2023 11th International Symposium on Digital Forensics and Security (ISDFS) 2023
DOI: 10.1109/isdfs58141.2023.10131727
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Logic-based Steganographic Scheme for high Payload Capacity with high Imperceptibility

Ingororano Théophile,
Ntivuguruzwa Jean De La Croix,
Tohari Ahmad
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 16 publications
0
0
0
Order By: Relevance
“…Fuzzy logic has found its primary practical application as process controllers in numerous fields, particularly Japan and Europe [18]. In recent applications, fuzzy logic has been widely applied in metaheuristic tasks [25], [26], regularizing the environment for smart agriculture [27], [28], covering preprocessing for enhanced payload capacity in steganographic applications [29], [30]. Unlike classical logic, which is based on sharp true-false differentiations, fuzzy logic aims to emulate human logic by performing representations in non-linear ways.…”
Section: Related Work a Fuzzy-based Edge Detection Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Fuzzy logic has found its primary practical application as process controllers in numerous fields, particularly Japan and Europe [18]. In recent applications, fuzzy logic has been widely applied in metaheuristic tasks [25], [26], regularizing the environment for smart agriculture [27], [28], covering preprocessing for enhanced payload capacity in steganographic applications [29], [30]. Unlike classical logic, which is based on sharp true-false differentiations, fuzzy logic aims to emulate human logic by performing representations in non-linear ways.…”
Section: Related Work a Fuzzy-based Edge Detection Algorithmsmentioning
confidence: 99%
“…The arrangement of the convolutional layers during this phase is as such: maintaining "same" padding and utilizing strides of (1,1). This setup utilizes 30 filters, the details of which are expounded upon later, and employs a 𝟑 × 𝑻𝒂𝒏𝑯 activation function mathematically expressed in (30).…”
Section: ) Preprocessing Partmentioning
confidence: 99%
“…Image steganography is a technique used in secret communication to hide confidential data within ordinary cover media such as images [1], video [2], audio [3], and text [4]. In digital images, the modified pixel values in stego images are subtly altered, making them difficult to discern from the original images [5][6][7][8]. With image steganalysis, the objective is to identify the traces of embedding or even attempt to recover the concealed information in a reverse steganography process [9], as illustrated in Fig.…”
Section: Introductionmentioning
confidence: 99%