80, 8423–8444. DOI:
10.1007/s11042-020-10035-z
23. Alobaidi, T., and Mikhael, W. (2024). An Adaptive Steganography Insertion Technique
Based on Cosine Transform. Iraqi Journal for Electrical and Electronic Engineering,
DOI: 10.37917/ijeee.20.2.4.
24. Abdellatef, E., and Allah, M. I. F. (2024). DWT versus DCT Based Hybrid Steganography
and Watermarking Technique for Color Image Encryption. SINAI International Scientific
Journal (SISJ), 1(1).
25. Zhang, Y. Q., Zhong, K., and Wang X. Y. (2022). High-Capacity Image Steganography
based on Discrete Hadamard Transform. IEEE Access, 10, 65141-65155. DOI:
10.1109/ACCESS.2022.3181179
26. Emmanuel, G., Hungil, G. G., Maiga J., and Santoso, A. J. (2021). Information hiding in
images using Discrete Cosine Transform. The 5th Annual Applied Science and Engineering
Conference (AASEC 2020). DOI: 10.1088/1757-899X/1098/5/052083
27. Kalita, M., Tuithung, T., and Majumder, S. (2019). A New Steganography Method Using
Integer Wavelet Transform and Least Significant Bit Substitution. The Computer Journal,
62(11), 1639-1655. DOI: 10.1093/comjnl/bxz014
28. Sumpter, A. K. (2016). A Discrete Wavelet Transform Approach for Enhanced Security in
Image Steganography. International Journal of Cyber-Security and Digital Forensics,
5(1), 10-20. DOI:10.17781/P001978
29. Reddy, H. S. M., and Raja, K. B. (2009). High Capacity and Security Steganography using
Discrete Wavelet Transform. International Journal of Computer Science and Security
(IJCSS), 3(6), 462-472.
30. Chen, P. Y., and Lin, H. J. (2006). A DWT based Approach for Image Steganography.
International Journal of Applied Science and Engineering, 4(3). DOI:
10.6703/IJASE.2006.4(3).275
Thank You