Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion

Data hiding is a technique that is embedding the secret message into the media. In 2010, Chen et al.’s proposed a scheme combined the ‘Canny’ edge detector and fuzzy edge detector to increase edge pixels, and embedded more secret data into the edge pixels than the non-edge pixels based on the least-significant-bit (LSB) substitution scheme. In this study, the authors use Kaur et al.’s fuzzy logic-based algorithm and extend the original design to block-based design. The experimental results show that the proposed method achieves higher payload with Kaur et al.'s fuzzy logic-based algorithm, and achieve minimal distortion by selecting the number of edge pixel's embedding length of each block which has minimum mean-squared error.

References

    1. 1)
    2. 2)
      • 9. Tao, C.W., Thompson, W.E., Taur, J.S.: ‘A fuzzy if-then approach to edge detection’. Second IEEE Int. Conf. on Fuzzy Systems, 1993, pp. 13561360.
    3. 3)
      • 14. Kaur, E.K., Mutenja, E.V., Gill, E.I.S.: ‘Fuzzy logic based image edge detection algorithm in MATLAB’, Int. J. Comput. Appl., 2010, 1, (22), pp. 5558.
    4. 4)
      • 12. Russo, F.: ‘Edge detection in noisy images using fuzzy reasoning’, Instrumentation and Measurement Technology Conf., 1998, no. 1, pp. 369372.
    5. 5)
      • 11. Kuo, Y.H., Lee, C.S., Liu, C.C.: ‘A new fuzzy edge detection method for image enhancement’. Proc. of the Sixth IEEE Int. Conf. on Fuzzy Systems, 1997, no. 2, pp. 10691074.
    6. 6)
      • 3. Sonka, M., Hlavac, V., Boyle, R.: ‘Image processing, analysis, and machine vision’ (Thomson Brooks/Cole, 1999).
    7. 7)
      • 10. Amarunnishad, T.M., Govindan, V.K., Mathew, A.T.: ‘A fuzzy complement edge operator’. Advanced Computing and Communications, 2006, pp. 344348.
    8. 8)
      • 1. Westfeld, A., Pfitzmann, A.: ‘Attacks on steganographic systems’, Information Hiding (Springer Berlin Heidelberg, 2000), pp. 6176.
    9. 9)
    10. 10)
      • 2. Johnson, N., Duric, Z., Jajodia, S.: ‘Information hiding: steganography and watermarking-attacks and countermeasures’ (Kluwer Academic Publishers, Boston, MA, 2001).
    11. 11)
      • 13. Tizhoosh, H.R.: ‘Fast fuzzy edge detection’. Annual Meeting of the North American in Fuzzy Information Processing Society, 2002, pp. 239242.
    12. 12)
    13. 13)
    14. 14)
      • 8. El-Khamy, S.E., Lotfy, M., El-Yamany, N.: ‘A modified fuzzy Sobel edge detector’. Radio Science Conf., 2000, pp. C32/1C32/9.
    15. 15)
    16. 16)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2013.0584
Loading

Related content

content/journals/10.1049/iet-ipr.2013.0584
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address