0% found this document useful (0 votes)
7 views32 pages

Design and Implementation of Novel Image Steganography Algorithm (S (1) - 1

The document presents a research study on the design and implementation of novel image steganography algorithms using frequency domain techniques and fuzzy logic. It discusses the need for secure communication, the principles of steganography, and the integration of fuzzy set theory to enhance data hiding methods. The study outlines objectives, research plans, and future scopes for improving steganographic techniques while addressing existing gaps in the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views32 pages

Design and Implementation of Novel Image Steganography Algorithm (S (1) - 1

The document presents a research study on the design and implementation of novel image steganography algorithms using frequency domain techniques and fuzzy logic. It discusses the need for secure communication, the principles of steganography, and the integration of fuzzy set theory to enhance data hiding methods. The study outlines objectives, research plans, and future scopes for improving steganographic techniques while addressing existing gaps in the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Design and Implementation of Novel Image Steganography

Algorithm(s) using Frequency Domain and Fuzzy Logic

Presented by

Kusum Lata

Department of Mathematics
Maharshi Dayanand University
Rohtak, Haryana

Under the Joint-Supervision of

Supervisor Co-Supervisor
Dr Meenakshi Dr Savita Rathee
Assistant Professor Associate Professor
Contents
Introduction
Steganography
Image Steganography
Frequency Domain Image Steganography
Integration of Image Steganography with Fuzzy Set Theory
Literature Review
Future Scope of Various Research Works
Applications of Steganography
Motivation of the Research Study
Objectives of the Reseach Study
Research Plan
References
Introduction

 There is a need of secure communication as


data is transmitted through the use of digital
media.
 On a smaller or personal scale, we can apply
passwords to hide data.
 On a larger and professional scale, we need to
apply professional data hiding techniques
as shown in Figure 1 [1-2].
Figure 1: Branches of Basic Security System
Some well-known professional data hiding
techniques

Cryptography

Steganography Watermarking
Steganography
Steganography is
 derived from Greek words ‘Stegano’ means
‘Covered/Hidden’ and ‘Graphia’ means ‘Writing’ [3],
 an art and science of hiding a secret small multimedia data
inside another but much larger multimedia data such as image,
text, audio or video,
 not only the art of hiding data but also hiding the fact of
transmission,
 an ancient tool, such methods made use of wax writing tablets,
invisible ink, mask, silver balls and hidden pictures etc. [4],
 On the basis of digital media, steganography can be
categorized as shown in Figure 2.
Figure 2: Digital Media to Implement Steganography
Image Steganography

Image steganography is
 the most favorable hiding mode for secret
messages due to its high hiding capacity and
good distortion tolerance,
 a two-step process,
 is classified as shown in Figure 3 [5] .
Figure 3: Classification of Image Steganography
Frequency Domain Image Steganography
Frequency domain techniques are more effective due to their
incorporating hidden information in the transformed coefficients
of cover image instead of directly in the pixel values.
Why frequency domain image steganography?
In the spatial domain secret information is embedded in the
cover image's pixel values directly. These systems are
straightforward and simple to implement. It is vulnerable to
image manipulations, including cropping, rotation, and scaling
[6]. Frequency domain techniques become more robust and
imperceptible than spatial domain methods as secret data is
embedded in coefficients instead in pixel values, resulting in the
least detectable stego image.
Framework of frequency domain image
steganography techniques as shown in Figure 4.
Figure 4: Framework of frequency domain image steganography techniques
Integration of steganographic methods with
fuzzy set theory

 Lotfi Zadeh developed the mathematical idea of a fuzzy set in


1965 to deal with imprecision and uncertainty [7].
 A fuzzy set A in X (space of objects) is characterized by a
membership (characteristic) function fA(x) which associates
with each point in X a real number in the interval [0, 1] with
the value of fA(x) at x representing the “degree of
membership” of x in A [8-9].
 Fuzzy sets permit partial membership, which is determined by
a membership function that assigns a degree of membership
ranging from 0 to 1, in contrast to classical sets, where an
element either belongs to a set or does not (degree of
membership is either 0 or 1) [10].
Characteristics of Fuzzy Sets

Gradual
Boundaries

Membership Uncertainty
Function Management
 Many parts of an image are uncertain. To overcome the
challenges in many image processing applications, such as
object recognition and image analysis, we must rely on our
knowledge and skills.
 Fuzzy logic and fuzzy set theory provide us with strong
instruments to be processed and representing human
knowledge in the form of fuzzy if-then rules.
 Image steganography makes extensive use of fuzzy inference
system which follows the given steps:
 Fuzzification
 Rule Base
 Inference
 Defuzzification
Fuzzy Set Applications in Image Steganography

To better balance and enhance the steganography algorithm,


one can apply fuzzy logics in image processing included in the
method.
Applications of fuzzy logic in image processing include
 Image segmentation
 Enhancement of Images
 Identifying Edge
 Image Restoration
 Noise Estimation
Literature Review
 Vanmathi et al. presented a novel steganography technique in his
paper that combines chaotic encryption with a fuzzy edge detector
for high payload and imperceptibility using fuzzy logic [11].
 Khamy et al. defined the secret image as an 8-bit binary sequence
first, then chaotic (logistic) map was used to shuffle this binary
sequence, DNA complementary rules were then used to encode
the shuffled image and then made use of DWT to embed the
ciphered data in cover image [12] .
 The effective steganography techniques (LSB, Discrete Cosine
Transform) are presented by Poornima et al. give the reader a
range of options for information protection [13].
 Gunjal et al. used the blowfish algorithm for encryption and decryption,
along with DCT and LSB for embedding, to propose a method that
combines cryptography and steganography [14].
 Nagpal et al. provided an overview of steganography, his paper described
image steganographic techniques in the frequency domain (DCT, DWT,
DFT, and SVD) and spatial domain (LSB, LSB Replacement, LSB
Matching, and BPCS) [15].
 Shafi et al. made use of the hybrid fuzzy logic and integer wavelet
transformation to suggest data hiding technique to effectively insert the
secret data into the image [16].
 Joshi et al. focused on increasing strength by reducing embedding capacity
by using three approches made use of DWT and LSB [17].
 Munirajan et al. attempted to create an algorithm that targets universal
stego-detection. His primary goal was to investigate frequency domain
stego-detection using a method he had developed for spatial domain stego-
detection in previous works [18].
 Wanga et al. proposed a steganographic method that effectively
increases the information embedding capacity while preserving the
stego image's visual acceptability by using DWT [19].
 Traditional, CNN, and GAN-based image steganography techniques
have all been covered by Subramanian et al. and details about the
evaluation metrics (PSNR, MSE and BPP) are also provided [20].
 The idea of a non-linear dynamic system (chaos) has been used by
Bandyopadhyay et al. to propose a secure LSB technique for image
steganography [21].
 Setiadi et al. made use of three image steganography techniques
(LSB, PVD, and CRT) and made use of two well-known tools to
measure the stego image's quality [22].
Future Scope of Various Research Works

Based on reviewing the existing techniques [23-30], following


Future Scope in the Study are analysed.

 Merging the existing transform methods with other transforms, such as the
Discrete Wavelet Transform (DWT) or Discrete Fourier Transform (DFT).
 To increase the hybrid DWT-DCT encryption technique's usefulness in
multimedia security.
 Adaptation to various image formats, i.e., examining how the suggested
strategy works with multiple image formats (such as PNG and BMP) could
increase its applicability and evaluate how well it performs with various
compression rates and features.
 Security can be increased by integrating the steganography scheme with
advanced cryptographic techniques.
 There is a great chance to use the suggested technique in binary images to
color images.
 One can extend the proposed methods to increase payload with less effect
on stego image quality.
 Depending on the content of the cover image, research could focus on
dynamically modifying the embedding strength parameters.
 Future research could concentrate on strengthening the steganographic
scheme's tolerance to different types of attacks, including filtering,
compression.
Based on reviewing the existing techniques,
following Research Gaps in the Study are analysed.

 Insufficient fuzzy logic integrity with frequency


domain methods.
 Fuzzy logic-based embedding capacity optimization.
 Resilience against complex attacks.
 Fuzzy logic-based systematic parameter selection.
 Fuzzy logic-enhanced robustness in multimedia
formats.
Applications of Steganography

Copyright Control
Covert Communication
Smart ID’s
Printers
Health Applications
Clinical Trials
Data Integrity and Authentication
Access Control
Motivation of the Research Study

The key driving force behind this study is the


integration of fuzzy logic systems to overcome the
shortcomings of existing image steganography
techniques.
Objectives of the Research Study

 To design, implement and test new algorithm(s) for edge


detection in an image using Frequency Domain and Fuzzy
Logic.
 To design, implement and test new algorithm(s) for
identifying interested areas/ patterns other than edges in an
image using Frequency Domain and Fuzzy Logic.
 To extend the algorithms proposed above for steganography.
 To compare the results of proposed alg orithms with that of
similar work for different parameters.
Research Plan
Literature review and familiarity with research tools (software and
hardware).
Compile the literature review.

Understanding the various methods of detecting interested areas of


images.
Study about fuzzy set, types of fuzzy sets and fuzzy logics.
Collection of different types of images with required intensities.
Understanding of various methods of image steganography.
Continued…

To design and test new algorithms for detection of interested areas of
images using fuzzy logics in MATLAB or any other software.
To implement, test and analyse the proposed fuzzy logic based
algorithms for detection of required areas of images.

To design and develop new algorithms using fuzzy logic based pixel
detection for embedding and extracting message in/ from images using
MATLAB or any other software.
To implement, test and analyse the proposed algorithms for
embedding and extracting message in/ from images.

Modification/improvement in algorithms, if required.

Research Publications.
Thesis Writing.
References
1. Hussain, M., Wahab, A.W.A., Idris, Y.I.B., Hoc, A.T.S., and Jung, K.H. (2018).
Image steganography in spatial domain: A survey. Signal Processing: Image
Communication, Elsevier, 65, 46-66. DOI: 10.1016/j.image.2018.03.012
2. Chuck Easttom, Modern Cryptography Applied Mathematics for Encryption
and Information Security, Second Edition . DOI: 10.1007/978-3-031-12304-7
3. Kombrink, M.H., Geradts, Z. J. M. H., and Worring, M. (2024). Image
Steganography Approaches and Their Detection Strategies: A Survey. ACM
Comput. Surv., 57(2), 33:1-33:40. DOI: 10.1145/3694965
4. NDM: Introduction to Steganography. https://youtu.be/GPdIY6ObKJU?
si=TYxL64IKPulLq9-t
5. Kadhima, I.J., Premaratnea, P., Vial, P.J., and Hallorana, B.(2019).
Comprehensive Survey of Image Steganography: Techniques,Evaluations, and
Trends in Future Research. Neurocomputing, 335, 299–326. DOI:
10.1016/j.neucom.2018.06.075
6. Subhedar, M.S., and Mankar, V.H. (2014). High Capacity Image
Steganography based on Discrete Wavelet Transform and Singular Value
Decomposition. ICTCS’14. http: //dx.doi.org/10.1145/2677855.2677918
7. Zadeh, L.A. (1965). Fuzzy Sets. Information and Control, 8, 338-353.
8. Zadeh, L.A. (1973). Outline of a New Approach to the Analysis of
Complex Systems and Decision Processes. IEEE Transactions on
Systems, Man, and Cybernetics, 3(1), 24-44.
9. Zadeh, L.A. (2008). Is there a Need for Fuzzy Logic?. Information
Sciences, 178, 2751–2779. DOI:10.1016/j.ins.2008.02.012
10. Gonzalez, R.C., Woods, R.E. (2016). Digital Image Processing (3).
Pearson Education India, ISBN 978-9332570320 DOI:
10.4236/ijg.2014.55050.
11. Vanmathi, C., Prabu, S. (2017). Image Steganography Using Fuzzy Logic
and Chaotic for Large Payload and High Imperceptibility. International
Journal of Fuzzy Systems. DOI: 10.1007/%40815-017-0420-0
12. El-Khamy, S.E., Korany, N.O., Mohamed, A.G. (2020). A new Fuzzy-
DNA Image Encryption and Steganography Technique. IEEE Access,
8(99).DOI: 10.1109/ACCESS.2020.3015687
13. Poornima, R., and Iswarya, R. J. (2013). An Overview Of Digital Image
Steganography. International Journal of Computer Science and
Engineering Survey, 4(1), 23-31. DOI: 10.5121/ijcses.2013.4102
14. Gunjal, M., and Jha, J. (2014). Image Steganography Using Discrete
Cosine Transform (DCT) and Blowfish Algorithm. International Journal
of Computer Trends and Technology, 11(4), 144-150.
15. Nagpal, K. D., and Dabhade, D. S. (2015). A Survey on Image
Steganography and its Techniques in Spatial and Frequency Domain.
International Journal on Recent and Innovation Trends in Computing
and Communication, 3(2), 776 – 779.
16. Shafi, I., Noman, M., Gohar, M., Ahmad, A., Khan, M., Din, S.,
Ahmad, S. H., and Ahmad J. (2017). An adaptive hybrid fuzzy-wavelet
approach for image steganography using bit reduction and pixel
adjustment. Soft Computing, 22, 1555–1567. DOI:10.1007/s00500-017-
2944-5
17. Joshi, S. V., Bokil, A. A., Jain, N. A., and Koshti, D. (2012). Image
Steganography Combination of Spatial and Frequency Domain.
International Journal of Computer Applications, 53(5), 25-29.
18. Munirajan, V.K., Cole, E, and Ring, S. (2005). Transform Domain Steganography
Detection Using Fuzzy Inference Systems. IEEE Sixth International Symposium on
Multimedia Software Engineering. DOI: 10.1109/MMSE.2004.83
19. Wanga, W., Liua, X., Lub, M., Liuc, J., and Jiang, P. (2022). Intelligent Fuzzy Approach
Based High-Performance Steganography in Wavelet Domain. Automatic Control and
Computer Sciences, 56(3), 189-197.
20. Subramanian, N., Elharrouss, O., Maadeed, S. A., and Bouridane, A. (2021). Image
Steganography: A Review Of The Recent Advances. IEEE Access, 9, 23409-23423. DOI:
10.1109/ACCESS.2021.3053998
21. Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., and Dutta, P. (2014). A Novel Secure
Image Steganography Method Based on Chaos Theory in Spatial Domain. International
Journal of Security, Privacy and Trust Management, 3(1), 11-22. DOI:
10.5121/ijsptm.2014.3102
22. Setiadi, D. R. I. M. (2020). PSNR vs SSIM: imperceptibility quality assessment for image
steganography. Multimedia Tools and Applications, 80, 8423–8444. DOI:
10.1007/s11042-020-10035-z
23. Alobaidi, T., and Mikhael, W. (2024). An Adaptive Steganography Insertion Technique
Based on Cosine Transform. Iraqi Journal for Electrical and Electronic Engineering,
DOI: 10.37917/ijeee.20.2.4.
24. Abdellatef, E., and Allah, M. I. F. (2024). DWT versus DCT Based Hybrid Steganography
and Watermarking Technique for Color Image Encryption. SINAI International Scientific
Journal (SISJ), 1(1).
25. Zhang, Y. Q., Zhong, K., and Wang X. Y. (2022). High-Capacity Image Steganography
based on Discrete Hadamard Transform. IEEE Access, 10, 65141-65155. DOI:
10.1109/ACCESS.2022.3181179
26. Emmanuel, G., Hungil, G. G., Maiga J., and Santoso, A. J. (2021). Information hiding in
images using Discrete Cosine Transform. The 5th Annual Applied Science and Engineering
Conference (AASEC 2020). DOI: 10.1088/1757-899X/1098/5/052083
27. Kalita, M., Tuithung, T., and Majumder, S. (2019). A New Steganography Method Using
Integer Wavelet Transform and Least Significant Bit Substitution. The Computer Journal,
62(11), 1639-1655. DOI: 10.1093/comjnl/bxz014
28. Sumpter, A. K. (2016). A Discrete Wavelet Transform Approach for Enhanced Security in
Image Steganography. International Journal of Cyber-Security and Digital Forensics,
5(1), 10-20. DOI:10.17781/P001978
29. Reddy, H. S. M., and Raja, K. B. (2009). High Capacity and Security Steganography using
Discrete Wavelet Transform. International Journal of Computer Science and Security
(IJCSS), 3(6), 462-472.
30. Chen, P. Y., and Lin, H. J. (2006). A DWT based Approach for Image Steganography.
International Journal of Applied Science and Engineering, 4(3). DOI:
10.6703/IJASE.2006.4(3).275
Thank You

You might also like