An Advanced Image Encryption Method Based on Fuzzy Transform in Two Variables and Edge Detection

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-31 Number-1
Year of Publication : 2016
Authors : Pankaj Sambyal, Vivek Sambyal


Pankaj Sambyal, Vivek Sambyal "An Advanced Image Encryption Method Based on Fuzzy Transform in Two Variables and Edge Detection". International Journal of Computer Trends and Technology (IJCTT) V31(1):1-5, January 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
We live in a world full of things connected to each other in various complex ways. A great deal of our time goes in interacting with one of the most important such things – Images. The need for securing the relay of images over the less secure networks increases as is the need for the simplest of the tasks such as viewing or editing an image. Image steganography is the procedure of hiding a secure message in a cover image thus creating a stego image which can secure the message throughout its course of travel from the sender to the receiver. In the present paper, we propose an advanced image encryption algorithm based on fuzzy transform [1] in two variables. The two variables being the values of the two dimensions of the image. The idea is to preprocess the image to reduce the file size but keeping the quality intact by using the F-transform and edge detection technology, then embedding it in the cover image, thus producing a much robust stego image with the least deviations in CSV values [2].

[1] P. Hodakova, Fuzzy (F-) Transform of Functions of Two Variables and its Applications in Image Processing.
[2] Pankaj Sambyal "Study of HSV Color Space Deviations and Histograms in Image Steganography". International Journal of Computer Trends and Technology (IJCTT) V23(4):151- 154, May 2015. ISSN:2231-2803.
[3] M. Štěpnička,Fuzzy Transform and its Applications to Problems in Engineering Practice, University of Ostrava, Ostrava, 2008.
[4] PERFILIEVA, I. Fuzzy Transforms: Theory and Applications. In Fuzzy Sets and Systems. FSTA 2006, 2006, 157, pp.993-1023, ISSN 0165-0114. Download Research report 58.
[5] [2] PERFILIEVA, I.: VALÁŠEK, R. Fuzzy Transforms in Removing Noise. In: Reusch B. (Ed.) Computational Intelligence, Theory and Applications (Advances in Soft Computing). Berlin : Springer-Verlag, 2005. ISBN 3-540- 22807-1. pp. 225-234.
[6] [3] ŠTĚPNIČKA, M., VALÁŠEK, R. Fuzzy Transforms for Functions with Two Variables. In 6th Czech-Japan Seminar on Data Analysis and Decision Making under Uncertainty 2003. 2003-09-23-2003-09-23 Valtice, ČR. Ostrava : University of Ostrava, 2003. pp. 96-102.
[7] Tai W. and Chang C., (2009 ). ―Data hiding based On VQ Compressed Images Using Hamming Codes And Declustering, International Journal of Innovative Computing, Information and Control, Vol 5, No 7, ISSN 1349-4198.
[8] ZAMANI M . ,(2010) . ―Genetic Based Substitution techniques For Audio Steganography, PHD thesis , University Teknologi Malaysia.
[9] Malini Mohan and Anurenjan P.R (2011). ―A New Algorithm for Data Hiding in Images using Contourlet Transform, 978-1-4244- 9477- 4/11/ IEEE.
[10] Saeed Masaebi et al., (2012 ). ―A New Approach for Image Hiding Based on Contourlet Transform, International Journal of Electrical and Computer Engineering (IJECE) Vol.2, No.5, ISSN: 2088-8708 .
[11] Rubab S. and Younus M.,(2012), ―Improve Image Steganography Technique for Colored Images using Huffman Encoding with Symlet Wavelets, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1,ISSN (Online): 1694-0814.
[12] Chang C. et al., (2002) . ―A steganographic method based upon JPEG and quantization table modification, Intelligent Multimedia
[13] Computing and Networking Atlantic City, NJ, USA , Vol_ 141.
[14] YANG W. and CHEN L. ,(2008)." A Novel Steganography Method Via Various Animation Effects In Powerpoint Files ", Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, 12-15.
[15] Sudeep P.V. et al., (2009). ― A Novel DatahidingMethod in Spatial Domain, 10th National Conference on Technological Trends (NCTT09) . [11]Sarmah D. and Bajpai N. , (2010) .―Proposed System for Data Hiding Using Cryptography and Steganography ― ,International Journal of Computer Applications (0975 – 8887) Volume 8– No.9.
[16] Suma Christal Mary S.,(2010), ―Improved ProtectionIn Video Steganography Used Compressed Video Bitstreams, IJCSE)
[17] Khalil Ibraheem Al - Saif and Ahmed S. Abdullah, ―Color Image Enhancement Based on Contourlet―Transform Coefficients Australian Journal of Basic and Applied Sciences, 7(8): 207 213, 2013.
[18] Neil F. Johnson and Sushil Jajodia, ―Steganalysis: The Investigation of Hidden Information, IEEE Information Technology Conference, Syracuse, New York, USA, September 1st - 3rd, 1998.
[19] Sushil Kumar and S.K.Muttoo (2011), ―Steganography based on Contourlet Transform, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 6.

F-Transform, Steganography, Edge detection.