(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 3, 2018 155 | Page www.ijacsa.thesai.org Computerized Steganographic Technique using Fuzzy Logic Dr. Abdulrahman Abdullah Alghamdi College of Computing and IT, Shaqra University, Kingdom of Saudi Arabia Abstract—Steganography is the method of providing Computer security in which hiding the required information is done by inserting messages within other messages, which is a string of characters containing the useful information, in a carrier image. Using this technique, the required information from the secret image is embedded into individual rows as well as columns present in the pixels of carrier image. In this paper, a novel fuzzy logic based technique is proposed to hide the secret message in individual rows and in individual columns of pixels of the carrier image and to extract the hidden message in the same carrier image. The fuzzification process transforms the image in to various bitplanes. Pixel number and Correlation Value is computed in the original image for hiding the secret information in to the original image. The pixel number and Correlation value is also used as the key for retrieving the embedded image from the receiver side. Pixel merging is done in the sender side by assigning a steganographic value of white and black pixels in original image based on the fuzzy rules by comparing the pixels present in the original and secret images. The information which is hided can be retrieved by using the same fuzzy rules. Experimental results show that the proposed method can hide and retrieve the secret and important messages in an image more effectively and accurately. Keywords—Computer security; fuzzy logic; carrier image; secret image; steganography; fuzzification; peak signal to noise ratio I. INTRODUCTION The method of hiding an information on a medium as image as is called as Steganography. Steganographic technique is done for the past decades with various enhancements in medium and in the secret images for providing the Computer Security. Information hidden in photographs or an image is more common recently [2], [3], [4]. In this case, the medium of information hiding is an image. An image can be defined as a function of two dimension coordinates f(x, y), where x and y represents the spatial co-ordinates, and f is called as its intensity [1]. In this method an image is considered to be a matrix of two dimension where each point represents its pixel which is the rows and columns. It also has a medium level of brightness. The increased use of multimedia data tends to do fast and convenient exchange of digital information throughout the Internet. With the simplicity of editing and reproduction of the content, the protection of possession for materials of digital audio, video and image video become an important topic of research. In this proposed method, a text which is present in an image is embedded into a gray image. This process can be done by using the fuzzy rule-based region merging. The embedded text can be retrieved easily only by the receiver who knows the defuzzification process. The main importance of this proposed methodology is that it can be used easily by any end user. This methodology solely concentrates on steganography based on an image which is most widely used because of its capacity of carrying hidden data is higher and hence it is very difficult to find a steganographic data from a normal digital image. The salient features of the proposed Steganographic technique are: 1) It is a completely automatic and an unsupervised method. 2) No assumption is made prior about the type and contents of images which is given as input. 3) This method has a novel information hiding process which is based on fuzzy logic for merging pixels of the carrier image and the secret information present in another image. 4) This method is robust in information hiding since this method incorporates of Fuzzy Logic with region merging. II. LITERATURE SURVEY Many techniques of steganography were proposed by recent researchers [5]-[6], [8]-[10], [11]-[15], [18]. In this paper, various steganography techniques which are based on fuzzy based techniques have only been discussed. Khursheed and Mir in [16], [17] applied the methodologies based on fuzzy logic for hiding information in another data. In their method, they tried to embed the information in a domain based on fuzzy logic. The advantages are lower computationally expense when it is compared to existing domain transformation methods. Their method provides embedding versatility and safety from common cover attacks, as well as appropriate imperceptibility and payload capacity. However, the secret data is sensitive in nature and it is easy to be destroyed by making a small change in the overall cover and by changing without any particular visibility. Toony et al. [19] proposed a new image hiding method. In their method, a secret information as image is hidden by using a fuzzy based coding and decoding technique. A fuzzy coder compresses each and every block which is there in the form of secret information into a smaller block and utilizes model- based steganography for hiding the entire message towards a carrier image. This creates minimum distortion in the entire image which results in a quality stego image. Main advantage of their proposed methodology is it yields a higher rate in