Literature DB >> 32420466

Interval type-2 fuzzy logic system based similarity evaluation for image steganography.

Zubair Ashraf1, Mukul Lata Roy1, Pranab K Muhuri1, Q M Danish Lohani2.   

Abstract

Similarity measure, also called information measure, is a concept used to distinguish different objects. It has been studied from different contexts by employing mathematical, psychological, and fuzzy approaches. Image steganography is the art of hiding secret data into an image in such a way that it cannot be detected by an intruder. In image steganography, hiding secret data in the plain or non-edge regions of the image is significant due to the high similarity and redundancy of the pixels in their neighborhood. However, the similarity measure of the neighboring pixels, i.e., their proximity in color space, is perceptual rather than mathematical. Thus, this paper proposes an interval type-2 fuzzy logic system (IT2 FLS) to determine the similarity between the neighboring pixels by involving an instinctive human perception through a rule-based approach. The pixels of the image having high similarity values, calculated using the proposed IT2 FLS similarity measure, are selected for embedding via the least significant bit (LSB) method. We term the proposed procedure of steganography as 'IT2 FLS-LSB method'. Moreover, we have developed two more methods, namely, type-1 fuzzy logic system based least significant bits (T1FLS-LSB) and Euclidean distance based similarity measures for least significant bit (SM-LSB) steganographic methods. Experimental simulations were conducted for a collection of images and quality index metrics, such as PSNR (peak signal-to-noise ratio), UQI (universal quality index), and SSIM (structural similarity measure) are used. All the three steganographic methods are applied on dataset and the quality metrics are calculated. The obtained stego images and results are shown and thoroughly compared to determine the efficacy of the IT2 FLS-LSB method. We have also demonstrated the high payload capacity of our proposed method. Finally, we have done a comparative analysis of the proposed approach with the existing well-known steganographic methods to show the effectiveness of our proposed steganographic method.
© 2020 The Authors.

Entities:  

Keywords:  Computer science; Data hiding; Image steganography; Interval type-2 fuzzy logic system; Similarity measure

Year:  2020        PMID: 32420466      PMCID: PMC7215116          DOI: 10.1016/j.heliyon.2020.e03771

Source DB:  PubMed          Journal:  Heliyon        ISSN: 2405-8440


Introduction

Similarity describes the relationships between conceptual or perceptual entities (Li and Liu, 2015). It has been evolved from different senses (Demirci, 2007), as given below: Mathematical approach: A number of mathematical distance functions have been developed to calculate the similarity between pairs of numerical data, e.g., Hamming distance, Euclidean distance, and so on. Psychological approach: In terms of psychology, similarity has been studied by calculating the correlation between objects, human perceptual resemblance, and rule-like or theory-like semantic representations. Fuzzy approach: The similarity is measured through fuzzy logic by simulating the human perception of similarity. It has the benefit of being able to handle non-numerical quantities, degrees of similarity, and perceptual reasoning occurring due to human judgments. In the field of image processing, similarity measures for image pixels are typically evaluated using Euclidean distance in color space. However, Wuerger et al. (Wuerger et al., 1995) demonstrated that proximity in color space – something that is perceptual rather than mathematical – cannot be evaluated using this distance measure. In other words, the measure that we get using the Euclidean distance will not be adequate for judging the similarity of image pixels (Demirci, 2007). Moreover, since the similarity of pixels involves an instinctive approach rather than a numerical one, it becomes necessary to consider human perception in its measurement. Based on the fuzzy sets (Zadeh, 1965), fuzzy logic (FL) has concerns with the degree of membership in a set. It differs from conventional logic and is an essential tool to handle the problems in which imprecise information is associated with data. Prof. Zadeh himself was the first to offer a way to judge similarity in terms of FL in (Zadeh, 1971), where he extended the theories of relations and equivalence to adapt for problems where the parameters are not well-defined. In the modeling of a real-life system, the incorporation of uncertainties plays an essential part. The uncertainties arise or exist because of lack of knowledge of system experts and incomplete information regarding the system inputs. Such causes impreciseness and ambiguity and inconsistency in the modeling of the system. Another important reason that causes the uncertainty in the system is the differences in the opinions of experts. In fuzzy sets or type-1 fuzzy sets (T1 FSs), the single expert opinion is incorporated with the membership function that signifies the degree of uncertainty. However, due to the conflicts in the opinions of various experts and various resources of uncertainty, T1 FSs are insufficient for modeling those systems. To overcome this, Prof. Zadeh himself proposed the concept of type-2 fuzzy sets (T2 FSs) (Zadeh, 1975). Further, Mendel et al. pioneered the interval type-2 fuzzy sets (IT2 FSs) to reduce the burden of computation with general T2 FS (Mendel and Wu, 2010). Since then, a significant number of applications have been developed using IT2 FSs, such as machine learning (John et al., 2000), image processing (Castillo et al., 2007), pattern recognition (Melin and Castillo, 2013), reliability engineering (Ashraf et al., 2014, 2015; Muhuri et al., 2017), real-time system (Muhuri et al., 2020a, Muhuri et al., 2020b), similarity measures (Li et al., 2015), inventory system (Ashraf et al., 2017) etc. Steganography is a technique of protecting information in such a way that it is not evident to unauthorized entities. Such a task has become increasingly more critical as the popularity of the internet as a medium of transmission increases. A steganographic method, therefore, aims to hide away secret data as unobtrusively as possible; this is typically done by fixing the data bits mentioned above deeply in another form of data. Both, the data to be embedded and the data needed for embedding, can be of several kinds: text, image, audio or video (Cheddad et al., 2010; Johnson and Katzenbeisser, 2000; Petitcolas et al., 1999). Steganographic methods consist of two parts: embedding and extraction. Embedding is the process of hiding the data in the pixels of the image, while extraction is the process of retrieving the hidden data from the image. The image used for embedding is called the cover image, and the output image after embedding is called the stego image. The overall objective of steganography – to hide the data so that it is indiscernible – can be achieved by ensuring a few things: the protected data inside the cover object must be transparently imperceptible; the method of embedding itself must be able to withstand various attacks; the stego object should have a high embedding capacity for hiding data bits; and the method used should be such that it can resist any damaging interference (Jafari et al., 2013; Jero et al., 2016; Kanan and Nazeri, 2014; Li et al., 2010; Subhedar and Mankar, 2014; Wu and Tsai, 2003). In literature, there are several existing methods for steganography. These methods can be grouped based on their processing domain as follows: (1) spatial domain and (2) transform domain. The difference between these two domain techniques is that, in the spatial domain techniques, the embedding occurs directly in the pixels of the image, while in the transform domain techniques, the image is first transformed into the frequency domain and then the embedding is done. In image steganography, embedding in the plain or non-edge regions of the image has a significantly low effect on the human visual system. In other words, the pixel values in the plain (non-edge) regions of the image are similar, so they are good areas to embed. This is because the differences in the neighborhood pixel values of the plain region are very low (Melin et al., 2014). However, embedding in the textured region of the image is not advisable, since a slight change in the pixel values of that region can distort the image. Additionally, the pixels, having integer values ranging between 0 and 255, are redundant to its neighbors and the levels of differences between them are almost negligible. Therefore, the corresponding differences based on numeric pixel values are not truly justified as similar or not similar. Thus, to perform image steganography in those regions, rule-based categorization is required to calculate the similarity value for any pair of pixels (Demirci, 2006). In other words, the perceptual reasoning of the similarity of the redundant pixels in the neighborhood should be assessed by human judgment (Hampton, 1998; Seaborn et al., 2005). Therefore, linguistic variables are the most appropriate for the modeling of perceptual similarity, and FSs have long been the best-recognized tool to represent these linguistic values. One of the most fundamental issues in the linguistic variable representation by employing T1 FSs is the selection of the membership function (MF) that interprets the uncertainty in information. Additionally, there exists a need to justify the crispness of the membership value of the fuzzy set, as it seems to contradict the core idea of “fuzziness”. The type-1 membership function (T1 MF) is mostly recommended by the system expert to signify the degree of belongingness to a T1 FS. However, when there is more than one expert involved to provide the opinions regarding the MFs, T1 FSs risk being unable to capture the different kinds of uncertainties. The above situation can be resolved by considering the union of all the T1 MFs representing the various expert opinions. This causes the generation of interval type-2 membership functions (IT2 MFs), leading to IT2 FSs (Ashraf et al., 2018a; Muhuri et al., 2017). Therefore, we propose that the linguistic terms be portrayed as IT2 FSs. The IT2 MFs of IT2 FSs are able to capture higher uncertainty compared to T1 FSs. In IT2 MFs, the Footprint of Uncertainty (FOU) depicts a degree of uncertainty caused by the differences of human judgment (or expert opinion) regarding the T1 MFs. The FOU offers more flexibility in the adjustment of the decisive parameters, i.e., the IT2 MFs of linguistic variables. As a result, the FOU of IT2 MFs are bounded by lower and upper membership functions representing the uncertainty of the linguistic terms . Hence, a significant improvement has been made in shifting from a type-1 fuzzy logic system (T1 FLS) to interval type-2 fuzzy logic system (IT2 FLS) by the researchers in recent years. IT2 FLSs have been effectively applied in the various applications of image processing systems such as classification (Majeed et al., 2018; Rubio et al., 2017), filtering (Singh et al., 2018), segmentation (Dhar and Kundu, 2019; Zhao et al., 2019), and edge detection (Castillo et al., 2017; Gonzalez and Melin, 2017; Gonzalez et al., 2016; Martínez et al., 2019; Melin et al., 2014). In this paper, we propose a novel steganographic procedure using an IT2 FLS based similarity measure to measure the similarity between the pixels in a digital image. For doing so, a (3×3) window of pixels is selected to find the similarity of the central pixel to its neighboring pixels. We calculate the difference of all the three color components, i.e., red (R), green (G), and blue (B), which are assigned linguistic terms. The result from the IT2 FLS is a similarity matrix which contains values in the interval [0, 1] indicating the level of similarity of each pixel of the image to its neighbors. This similarity matrix is used to select pixels to perform the least significant bit (LSB) method for hiding the secret message. We have not found any previous work of similarity measure or steganography which has used an IT2 FLS. Cover images, namely, Lena, Baboon, Jet, Barbara, Boat, Peppers, Earth, House, Sailboat and Splash, have been chosen as the dataset, upon which the proposed steganographic method was applied to generate the corresponding stego images. Quality index metrics are used to assure the visual quality of the stego images. We have also demonstrated the high payload capacity of our proposed method. The significant contributions of this paper are summarized as: A new algorithm based on IT2 FLS was developed that calculates the perceptual similarity of an image. Linguistic variables represent the color differences between pixels as {Low, Medium, High} and degree of similarity as {Not Similar, Slightly Similar, Moderately Similar, Quite Similar, Exactly Similar}. These variables are formulated as IT2 MFs in the IT2 FLS. IT2 FLS takes the IT2 MFs of the linguistic variables as inputs and provides the output describing the similarity between a pair of pixels. Mamdani inference engine using fuzzy-rules operates on the IT2 MFs to achieve the similarity. Consequently, the type-reduction and defuzzification generates the similarity value of a pixel in an image. Similarity matrix depicting the similarity of each pixel in an image is evaluated based on a set of fuzzy-rules. The embedding and extraction procedures of steganography are performed on the image using the least significant bit (LSB) method. A pixel of an image is selected for embedding if the corresponding similarity value (in the similarity matrix) is greater than a particular threshold value, which indicates the degree of similarity to its neighbors. To show the efficacy of our proposed method, type-1 fuzzy logic system (T1 FLS) based and Euclidean distance based similarity measures were also implemented to perform steganography. The experimental simulations were performed on a dataset consisting of ten different cover images, and the corresponding stego images are obtained. The whole procedure with the three methods: (a) proposed, (b) T1 FLS based, (c) Euclidean distance based, was repeated for different numbers of bits () hidden in the LSBs of the pixels and for different thresholds. A thorough comparison has been done by investigating the perceptual transparency and visual quality of the stego images. These were measured by using three quality index metrics: peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), and universal quality index (UQI). The rest of the paper is organized as follows: in Section 2, a literature survey is presented, detailing past works relevant to this paper. Mathematical definitions of T2 FSs, IT2 FSs, and IT2 FLSs are explained in Section 3. Steps of the proposed IT2 FLS based similarity measure technique and consequent steganographic method is elaborated in Section 4. Details of the experimental simulations and results are reported in Section 5, which also includes a comparative discussion. Finally, we conclude in Section 6.

Literature survey

Similarity measures played important role in many image processing applications such as edge detection (Demirci, 2007), filtering (Elmas et al., 2013), retrieval (Varish et al., 2017), steganography (Karakiş et al., 2015) and so on. Kokare et al. (Kokare et al., 2003) compared Euclidean, Manhattan, Chebychev, Mahalanobis, Canberra, Bray-Curtis, Weighted-Mean-Variance, Squared Chord, and Squared Chi-Squared distances/similarity function for measuring the texture retrieval from image. Puzicha et al. (Puzicha et al., 1997) presented a similarity measure based on non-parametric statistical tests to compare the empirical distributions of Gabor coefficients for textures in images. Holden et al. (2000) evaluated different similarity measure functions for rigid body registration of serial magnetic resonance brain scans. Two probabilistic similarity measures were proposed by Aksoy et al. (Aksoy and Haralick, 2001) and compared with geometric similarity measures for image retrieval. Wang and Simoncelli (2005) proposed the similarity measure that works in the wavelet frequency domain of image to measure the translation, scaling and rotation of images. A similarity assessment technique using fuzzy logic (FL) for judgment of properties was proposed by Santini et al. (Santini and Jain, 1999) to feature contrast in images. To distinguish meaningful objects in images, Chien et al. (Chien and Cheng, 2002) developed an image segmentation scheme that was based on fuzzy color similarity measure. A comparative study of crisp and fuzzy logic based similarity measures was done by Jain et al. (1995) to find the similar or distinct textures of the images. To handle possible distortions in fingerprints of a non-linear nature, Chen et al. (Chen et al., 2006) developed a normalized fuzzy similarity measure. A fuzzy diffusion technique was proposed by Elmas et al. (2013) using the FL to obtain the similarity between pixels and generate a similar image used as a heat diffusion coefficient. Demirci et al. (Demirci, 2007) used similarity in edge detection in images. The authors used the pixel window to get the similarity value of the central pixel to its neighboring pixels and created a similarity matrix to detect edges in the image by using the threshold value. Wu et al. (Wu and Tsai, 2003) proposed a steganographic method in which secret data was embedded in those pixels where the pixel-value differences of two consecutive pixels were low. An adjacent pixel difference based steganographic technique was presented by Li et al. (Y.-C. Li et al., 2010) in which the histogram of adjacent pixels was employed to increase the capacity of embedding. Karakis et al. (Karakiş et al., 2015) proposed rule-based FL for image steganographic scheme to hide patient data in medical images.

Preliminaries

This section discusses the basics of interval type-2 fuzzy logic systems (IT2 FLS). In order to discuss an IT2 FLS, we must first define type-2 fuzzy sets (T2 FSs) and interval type-2 fuzzy sets (IT2 FSs).

T2 FSs and IT2 FSs

A T2 FS , is distinguished by a membership function , defined over x and u, where x is an element taken from universe of discourse X and u represents its primary membership function, respectively (R. John, 1998). Thus, the T2 FS can be expressed as Eq. (1): If the secondary membership function , then a T2 FS becomes an IT2 FS (Mendel and Wu, 2010) as defined in Eq. (2). The graphical representation of an IT2 FS can be seen in Figure 1. In Figure 1, lower membership function (LMF) and upper membership function (UMF) are denoted by and , repectively. The area that lies between the LMF and UMF is known as the Footprint of Uncertainty (FOU), given be Eq. (3).
Figure 1

Interval type-2 fuzzy set.

Interval type-2 fuzzy set.

Interval type-2 fuzzy logic systems (IT2 FLS)

An IT2 FLS consists of fuzzification, rule-based inference engine, type-reduction and defuzzification procedures. A typical IT2 FLS can be seen in diagram form in Figure 2 (Mendel and Wu, 2010). The fuzzification takes input as a crisp value and consequently generates an IT2 FS using interval type-2 membership functions (IT2 MF). By applying certain if-then rules, the inference engine combines all the input IT2 FSs and gives an output IT2 FS. The type-reduction process takes the output IT2 FS and reduces it to a T1 FS. After that, the type-reduced set is put through defuzzification to achieve a final crisp output.
Figure 2

Interval type-2 fuzzy logic system.

Interval type-2 fuzzy logic system.

Proposed steganographic method

The proposed steganography method named ‘IT2 FLS based similarity measure for image steganography’ is depicted in the form of a flow diagram in Figure 3. The detailed explanation of each step involved in the proposed method is discussed in the following sub-sections.
Figure 3

Proposed LSB image steganographic method using IT2 FLS based similarity measure.

IT2 FLS based similarity measure Proposed LSB image steganographic method using IT2 FLS based similarity measure.

IT2 FLS based similarity measure procedure

An image is comprised of pixels that are used to hide the secret information. A particular pixel is chosen for hiding if the value of similarity measure between the neighboring pixels is high. Figure 4 shows a typical window of size of the image that illustrates the neighboring pixels of the central pixel . Therefore, pixel is selected for embedding if its similarity to its neighboring pixels is high.
Figure 4

Neighboring pixels.

Neighboring pixels. In the IT2 FLS based similarity measure procedure, a window corresponding to the each pixel in the cover image of size () is taken to calculate the similarity value of the central pixel. Algorithm 1 gives the step-by-step procedure of IT2 FLS based similarity measure. It consists of five main steps: (i) calculating gray level differences of pixels, (ii) interval type-2 fuzzification, (iii) rule-based inference engine, (iv) type-reduction and defuzzification, and (v) calculation of the similarity matrix. A detailed discussion on these steps is given in this sub-section. The output of Algorithm-1 is a similarity matrix of size (), whose values lie within the interval . Each element belonging to the similarity matrix gives the similarity of the central pixel to its neighboring pixels in the window.

Calculation of the gray-level differences

The pixels have three color components, Red (), Blue (), and Green (), with their corresponding gray-level intensities, , and , respectively as given in Figure 5. The gray-level differences between two pixels and corresponding to each of the color components, , are calculated as follows:
Figure 5

Gray levels of pixels.

Gray levels of pixels.

Interval type-2 fuzzification

In this step, the gray-level differences of each pair of pixels in all three color components are assigned interval type-2 membership functions (IT2 MFs). These IT2 MFs represent the corresponding linguistic terms: Low, Medium and High. There are several IT2 MFs such as triangular, trapezoidal, Gaussian, etc., available for handling these linguistic terms. We have used the triangular MFs to model them, because each of the linguistic values are provided in the form of intervals and their left and right ends are specific to the experts (Muhuri et al., 2017). The interval type-2 triangular membership function (IT2 TMF) is given in Eq. (7) which is defined using the LMF and the UMF given as Eqs. (8) and (9) respectively.where and In Eqs. (8) and (9), are five input parameters where and are used in the LMF and the UMF , respectively. When the gray-level differences fall in the interval , then the linguistic terms Low (), Medium () and High () will be assigned to them, respectively. Figure 6 gives a typical example of IT2 TMFs representing the linguistic terms and .
Figure 6

IT2 TMFs of the color component differences representing the linguistic terms.

IT2 TMFs of the color component differences representing the linguistic terms.

Rules and inference engine

In the inference engine, the generated IT2 MFs assigned to each gray-level difference of the three color components of a pair of pixels are combined according to certain rules. As a result, a new IT2 MF describing the similarity between each pair of pixels is generated by assigning the linguistic terms such as - Not Similar, - Slightly Similar, - Moderately Similar, - Quite Similar, and - Exactly Similar. Figure 7 shows the IT2 MFs with respect to each linguistic term to describe the similarity.
Figure 7

Typical IT2 TMFs of the similarities for the representation of the linguistic terms.

Typical IT2 TMFs of the similarities for the representation of the linguistic terms. The fuzzy-rules are given in Table 1 (Elmas et al., 2013). In Table 1, there are twenty seven fuzzy-rules listed to elaborate all the possible combinations of the input and output IT2 FSs. The inference engine maps the input difference IT2 FS to output similarity IT2 FS by combining rules. Let us consider that are inputs and is one output. Then, the th rule given in the form of:can be written as Eq. (10)where, and is the fuzzy relation described by IT2 MF as Eq. (11)
Table 1

Fuzzy rules (Ashraf et al., 2018b).

RuleAntecedentConsequent
R1:If μδRisL, μδGisL, μδBisLthenμSisES
R2:If μδRisL, μδGisL, μδBisMthenμSisES
R3:If μδRisL, μδGisL, μδBisHthenμSisQS
R4:If μδRisL, μδGisM, μδBisLthenμSisES
R5:If μδRisL, μδGisM,μδBisMthenμSisQS
R6:If μδRisL, μδGisM, μδBisHthenμSisMS
R7:If μδRisL, μδGisH, μδBisLthenμSisQS
R8:If μδRisL, μδGisH, μδBisMthenμSisMS
R9:If μδRisL, μδGisH, μδBisHthenμSisSS
R10:If μδRisM, μδGisL, μδBisLthenμSisES
R11:If μδRisM, μδGisL, μδBisMthenμSisQS
R12:If μδRisM, μδGisL, μδBisHthenμSisMS
R13:If μδRisM, μδGisM, μδBisLthenμSisQS
R14:If μδRisM, μδGisM, μδBisMthenμSisMS
R15:If μδRisM, μδGisM, μδBisHthenμSisSS
R16:If μδRisM, μδGisH, μδBisLthenμSisMS
R17:If μδRisM, μδGisH, μδBisMthenμSisSS
R18:If μδRisM, μδGisH, μδBisHthenμSisNS
R19:If μδRisH, μδGisL, μδBisLthenμSisQS
R20:If μδRisH, μδGisL, μδBisMthenμSisMS
R21:If μδRisH, μδGisL, μδBisHthenμSisSS
R22:If μδRisH, μδGisM, μδBisLthenμSisMS
R23:If μδRisH, μδGisM, μδBisMthenμSisSS
R24:If μδRisH, μδGisM, μδBisHthenμSisNS
R25:If μδRisH, μδGisH, μδBisLthenμSisSS
R26:If μδRisH, μδGisH, μδBisMthenμSisNS
R27:If μδRisH, μδGisH, μδBisHthenμSisNS
Fuzzy rules (Ashraf et al., 2018b). In the IT2 FLS, we used product -norm to perform the intersection operation (), such that the result of combining the input and antecedent are contained in the firing set given as Eq. (12):where we use Eq. (13) to compute. Eq. (14) gives the centroid of the IT2 FS.

Type-reduction and defuzzification

The output IT2 FS from the inference engine is transformed into T1 FS and crisp value through the process of type-reduction and defuzzification, respectively. The method used here is known as the Enhanced Karnik-Mendel (EKM) algorithm for type-reduction. The complete procedure of EKM algorithm (Mendel and Wu, 2010) is explained in Algorithm 2. We have included the salient points of the Algorithms 2 (a-b) as below: The centroid is the collection of all embedding T1 FSs in the IT2 FS as given in Eq. (15). We apply the EKM algorithm to calculate the left and right endpoints of the interval, and respectively. The equations to calculate them are given below as Eq. (16) and Eq. (17): Calculation for Calculation for Further, defuzzification produces a crisp output using the centroid method. This procedure of defuzzification uses the left centroid and the right centroid (Mendel and Wu, 2010). The final crisp output () is then obtained by taking a simple mean of and , as given below in Eq. (18):

Similarity evaluation

The IT2 FLS thus calculates the similarity value of every pair of pixels in the window, as may be seen in Figure 8 of the similarity network. The final result will be a similarity relation matrix that can be shown as
Figure 8

Similarity network1 (Demirci, 2007).

Similarity network1 (Demirci, 2007). In Eq. (19), represents a similarity relation matrix, with all the elements belonging to the interval . Therefore, we can calculate the similarity of every th pixel in the window to its neighboring pixels as follows: To calculate the similarity of the central pixel in the window, we use Eq. (20) as follows: In Eq. (21), is the similarity of a single pixel in the image to its immediate surrounding neighbor pixels. Hence, the whole process of IT2 FLS and calculation of is iterated for every pixel in the image. The final result of this will be a similarity matrix () that holds the similarity value corresponding to each pixel of the cover image.

Similarity threshold

In order to choose which pixel is used for embedding, we employ a similarity threshold () to generate an indicator matrix (), given as follows:where is the similarity threshold. The indicator matrix is a matrix of size whose values are either 1, if the corresponding value of the similarity matrix is higher than the threshold , or 0, if it less than . Embedding procedure Extracting procedure

Embedding procedure

In the embedding procedure of the proposed algorithm, we used the least significant bit (LSB) embedding procedure to hide the message. In the LSB method, the decimal pixel value is converted into the binary bit stream, and the last bits are then replaced with the bits of the secret message (Ker, 2005; Yang et al., 2008). The output of the LSB embedding procedure is a new bit stream which is then converted back into decimal. The pixel of the cover image is selected for embedding if its value is higher than the threshold. The whole procedure is repeated for every pixel of the cover image. The final output of the IT2 FLS-LSB steganographic method is the stego image. Algorithm 3 gives the complete embedding procedure.

Extracting procedure

In the extracting procedure, the indicator matrix () is used to find the location of the embedding pixels of the stego image. For every embedding pixel, the last bits from its LSB are extracted and combined. The output of this procedure is the hidden secret message. Algorithm 4 gives the complete extracting procedure.

Experimental simulations and comparative analysis

The experimental simulations are performed to show the integrity of the proposed IT2 FLS based similarity measure in image steganography. The experimental simulations are conducted in MATLAB and run on Intel(R) Xeon(R) processor with 16 GB of RAM (3.40 GHz, Windows 7, 64 bits). We have used a set of well-known images as dataset (Cheddad et al., 2010; Johnson and Katzenbeisser, 2000; Petitcolas et al., 1999). The perceptual transparency of the proposed algorithm is measured using different quality metrics. Since, the least significant bits (LSB) procedure is used to perform embedding (as discuss in Section 4.4), we have termed the proposed IT2 FLS based similarity measure for LSB embedding as IT2 FLS-LSB steganography scheme. Moreover, we have considered two more methods for evaluating the similarity of a pixel in an image as: (i) type-1 fuzzy logic system (T1 FLS) based similarity measure (Karakiş et al., 2015) and (ii) Euclidean distance based similarity measure (Demirci, 2007). Utilizing these two procedures for LSB embedding, we have develop and implemented two more methods, referred as, T1 FLS based similarity measures for least significant bits (T1FLS-LSB) steganographic method and Euclidean distance based similarity measures for least significant bit (SM-LSB) steganographic method. In T1 FLS-LSB method, the similarity relation matrix (as in Eq. (19)) is calculated by the T1 FLS where the MFs are the TI MFs. Mamdani-rules are used in the inference engine and centroid approach is applied to calculate the defuzzify similarity value of a window. The obtained similarity relation matrix is used to evaluate the similarity of a pixel (as in Eq. (21)) and, hence the indicator matrix (Eq. (22)) is generated via the threshold value. Finally, the embedding procedure, using Algorithm 3, is applied to obtain the stego image. For the SM-LSB method the distance between any two pixels is calculated by Euclidean nom as , where , and are three color components calculated by Eqs. (4), (5), and (6). Using the distance matrix, the similarity relation matrix (as in Eq. (19)) is calculated and the similarity of a pixel is obtained. Thus, the LSB embedding procedure is applied using indicator matrix to to obtain the stego image. Both of these approaches are used to perform steganography and the obtained results are compared with our proposed IT2 FLS-LSB scheme. In the following subsections, we have discussed about the image dataset which was taken to perform the experimental simulations and the quality matrices. All the three steganographic methods are applied on these images and the metrics are calculated. The obtained stego images and the results are shown and thoroughly compared. Finally, we have done a comparative analysis of the proposed approach with some existing and well-known steganographic methods.

Dataset and quality matrices

The performances of all three steganographic procedures evaluated by using ten standard gray-level cover images, namely Lena, Baboon, Jet, Barbara, Boat, Peppers, Earth from space, House, Sailboat, and Splash, each of size pixels, shown in Figure 9 (a)-(j). We chose the Lena image of size pixels shown in Figure 10, as the secret message.
Figure 9

Cover images: (a) Lena, (b) Baboon, (c) Jet, (d) Barbara, (e) Boat, (f) Peppers, (g) Earth from space, (h) House, (i) Sailboat, (j) Splash.

Figure 10

Secret Message: (Gray-scale Lena image of size pixels).

Cover images: (a) Lena, (b) Baboon, (c) Jet, (d) Barbara, (e) Boat, (f) Peppers, (g) Earth from space, (h) House, (i) Sailboat, (j) Splash. Secret Message: (Gray-scale Lena image of size pixels). To measure the perceptual transparency of the proposed steganographic procedure, we have used three quality matrices, namely, PSNR, SSIM, and UQI (Subhedar and Mankar, 2014). The mathematical formulae for calculating the aforementioned measures are given below: The PSNR compares the cover and stego images to test the effect of embedding, defined as follows: In Eq. (23), MSE is the mean square error and it is calculated as follows using Eq. (24):where and are the dimensions of the images; and are the cover and the stego images respectively. The higher the values of PSNR, better the quality of the stego image. The lowermost PSNR value for an acceptable image steganographic method is 32 dB (Cheddad et al., 2010). SSIM measures the similarity between the cover and the stego images. However, UQI measures the distortion between the cover and the stego images. They are defined as: If is considered to be the original image and to be the stego image, then SSIM and the UQI are defined as Eq. (25) and Eq. (26), respectively:where, are the constants; and are the mean, and are the variance of and , and is the covariance between and . The values of the SSIM and UQI measures lie within the range , with 0 indicating poor quality, while 1 indicating excellent quality.

Results and comparisons

For better study of the proposed steganographic method, we took different number of bits () to embed into the LSBs of the selected pixels. Across all cover images, the number of bits are . This means, after calculating the similarity matrix using the IT2 FLS based similarity measure and converting the secret message into a bit stream, we embed bits of the secret message into the LSBs of the selected pixels. The same process is replicated for T1 FLS-LSB and SM-LSB procedures for the number of bits. In order to test the efficacy of the proposed steganographic method over T1 FLS-LSB and SM-LSB, we have chosen different thresholds (). As discussed previously, these thresholds are applied to the similarity matrices () to obtain the indicator matrices (). The matrix indicates the location of the pixels selected for embedding. For each , the matrix is also embedded in the cover image along with the secret message to help in the extraction process. Since, contains values in the range , we have arbitrarily chosen four different threshold values, . The interpretation of is that the similarity of that pixel is high, depicting a smooth or plain region of the image. Hence, that pixel is used for embedding. We perform the embedding procedure for each value of , i.e., corresponding to all values using IT2 FLS-LSB, T1 FLS-LSB and SM-LSB steganographic methods and the stego images are generated. The stego images for Lena, Baboon, Jet, Barbara, Boat, Peppers, Earth from space, House, Sailboat, and Splash cover images generated through the IT2 FLS-LSB for and are depicted in Figure 11 (a)-(j). For and , the quality metrics, i.e. PSNR, SSIM and UQI, comparing the visual transparency of the IT2 FLS-LSB, T1 FLS-LSB and SM-LSB steganographic methods for all the cover and stego images are shown in Table 2. For and , stego images for all cover images produced by the T1 FLS-LSB and SM-LSB steganographic methods are shown in Figures 12 (a)-(j) and 13 (a)-(j), respectively. From the Figures 11, 12, and 13, it can be observed that there are no much differences among the cover and stego images with respect to all three methods. A comparative plots, for and , of the quality metrics, i.e. PSNR, SSIM and UQI, comparing the visual transparency between the IT2 FLS-LSB, T1 FLS-LSB and SM-LSB methods for all the cover and stego images are depicted in Figures 14, 15 and 16, respectively. From Figs. 14 (a)–(d), we can observe that the PSNR values for the proposed IT2 FLS-LSB method are significantly high in compare to T1 FLS-LSB and SM-LSB methods for all images. Moreover, the number of bits for hiding the secret data within the pixels of images increases the value of PSNR deceases for all images. Though, the minimum values of PSNR are moderate high (approximately ), the differences between the cover and stego images will be negligible by the human eyes (Cheddad et al., 2010). Similarly, from Figures 15 (a)–(d) and 16 (a)-(d), we can see that SSIM and UQI values for the proposed IT2 FLS-LSB method are better in compare to T1 FLS-LSB and SM-LSB methods for almost all images. From the Table 2 and the Figures 14, 15, and 16, we observe that the achieved values of PSNR, SSIM and UQI are relatively higher for our proposed method compared to the other two. Thus we can see that the proposed IT2 FLS-LSB for steganography outperforms both T1 FLS-LSB and SM-LSB methods.
Figure 11

Stego images obtained via IT2 FLS-LSB scheme: (a) Lena, (b) Baboon, (c) Jet, (d) Barbara, (e) Boat, (f) Peppers, (g) Earth from space, (h) House, (i) Sailboat, (j) Splash.

Table 2

Quality matrices of SM-LSB, T1 FLS-LSB and proposed method for and

SM-LSBT1 FLS-LSBProposedSM-LSBT1 FLS -LSBProposedSM-LSBT1 FLS-LSBProposedSM-LSBT1 FLS-LSBProposed
LenaPSNR51.254151.400551.652645.333845.407045.669439.142539.156139.417833.310233.558534.8785
SSIM0.99820.99640.99640.99370.98620.98630.97690.94860.94920.92760.84350.8451
UQI0.99990.99990.99990.99970.99950.99950.99870.99800.99810.99620.99260.9929
BaboonPSNR51.380152.117054.642645.397246.136748.675439.143139.876642.421433.366334.113036.6535
SSIM0.99870.99880.99890.99510.99530.99590.98140.98190.98440.93820.94000.9488
UQI0.99990.99990.99990.99950.99960.99980.99800.99820.99900.99240.99350.9962
JetPSNR51.276451.412151.879045.266245.412745.872639.100339.238039.713833.252933.389933.8472
SSIM0.99550.99550.99560.98310.98310.98330.94040.94050.94130.82920.82920.8317
UQI0.99990.99990.99990.99950.99950.99960.99820.99820.99840.99330.99340.9940
BarbaraPSNR51.354351.819252.986145.362445.821147.003639.119939.581140.767733.285533.745234.8956
SSIM0.99730.99730.99740.98960.98960.99010.96140.96170.96350.88300.88430.8902
UQI0.99990.99990.99990.99970.99970.99980.99880.99890.99910.99530.99580.9967
BoatPSNR51.247451.424552.146345.217145.384646.128239.008939.195239.922733.183033.370134.0806
SSIM0.99630.99630.99640.98580.98580.98620.94890.94920.95040.85290.85380.8578
UQI0.99990.99990.99990.99960.99970.99970.99860.99870.99890.99480.99500.9957
PeppersPSNR51.266151.359051.564245.184545.266545.474538.916738.990039.197033.080333.155933.3626
SSIM0.99610.99620.99620.98320.98330.98340.94080.94090.94150.83100.83120.8330
UQI0.99990.99990.99990.99960.99960.99960.99840.99850.99850.99410.99420.9944
EarthPSNR51.183051.353851.672745.199745.373345.701838.957339.124239.443033.224733.406633.7280
SSIM0.99730.99730.99730.98950.98960.98980.96060.96080.96140.87460.87570.8780
UQI0.99980.99980.99980.99930.99930.99930.99710.99720.99740.98930.98970.9904
HousePSNR51.270451.689952.292245.300745.715446.314239.042539.461740.070633.246833.658834.2613
SSIM0.99680.99680.99690.98830.98850.98870.95800.95850.95940.87250.87440.8777
UQI0.99990.99990.99990.99970.99970.99970.99870.99880.99890.99500.99540.9959
SailboatPSNR51.315451.651452.237745.318545.664446.241039.095039.432340.017433.328033.661334.2622
SSIM0.99730.99740.99740.98980.99010.99020.96240.96290.96380.88350.88520.8884
UQI0.99990.99990.99990.99970.99970.99980.99890.99900.99910.99590.99620.9966
SplashPSNR51.254551.276151.365245.196045.226945.318438.947938.973639.067533.114333.134033.2288
SSIM0.99410.99410.99420.97560.97560.97580.91760.91760.91860.77940.77900.7803
UQI0.99990.99990.99990.99970.99970.99970.99870.99870.99870.99490.99500.9951
Figure 12

Stego images obtained via T1 FLS-LSB scheme: (a) Lena, (b) Baboon, (c) Jet, (d) Barbara, (e) Boat, (f) Peppers, (g) Earth from space, (h) House, (i) Sailboat, (j) Splash.

Figure 13

Stego images obtained via SM-LSB method: (a) Lena, (b) Baboon, (c) Jet, (d) Barbara, (e) Boat, (f) Peppers, (g) Earth from space, (h) House, (i) Sailboat, (j) Splash.

Figure 14

Comparison of PSNR of SM-LSB, T1 FLS-LSB and proposed methods for : (a) , (b) , (c) , (d) bits.

Figure 15

Comparison of SSIM of SM-LSB, T1 FLS-LSB and proposed methods for : (a) , (b) , (c) , (d) bits.

Figure 16

Comparison of UQI of SM-LSB, T1 FLS-LSB and proposed methods for : (a) , (b) , (c) , (d) bits.

Stego images obtained via IT2 FLS-LSB scheme: (a) Lena, (b) Baboon, (c) Jet, (d) Barbara, (e) Boat, (f) Peppers, (g) Earth from space, (h) House, (i) Sailboat, (j) Splash. Quality matrices of SM-LSB, T1 FLS-LSB and proposed method for and Stego images obtained via T1 FLS-LSB scheme: (a) Lena, (b) Baboon, (c) Jet, (d) Barbara, (e) Boat, (f) Peppers, (g) Earth from space, (h) House, (i) Sailboat, (j) Splash. Stego images obtained via SM-LSB method: (a) Lena, (b) Baboon, (c) Jet, (d) Barbara, (e) Boat, (f) Peppers, (g) Earth from space, (h) House, (i) Sailboat, (j) Splash. Comparison of PSNR of SM-LSB, T1 FLS-LSB and proposed methods for : (a) , (b) , (c) , (d) bits. Comparison of SSIM of SM-LSB, T1 FLS-LSB and proposed methods for : (a) , (b) , (c) , (d) bits. Comparison of UQI of SM-LSB, T1 FLS-LSB and proposed methods for : (a) , (b) , (c) , (d) bits. Results of PSNR, SSIM and UQI values corresponding to and , and for Lena, Baboon, Jet, Barbara, Boat, Peppers, Earth from space, House, Sailboat, and Splash cover images with IT2 FLS-LSB, T1 FLS-LSB and SM-LSB methods are given in Appendix A. The comparative plots for and , and corresponding to each quality metrics, i.e. PSNR, SSIM and UQI, comparing the visual transparency between the IT2 FLS-LSB, T1 FLS-LSB and SM-LSB methods for Lena, Baboon, Jet, Barbara, Boat, Peppers, Earth from space, House, Sailboat, and Splash images are depicted in Appendix B. The embedding capacity can be defined as the amount of secret data that is hidden into an image. It is the ratio of number of bits hidden to the total number of bits. The embedding capacities (in percentage (%)) of the proposed IT2 FLS-LSB, T1 FLS-LSB and SM-LSB steganographic methods are presented in Table 3. In Table 3, the percentage embedding capacities for corresponding to each threshold of the ten images used as the dataset are given. We have taken the average percentage embedding capacities across the ten images for each value of since, for each threshold, there are different amount of bits that are selected for embedding.
Table 3

Embedding capacity in percentage (%).

ThSM-LSB
T1 FLS-LSB
IT2 FLS-LSB
k=1k=2k=3k=4k=1k=2k=3k=4k=1k=2k=3k=4
0.7512.3824.7737.1649.5412.2624.5336.7949.0511.9623.9335.8947.86
0.7712.3424.6837.0249.3612.0724.1336.2048.2711.5423.0834.6346.17
0.8012.2224.4336.6448.8511.4922.9834.4845.979.9719.9429.9139.88
0.8112.1524.3136.4648.6211.2322.4633.6944.928.5517.1125.6634.21
Embedding capacity in percentage (%).

Comparison with other state of art stenographic schemes

In this section, we have compiled the similarity, differences, and some essential points of our proposed steganography scheme with other states of the art schemes. We have gone through many research works done in the past few decades on the image steganography. To the best of our knowledge, the IT2 FLS based steganographic method using the IT2 fuzzy rules and least significant bits (LSBs) has never appeared in the literature. For comparison, we have considered several research works that perform the embedding in the LSB domain of the cover image. Table 4 summaries the significant features of these prominent steganographic schemes (Amirtharajan and Balaguru Rayappan, 2012; Chan and Cheng, 2004; Sajasi and Eftekhari Moghadam, 2015; Wang et al., 2001), including the SM-LSB (Demirci, 2007), T1 FLS-LSB (Karakiş et al., 2015) and proposed IT 2FLS-LSB.
Table 4

Comparative overview of the state of the art steganographic schemes.

CoverStudiesMethodHiding data size (bits)Payload Capacity (%)PSNR (DB)
LenaWang et al. (Wang et al., 2001)GA + LSB.65,53625.0038.72
Chan et al. (Chan and Cheng, 2004)OPAP + LSB.1,31,07250.0040.72
Amritharajan et al. (Amirtharajan and Balaguru Rayappan, 2012)Chaotic approach + LSB.65,53625.0038.66
Sajasi et al. (Sajasi and Eftekhari Moghadam, 2015)NVF and Chaotic + LSB.81,92031.2544.48
Demirci (Demirci, 2007)SM + LSB1,96,60849.5445.33
Karakis (Karakiş et al., 2015)T1FLS + LSB.1,96,60849.0545.41
Proposed schemeIT2 FLS + LSB.1,96,60847.8645.67
BaboonWang et al. (Wang et al., 2001)GA + LSB.65,5360.2538.73
Chan et al. (Chan and Cheng, 2004)OPAP + LSB.1,31,07250.0040.72
Amritharajan et al. (Amirtharajan and Balaguru Rayappan, 2012)Chaotic approach + LSB.65,53625.0038.67
Sajasi et al. (Sajasi and Eftekhari Moghadam, 2015)NVF and Chaotic + LSB.81,92031.2547.66
Demirci (Demirci, 2007)SM + LSB1,96,60849.5445.40
Karakis (Karakiş et al., 2015)T1FLS + LSB.1,96,60849.0546.14
Proposed schemeIT2 FLS + LSB.1,96,60847.8648.68
JetWang et al. (Wang et al., 2001)GA + LSB.65,5360.2538.72
Chan et al. (Chan and Cheng, 2004)OPAP + LSB.1,31,07250.0040.72
Amritharajan et al. (Amirtharajan and Balaguru Rayappan, 2012)Chaotic approach + LSB.65,53625.0038.68
Demirci (Demirci, 2007)SM + LSB1,96,60849.5445.27
Karakis (Karakiş et al., 2015)T1FLS + LSB.1,96,60849.0545.41
Proposed schemeIT2 FLS + LSB.1,96,60847.8645.87
Comparative overview of the state of the art steganographic schemes. In Table 4, we have compared the hiding data size (bits), payload capacity (%) and PSNR (dB) for Lena, Baboon and Jet images that have been used in the different steganography schemes. A Genetic Algorithm (GA) based LSB steganographic scheme was developed by Wang et al. (2001). A secret data of 65,536 bits were embedded in cover images of size (). However, the payload capacity and PSNR values achieved by GA + LSB methods were inferior for all the Lena, Baboon and Jet images. Chan et al. (Chan and Cheng, 2004) proposed a steganographic scheme that performs the embedding by using the LSB method and utilized an optimal pixels adjustment procedure (OPAP) to reduce the distortion between the cover image and the stego image. The proposed approach was an extension of the simple LSB method (Wang et al., 2001) that could embed about 1,31, 608 bits and attain comparatively higher PSNR values () for the three images. Amirtharajan et al. (Amirtharajan and Balaguru Rayappan, 2012) proposed adaptive LSB embedding approach. They considered cover images of size , which was divided into blocks of () pixels and encrypted secret messages were embedded in each block. For k=3 bits, this scheme could insert about 65,536 bits and gave lower PSNR values of 38.66 dB, 38.67 dB and 38.68 dB corresponding to Lena, Baboon and Jet cover images. Sajasi et al. (Sajasi and Eftekhari Moghadam, 2015) proposed method produced high quality stego images PSNR values of 44.48 dB and 47.66 dB corresponding to Lena and Baboon, respectively though the payload capacity was 31.25%. For similarity measure based least significant bit (SM + LSB) method (Demirci, 2007), type-1 fuzzy logic based least significant bit (T1 FLS + LSB) method (Karakiş et al., 2015) and the proposed interval type-1 fuzzy logic based least significant bit (IT2 FLS + LSB) method, the secret data size that are embedded in the cover images are much higher in comparison to others. The PSNR values for all three images are highest for the proposed IT2 FLS + LSB method in contrast to other approaches.

Conclusion

This work proposed an interval type-2 fuzzy logic system (IT2 FLS) based least significant bit (LSB) steganographic method, termed as IT2 FLS-LSB method, to perform steganography in high similarity valued pixels of an image. The IT2 FLS assigns interval type-2 membership functions (IT2 MFs) to color differences between pixels, expressed as linguistic variables such as low, medium and high. The idea of going into higher order fuzzy logic is to achieve better models of uncertainty and in this case they can be applied in image steganographic systems. Based on a set of interval type-2 fuzzy rules, the Mamdani inference engine operates on the IT2 MFs to produce the interval type-2 fuzzy similarity between the pixels in the images. To show the efficacy of our proposed method, we have also developed type-1 fuzzy logic system (T1 FLS)-LSB and similarity measure (SM)-LSB steganographic methods which evaluate pixel similarity through TI FLS and Euclidean distance, respectively. Based on a set of threshold values, which discriminate the similarity values of a pixel as high for these three steganographic methods, depicting a smooth or plain region of the image, we have embedded for different numbers of bits in the LSBs of the pixels. The experiments are performed on a dataset consisting of ten cover images, namely Lena, Baboon, Jet, Barbara, Boat, Peppers, Earth from space, House, Sailboat, and Splash, and the corresponding stego images are obtained. The perceptual transparency and visual quality of the stego images were measured by using three quality index metrics: peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), and universal quality index (UQI). We observed that the proposed IT2 FLS-LSB steganographic method outperforms both T1 FLS-LSB and SM-LSB methods, as the achieved values of PSNR, SSIM and UQI are relatively higher while maintaining comparable payload capacities. Our future direction will be the extension of fuzzy bounded variation approach for the other higher order fuzzy sets like general type-2 fuzzy sets, interval type-2 fuzzy sets, and interval-valued-intuitionistic fuzzy sets, etc. Further, we will perform steganalysis on the proposed steganographic approach through the imperceptibility and robustness against different attacks. Moreover, instead of performing embedding in the spatial domain of the image, we may use transform domain techniques such as discrete wavelet transform, integer wavelet transform, and so on.

Declarations

Author contribution statement

Zubair Ashraf: Conceived and designed the experiments; Performed the experiments; Analyzed and interpreted the data; Contributed materials, analysis tools or data. Mukul Lata Roy: Conceived and designed the experiments; Performed the experiments; Analyzed and interpreted the data; Wrote the paper. Pranab K. Muhuri: Conceived and designed the experiments; Analyzed and interpreted the data; Contributed materials, analysis tools or data. Q. M. Danish Lohani: Conceived and designed the experiments; Analyzed and interpreted the data.

Funding statement

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Competing interest statement

The authors declare no conflict of interest.

Additional information

No additional information is available for this paper.
Algorithm 1

IT2 FLS based similarity measure

Input: Gray level image of size (H×W×3)
Output: Similarity matrix (SM)
1: For each H
2: For each W
3: Neighboring pixels of window (3×3)
4: For each window
5: Color differences (δR,δG,δB// Eqs. (4)-(6)
6: Assign IT2 MFs // Fuzzification
7: Inference-engine // Using Rules
8: Type-Reduction // EKM Algorithm
9: Defuzzification
10: End
11: Calculate Sa and SM
12: End
13: End
Algorithm 2(a)

Calculation for

 Set k=[N/2.4] (the nearest integer to N/2.4) and compute:
1. a=i=1kxiμ¯A˜(xi)+i=k+1kxiμ¯A˜(xi)
 b=i=1kμ¯A˜(xi)+i=k+1kμ¯A˜(xi)
2. Compute c'=a/b
3. Find k'[1,N1] such that xk'c'xk'+1
4. Check if k'=k. If yes, stop and set c'=cl(L), and k=L. If no, go to step 5.
 Compute s=sign(k'k) and
5. a'=a+si=min(k,k')+1max(k,k')xi[μ¯A˜(xi)μ¯A˜(xi)].
 b'=b+si=min(k,k')+1max(k,k')[μ¯A˜(xi)μ¯A˜(xi)]
6. Compute c''(k')=a'/b'
7. Set c'=c''(k'),a=a',b=b' and go to Step 2.
Algorithm 2(b)

Calculation for

 Set k=[N/1.7] (the nearest integer to N/1.7) and compute:
1. a=i=1kxiμ¯A˜(xi)+i=k+1kxiμ¯A˜(xi)
 b=i=1kμ¯A˜(xi)+i=k+1kμ¯A˜(xi)
2. Compute c'=a/b
3. Find k'[1,N1] such that xk'c'xk'+1
4. Check if k'=k. If yes, stop and set c'=cr(R), and k=R. If no, go to step 5.
 Compute s=sign(k'k) and
5. a'=asi=min(k,k')+1max(k,k')xi[μ¯A˜(xi)μ¯A˜(xi)].
 b'=bsi=min(k,k')+1max(k,k')[μ¯A˜(xi)μ¯A˜(xi)]
6. Compute c''(k')=a'/b'
7. Set c'=c''(k'),a=a',b=b' and go to Step 2.
Algorithm 3

Embedding procedure

Input: Cover image (C), indicator matrix (I), Number of bits (k), Secret message (m).
Output: Stego image
1: For each color level
2:  For each H // height of cover image
3:  For each W // width of cover image
4: IfI==1
5: Convert pixel value into binary bit stream
6: Replace k LSB bits with the m bits
8: Convert changed binary into new pixel value
9: Assign new pixel value to stego
10: End
11: End
12: End
13: End
Algorithm 4

Extracting procedure

Input: Stego image, Number of bits (k)
Output: Secret message (m).
1: For each color level
2: For each H // height of cover image
3: For each W // width of cover image
4: IfI==1
5: Convert pixel value into binary bit stream
6: Extract k LSB bits from binary pixel value
7: Combine all the extracted bits into m
8: End
9: End
10: End
11: End
  5 in total

1.  Voxel similarity measures for 3-D serial MR brain image registration.

Authors:  M Holden; D L Hill; E R Denton; J M Jarosz; T C Cox; T Rohlfing; J Goodey; D J Hawkes
Journal:  IEEE Trans Med Imaging       Date:  2000-02       Impact factor: 10.048

2.  A novel fuzzy logic-based image steganography method to ensure medical data security.

Authors:  R Karakış; I Güler; I Çapraz; E Bilir
Journal:  Comput Biol Med       Date:  2015-10-27       Impact factor: 4.589

3.  A new algorithm for distorted fingerprints matching based on normalized fuzzy similarity measure.

Authors:  Xinjian Chen; Jie Tian; Xin Yang
Journal:  IEEE Trans Image Process       Date:  2006-03       Impact factor: 10.856

Review 4.  Similarity-based categorization and fuzziness of natural categories.

Authors:  J A Hampton
Journal:  Cognition       Date:  1998-01

5.  Proximity judgments in color space: tests of a Euclidean color geometry.

Authors:  S M Wuerger; L T Maloney; J Krauskopf
Journal:  Vision Res       Date:  1995-03       Impact factor: 1.886

  5 in total
  1 in total

1.  Fuzzy proximity-based robust data hiding scheme with interval threshold.

Authors:  Prabhash Kumar Singh; Biswapati Jana; Kakali Datta
Journal:  Soft comput       Date:  2022-10-11       Impact factor: 3.732

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.