scispace - formally typeset
Journal ArticleDOI

High-quality steganography scheme using hybrid edge detector and Vernam algorithm based on hybrid fuzzy neural network

TLDR
A novel type of steganography strategy is proposed in which it uses the hybrid algorithm for higher security and a hybrid fuzzy neural network is utilized for the good quality of stego images.
Abstract
There has been a developing extension in the utilization of steganography, because of the advancement in utilizing web innovation and interactive media innovation. Subsequently, these days, the data are not made sure about adequately while transmitting it over the system. Data are the most significant resource for the current electronic communication framework. Thus the data security has played a significant job to give protection from unapproved people. Steganography is the technique that provides the solution for this challenge. This article proposes a novel type of steganography strategy in which it uses the hybrid algorithm for higher security and a hybrid fuzzy neural network is utilized for the good quality of stego images. For higher security, this article utilizes the Sobel and Kirsch edge identifier and then the Vernam algorithm utilized for encrypting the secret image. Thereafter this article utilizes the combination of fuzzy logic and neural network for enhancing the quality of stego images. There are various advantages of this technique that it can be utilized in various areas, for example, confidential data communication in the defense sector, medical, electronic governance, banking, communication, and so on.

read more

Citations
More filters

Enhancing security of images by Steganography and Cryptography techniques

TL;DR: For the evaluation of proposed technique, statistical tests like entropy, time analysis and peak to signal noise ratio (PSNR) with and without noises are performed which illustrate that the proposed technique provide better security to the transmitted image in wireless channel than the other techniques.
Journal ArticleDOI

A Novel Steganography Approach Using S-CycleGAN With an Improvement of Loss Function

TL;DR: In this paper , the authors proposed a colorization method to improve the appearance of the stego image by calculating the loss function, and the experimental results confirmed that the proposed method outperforms the existing methods (SGAN and CycleGAN) for information hiding with enhanced image transmission quality.
Journal ArticleDOI

Steganographic Method in Selected Areas of the Stego-Carrier in the Spatial Domain

TL;DR: In this article , the authors proposed a key-based steganographic system in which the ratio of capacity and image quality metrics that represents the stego object while reducing the detectability of hidden content was improved.
References
More filters
Journal ArticleDOI

Fast Discrete Curvelet Transforms

TL;DR: This paper describes two digital implementations of a new mathematical transform, namely, the second generation curvelet transform in two and three dimensions, based on unequally spaced fast Fourier transforms, while the second is based on the wrapping of specially selected Fourier samples.
Journal ArticleDOI

Neural-network-based fuzzy logic control and decision system

TL;DR: A general neural-network (connectionist) model for fuzzy logic control and decision systems is proposed, in the form of feedforward multilayer net, which avoids the rule-matching time of the inference engine in the traditional fuzzy logic system.
Journal ArticleDOI

Computer determination of the constituent structure of biological images.

TL;DR: A class of algorithms is described which enables computer quantized images to be decomposed into constituent reflecting the structure of the images, viewed as the morphological precursor to a higher level syntactic analysis.
Journal ArticleDOI

Reversible Data Hiding: Advances in the Past Two Decades

TL;DR: In this paper, the various RDH algorithms and researches have been classified into the following six categories: 1) RDH into image spatial domain; 2) RD h into image compressed domain (e.g., JPEG); 3) RDh suitable for image semi-fragile authentication; 4)RDH with image contrast enhancement; 5) RD H into encrypted images, which is expected to have wide application in the cloud computation; and 6) RDD into video and into audio.
Proceedings ArticleDOI

A classified and comparative study of edge detection algorithms

TL;DR: A new classification of most important and commonly used edge detection algorithms, namely ISEF, Canny, Marr-Hildreth, Sobel, Kirsch, Lapla1 and LaplA2 is introduced.