TY - JOUR
T1 - Utilizing fuzzy logic in developing reversible data hiding method
AU - Amrulloh, Mohammad Muzayyin
AU - Ahmad, Tohari
N1 - Publisher Copyright:
© 2020, Intelligent Network and Systems Society.
PY - 2020/10/1
Y1 - 2020/10/1
N2 - The development of information technology has brought an avoidable consequence for data security. It is because data, specifically those are private or confidential, are vulnerable to illegal access. Therefore, a protection method, such as data hiding, is essential. This protection is done by inserting a secret message (payload) into a medium (cover). One of the media commonly used in this method is audio, where a payload is embedded in audio samples. Nevertheless, this common technique has several disadvantages, including the relatively small insertion space and the significant dissimilarity between stego-audio and its original audio cover. Moreover, there is a risk of payload that cannot be returned to the original file. To overcome these problems, we propose to employ the fuzzification stage in the fuzzy logic algorithm that the samples are grouped into five categories. The binary payload is evenly distributed to the available sample space, which previously was calculated by considering the total payload and the number of interpolated samples. In the case that space is not enough to carry the payload, it is dynamically increased. The results show an increase of about 48% in stego audio quality measured by the Peak Signal-to-Noise Ratio (PSNR). Moreover, the method is reversible, and the size of the sample space can be controlled to specific values.
AB - The development of information technology has brought an avoidable consequence for data security. It is because data, specifically those are private or confidential, are vulnerable to illegal access. Therefore, a protection method, such as data hiding, is essential. This protection is done by inserting a secret message (payload) into a medium (cover). One of the media commonly used in this method is audio, where a payload is embedded in audio samples. Nevertheless, this common technique has several disadvantages, including the relatively small insertion space and the significant dissimilarity between stego-audio and its original audio cover. Moreover, there is a risk of payload that cannot be returned to the original file. To overcome these problems, we propose to employ the fuzzification stage in the fuzzy logic algorithm that the samples are grouped into five categories. The binary payload is evenly distributed to the available sample space, which previously was calculated by considering the total payload and the number of interpolated samples. In the case that space is not enough to carry the payload, it is dynamically increased. The results show an increase of about 48% in stego audio quality measured by the Peak Signal-to-Noise Ratio (PSNR). Moreover, the method is reversible, and the size of the sample space can be controlled to specific values.
KW - Audio steganography
KW - Cybercrime
KW - Data hiding
KW - Fuzzy logic
KW - Network security
UR - http://www.scopus.com/inward/record.url?scp=85090386298&partnerID=8YFLogxK
U2 - 10.22266/ijies2020.1031.30
DO - 10.22266/ijies2020.1031.30
M3 - Article
AN - SCOPUS:85090386298
SN - 2185-310X
VL - 13
SP - 327
EP - 336
JO - International Journal of Intelligent Engineering and Systems
JF - International Journal of Intelligent Engineering and Systems
IS - 5
ER -