© The Institution of Engineering and Technology
Data hiding is a technique that is embedding the secret message into the media. In 2010, Chen et al.’s proposed a scheme combined the ‘Canny’ edge detector and fuzzy edge detector to increase edge pixels, and embedded more secret data into the edge pixels than the non-edge pixels based on the least-significant-bit (LSB) substitution scheme. In this study, the authors use Kaur et al.’s fuzzy logic-based algorithm and extend the original design to block-based design. The experimental results show that the proposed method achieves higher payload with Kaur et al.'s fuzzy logic-based algorithm, and achieve minimal distortion by selecting the number of edge pixel's embedding length of each block which has minimum mean-squared error.
References
-
-
1)
-
W.-J. Chen ,
C.-C. Chang ,
T.H.N. Le
.
High payload steganography mechanism using hybrid edge detector.
J. Expert Syst. Appl.
,
4 ,
3292 -
3301
-
2)
-
9. Tao, C.W., Thompson, W.E., Taur, J.S.: ‘A fuzzy if-then approach to edge detection’. Second IEEE Int. Conf. on Fuzzy Systems, 1993, pp. 1356–1360.
-
3)
-
14. Kaur, E.K., Mutenja, E.V., Gill, E.I.S.: ‘Fuzzy logic based image edge detection algorithm in MATLAB’, Int. J. Comput. Appl., 2010, 1, (22), pp. 55–58.
-
4)
-
12. Russo, F.: ‘Edge detection in noisy images using fuzzy reasoning’, Instrumentation and Measurement Technology Conf., 1998, no. 1, pp. 369–372.
-
5)
-
11. Kuo, Y.H., Lee, C.S., Liu, C.C.: ‘A new fuzzy edge detection method for image enhancement’. Proc. of the Sixth IEEE Int. Conf. on Fuzzy Systems, 1997, no. 2, pp. 1069–1074.
-
6)
-
3. Sonka, M., Hlavac, V., Boyle, R.: ‘Image processing, analysis, and machine vision’ (Thomson Brooks/Cole, 1999).
-
7)
-
10. Amarunnishad, T.M., Govindan, V.K., Mathew, A.T.: ‘A fuzzy complement edge operator’. Advanced Computing and Communications, 2006, pp. 344–348.
-
8)
-
1. Westfeld, A., Pfitzmann, A.: ‘Attacks on steganographic systems’, (Springer Berlin Heidelberg, 2000), pp. 61–76.
-
9)
-
A. Said ,
W.A. Pearlman
.
A new, fast, and efficient image codec based on set partitioning in hierarchical trees.
IEEE Trans. Circuits Syst. Video Technol.
,
3 ,
243 -
250
-
10)
-
2. Johnson, N., Duric, Z., Jajodia, S.: ‘Information hiding: steganography and watermarking-attacks and countermeasures’ (Kluwer Academic Publishers, Boston, MA, 2001).
-
11)
-
13. Tizhoosh, H.R.: ‘Fast fuzzy edge detection’. Annual Meeting of the North American in Fuzzy Information Processing Society, 2002, pp. 239–242.
-
12)
-
J. Canny
.
A computational approach to edge detection.
IEEE Trans. Pattern Anal. Mach. Intell.
,
6 ,
679 -
697
-
13)
-
C.K. Chan ,
L.M. Cheng
.
Hiding data in images by simple LSB substitution.
Pattern Recognit.
,
3 ,
469 -
474
-
14)
-
8. El-Khamy, S.E., Lotfy, M., El-Yamany, N.: ‘A modified fuzzy Sobel edge detector’. Radio Science Conf., 2000, pp. C32/1–C32/9.
-
15)
-
6. Amarunnishad, T.M., Govindan, V.K., Mathew, A.T.: ‘Improving BTC image compression using a fuzzy complement edge operator’, Signal Process., 2008, 88, (12), pp. 2989–2997 (doi: 10.1016/j.sigpro.2008.07.004).
-
16)
-
J.M. Shapiro
.
Embedded image coding using zerotrees of wavelet coefficients.
IEEE Trans. Signal Process.
,
12 ,
3445 -
3462
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2013.0584
Related content
content/journals/10.1049/iet-ipr.2013.0584
pub_keyword,iet_inspecKeyword,pub_concept
6
6