CLASSIFICATION OF BIT-PLANE NOISE ON IMAGES USING FUZZY LOGIC
Abstract
BPCS (Bit-Plane Complexity Segmentation) is a fairly new steganography technique The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at how much of the change bits contained in a bit-plane. If the bit-plane, has a high complexity, the bi-plane is categorized as a bit-plane noise that does not contain valuable information on the image. Classification bit-plane using the set cripst set (noise/not) is not fair, where a little difference of the value will significantly change the status of the bit-plane. This study attempts to apply the principles of fuzzy sets to classify the bit-plane into into three sets are informative, informative part, and the noise region. Classification bit-plane into a fuzzy set stretcher expected to classify the bit-plane is more objective and ultimately the capacity of images to the message can be improved by using the fuzzy inference mamdani to take decisions which bit-plane will be replaced with a message based on the classification of bit-plane and the size of the message that will be inserted.
Downloads
References
[2] N. Johnson and S. Jajodia, (Feb 1998): Exploring steganography: seeing the unseen, IEEE Computer, pp.26-34
[3] R.J. Anderson, F.A.P. Peticolas, (May 1998): On the Limits of Steganography, IEEE Journal of Selected Areas in communication
[4] Babu, K. S., Raja, K. B., Kiran, K. K., Manjula Devi, T. H., Venugopal, K. R., & Patnaik, L. M. (2008, 19- 21 Nov. 2008). Authentication of secret information in image Steganography. Paper presented at the TENCON 2008 - 2008.
IEEE Region 10 Conference.
[5] Hirohisa, H. 2002. A Data Embedding Method Using BPCS Principle With New Complexity Measures, Proceedings Pacific Rim Workshop on Digital Steganography 2002, vol. 3423, hal.30-47
[6] Hedieh, S., & Jamzad, M. (2008, 8-11 July 2008). Cover Selection Steganography Method Based on Similarity of Image Blocks. Paper presented at the Computer and Information Technology Workshops, 2008. CIT Workshops 2008.
IEEE 8th International Conference on.
[7] Klir, G.J., dan Yuan, B., 1995, Fuzzy Sets and Fuzzy Logic : Theory and Applications. Prentice Hall International Inc., Upper Saddle River, NJ 07458.
[8] Shi, P. dan Li, Z. 2010. An improved BPCS Steganography based on Dynamic Threshold. 2010 International Conference on Multimedia Information Networking and Security. vol.32, hal. 231-259.
[9] Srinivasan, Y. 2003. “High Capacity Data Hiding System Using BPCS Steganography”. Thesis. Texaz Tech University. Texas. Hal 20-25
Copyright in each article is the property of the author.
- The author acknowledges that the Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) has the right to publish for the first time with a Creative Commons Attribution 4.0 International License.
- The author can enter the writing separately, regulate the non-exculsive distribution of manuscripts that have been published in this journal into other versions (for example: sent to the author's institution respository, publication into books, etc.), by acknowledging that the manuscript was first published in the Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering);