2020
DOI: 10.22266/ijies2020.1031.30
|View full text |Cite
|
Sign up to set email alerts
|

Utilizing Fuzzy Logic in Developing Reversible Data Hiding Method

Abstract: The development of information technology has brought an avoidable consequence for data security. It is because data, specifically those are private or confidential, are vulnerable to illegal access. Therefore, a protection method, such as data hiding, is essential. This protection is done by inserting a secret message (payload) into a medium (cover). One of the media commonly used in this method is audio, where a payload is embedded in audio samples. Nevertheless, this common technique has several disadvantag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…In addition to image objects, objects in the form of audio files are also used as storage media. The use of fuzzy logic in the insertion of audio files is also used to detect free space and help better spread [30].…”
Section: The Role Of Fuzzy In Steganographymentioning
confidence: 99%
“…In addition to image objects, objects in the form of audio files are also used as storage media. The use of fuzzy logic in the insertion of audio files is also used to detect free space and help better spread [30].…”
Section: The Role Of Fuzzy In Steganographymentioning
confidence: 99%
“…The embedding algorithm is used to conceal the confidential data in a cover media to produce a stego-media, which will be sent to the reception side, while the extracting algorithm is used to extract the confidential data from the stegomedia. The process of using a key in the embedding and extracting algorithms is optional to increase the level of security [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…A programming tool is needed which helps to have an easy development of process of fuzzy control, containing the choice to validate the outcomes as well to tune behaviour of system [6]. In order to achieve exactness in the experimental results, fuzzy logic is used by many of the researchers, few of them to mention in literature, in data security for embedding secret messages effectively in to the medium [7] where the fuzzification is used to predict the sample space, enhancement of medical images [8] where fuzzy logic is used by stretch membership function, for the solutions to regression and classification problems [9] where author used fuzzy methods to find solutions to issues of regression dependent linguistic learning of fuzzy approaches. There are many research works make use of fuzzy logic such as enhancement of medical images [10].…”
Section: Introductionmentioning
confidence: 99%