Skip to main content
Log in

An adaptive fuzzy inference approach for color image steganography

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

This paper proposes an adaptive fuzzy inference approach for color image steganography, taking into account the influence of image complexity such as pixel similarity, pixel brightness and color sensitivity. A fuzzy inference system is designed as a classifier which adopts the features of the cover image as its crisp input values and produces semantic concepts corresponding to the payload of image sub-classes. Furthermore, least significant bit substitution is used to hide the data adaptively according to the output of fuzzy inference system and the human eye sensitivity to the R, G, B color components. A chaotic method and random sequence scrambling are applied to the secret message to generate the random sequence which prevents the secret message from attackers. The proposed method hides a large amount of data with good quality of stego-image from the human visual system and guarantees the confidentiality in the communication. Experimental results show better mean square error, peak signal-to-noise ratio, structural similarity and payload, verifying that the proposed method can yield better performance than some state-of-the-art works. The robustness of the method is tested by RS steganalysis and pixel difference histogram analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  • Al-Jbara HAG, Kiah LBM, Jalab HA (2012) Increased capacity of image based steganography using artificial neural network. AIP Conf Proc 1482:20–25

    Google Scholar 

  • Ashraf Z, Roy ML, Muhuri PK, Lohani QMD (2020) Interval type-2 fuzzy logic system based similarity evaluation for image steganography. Heliyon 6:e03771

    Google Scholar 

  • Aziz M, Tayarani-N MH, Afsar M (2015) A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dyn 80:1271–1290

    Google Scholar 

  • Bandyopadhyay D, Dasgupta K, Mandal JK, Dutta P, Snášel V (2014) A framework of secured and bio-inspired image steganography using chaotic encryption with genetic algorithm optimization (CEGAO). Springer, Berlin

    Google Scholar 

  • Bharati S, Rahman MA, Mandal S, Podder P (2018) Analysis of DWT, DCT, BFO & PBFO algorithm for the purpose of medical image watermarking. In: 2018 International Conference on Innovation in Engineering and Technology (ICIET), Dhaka, pp 1–6

  • Bharati S, Podder P, Mondal MRH (2020) Hybrid deep learning for detecting lung diseases from X-ray images. Inform Med Unlocked 20:100391

    Google Scholar 

  • Bharati S, Khan TZ, Podder P, Hung NQ (2021) A comparative analysis of image denoising problem: noise models, denoising filters and applications. In: Hassanien AE, Khamparia A, Gupta D, Shankar K, Slowik A (eds) Cognitive Internet of Medical Things for Smart Healthcare: Services and Applications. Springer, Cham, pp 49–66

    Google Scholar 

  • Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recognit 37:469–474

    MATH  Google Scholar 

  • Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752

    MATH  Google Scholar 

  • Chen PY, Lin HJ (2006) A dwt based approach for image steganography. Int J Appl Sci Eng 4:275–290

    Google Scholar 

  • Chen WJ, Chang CC, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301

    Google Scholar 

  • Chen WY (2008) Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. Appl Math Comput 196:40–54

    MathSciNet  MATH  Google Scholar 

  • Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, San Francisco

    Google Scholar 

  • Demirci R (2007) Similarity relation matrix-based color edge detection. AEU-Int J Electron Commun 61:469–477

    Google Scholar 

  • El-Emam NN, Al-Diabat M (2015) A novel algorithm for colour image steganography using a new intelligent technique based on three phases. Appl Soft Comput 37:830–846

    Google Scholar 

  • El-Emam NN, Al-Zubidy RAS (2013) New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J Syst Softw 86:1465–1481

    Google Scholar 

  • Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. IEEE Tranactionson Multimed 8:22–28

    Google Scholar 

  • Gaurav K, Ghanekar U (2018) Image steganography based on canny edge detection, dilation operator and hybrid coding. J Inf Secur Appl 41:41–51

    Google Scholar 

  • Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346:153–157

    MATH  Google Scholar 

  • Hayat AD, Ahmed AA (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306

    Google Scholar 

  • Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensics Secur 7:176–184

    Google Scholar 

  • Hussain M, Wahid A, Idris Y, Ho A, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66

    Google Scholar 

  • Jassim FA (2013) A novel steganography algorithm for hiding text in image using five modulus method. Int J Comput Appl 72:39–44

    Google Scholar 

  • Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326

    Google Scholar 

  • Kalita M, Tuithung T, Majumder S (2019) An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique. Cryptologia 43:414–437

    Google Scholar 

  • Kaur M, Juneja M (2017) Adaptive block based steganographic model with dynamic block estimation with fuzzy rules. Springer, Singapore

    Google Scholar 

  • Kawaguchi E, Eason RO (1999) Principles and applications of BPCS steganography. In: Tescher AG, Vasudev B, Bove VM, Derryberry B (eds) Multimed Syst Appl. SPIE, Bellingham, pp 464–473

    Google Scholar 

  • Khamparia A, Bharati S, Podder P, Gupta D, Khanna A, Phung TK, Thanh DNH (2021) Diagnosis of breast cancer based on modern mammography using hybrid transfer learning. Multidimens Syst Signal Process. https://doi.org/10.1007/s11045-020-00756-7

    Article  MATH  Google Scholar 

  • Koptyra K, Ogiela MR (2019) Multiply information coding and hiding using fuzzy vault. Soft Comput 23:4357–4366

    Google Scholar 

  • Kumar S, Singh A, Kumar M (2019) Information hiding with adaptive steganography based on novel fuzzy edge identification. Def Technol 15:162–169

    Google Scholar 

  • Laishram D, Tuithung T (2021) A novel minimal distortion-based edge adaptive image steganography scheme using local complexity. Multimed Tools Appl 80:831–854

    Google Scholar 

  • Lee YP, Lee JC, Chen WK, Chang KC, Su IJ, Chang CP (2012) High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf Sci 191:214–225

    Google Scholar 

  • Li J, Li X, Yang B (2013) Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation. Signal Process 93:2748–2758

    Google Scholar 

  • Martino FD, Loia V, Perfilieva I, Sessa S (2008) An image coding/decoding method based on direct and inverse fuzzy transforms. Int J Approx Reason 48:110–131

    MATH  Google Scholar 

  • Microchip G (2002) gm6010/gm6015 programming guide. Genesis Microchip Company, California US

    Google Scholar 

  • Muhammad K, Jan Z, Ahmad J, Khan Z (2015) An adaptive secret key-directed cryptographic scheme for secure transmission in wireless sensor networks. Tech J Univ Eng Technol Taxila 20:48–53

    Google Scholar 

  • Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multim Tools Appl 76:8597–8626

    Google Scholar 

  • Noda H, Niimi M, Kawaguchi E (2006) High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognit Lett 27:455–461

    Google Scholar 

  • Ou B, Li X, Zhao Y, Ni R (2015) Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding. Signal Process 108:642–657

    Google Scholar 

  • Pak C, Kim J, An K, Kim C, Kim K, Pak C (2020) A novel color image LSB steganography using improved 1D chaotic map. Multimed Tools Appl 79:1409–1425

    Google Scholar 

  • Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vision Comput 24:926–934

    Google Scholar 

  • Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. In: 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS). IEEE, Bangalore, pp 1–8

  • Sajasi S, Moghadam AME (2013) A high quality image steganography scheme based on fuzzy inference system. In: 2013 13th Iranian Conference on Fuzzy Systems (IFSC). IEEE, Qazvin, pp 1–6

  • Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: Dash S, Das S, Panigrahi B (eds) Int Conf Intell Comput Appl. Springer, Singapore, pp 119–129

    Google Scholar 

  • Sharp T (2001) An implementation of key-based digital signal steganography. In: International Workshop on Information Hiding. Springer, Berlin, pp 13–26

  • Sivanandam N, Sai S, Deepa SN (2007) Introduction to fuzzy logic using MATLAB. Springer, Berlin

    MATH  Google Scholar 

  • Swain G (2018) Adaptive and non-adaptive PVD steganography using overlapped pixel blocks. Arab J Sci Eng 43:7549–7562

    Google Scholar 

  • Swain G (2019) Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arab J Sci Eng 44:2995–3004

    Google Scholar 

  • Toony Z, Sajedi H, Jamzad M (2009) A high capacity image hiding method based on fuzzy image coding/decoding. In: 2009 14th International CSI Computer Conference. IEEE, Tehran, pp 518–523

  • Vanmathi C, Prabu S (2018) Image steganography using fuzzy logic and chaotic for large payload and high imperceptibility. Int J Fuzzy Syst 20:460–473

    Google Scholar 

  • Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recognit Lett 24:1613–1626

    MATH  Google Scholar 

  • Yuan YH (2016) Research on significance detection method based on RGB visual sensitivity. Dissertation, University of Shandong, in Chinese

Download references

Acknowledgements

This paper would like to thank the editors and the anonymous referees for their professional comments, which improved the quality of the manuscript. This work was supported in part by the National Natural Science Foundation of China (No. 11371130, 12071179), Soft science research program of Fujian Province (No. B19085), the project of Education Department of Fujian Province (No. JT180263), the Youth Innovation Fund of Xiamen City (3502Z20206020), the open fund of Key Laboratory of Applied Mathematics of Fujian Province University (Putian University) (No. SX201906) and Digital Fujian big data modeling and intelligent computing institute, Pre-Research Fund of Jimei University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jialiang Xie.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tang, L., Wu, D., Wang, H. et al. An adaptive fuzzy inference approach for color image steganography. Soft Comput 25, 10987–11004 (2021). https://doi.org/10.1007/s00500-021-05825-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-05825-y

Keywords

Navigation