Abstract

Despite the fact that image interpolation is a well-established strategy in image processing, and many scholars have outlined numerous data hiding schemes based on it but current demand still has flaws. In this paper, a novel efficient reversible data hiding scheme has been developed after performing image interpolation by exploiting center folding with fuzzy weight strategy (FWS). The interpolated pixel values are obtained by considering the fuzzy weight of each pair of pixels in an selected image block. The fuzzy membership values of each input pixel pair has been regarded the range between minimum and maximum value of that block. The fuzzy output function feed into the input membership value and then the strength of the fuzzy rule has been calculated using Max–Min composite principle. After that, based on the strength of fuzzy rule, interpolated pixel value are computed from fuzzy output function through defuzzification process. In fact, fuzzy weight based interpolation algorithms produce virtual pixel, which is better than existing interpolation schemes. Then data hiding operation has been performed in each interpolated pixel through center folding strategy comparing with signal of secret data. If the signal of the secret data is different from the interpolated pixel, then the proposed scheme reverses the folded value to match the secret data for decreasing the image distortion between the interpolated image and the stego-image. At the receiver’s end, the secret data can be obtained based on the difference of the results of these interpolated values with center folding strategy (CFS). The proposed FWS achieved visual quality measured by PSNR 29.99 (dB) which is higher than existing image interpolations schemes. Furthermore, after embedding secret data through CFS we achieve PSNR0 33.40 (dB), PSNR1 33.45(dB) and PSNR2 48.012 (dB) for k=2 with embedding capacity 1.48 bpp which is more higher than state of the other methods. The experimental outcomes indicate that the proposed model is worthy to encode huge amount of secret bits with a enhanced visible quality, which can be anticipated by examining with existing ideas. The conveyed phenomenon emphasized some effective noble characteristics in the research area of hidden data communication for authentication, tampered detection without which today’s high-tech life stunts. This method gains exceptionally from many aspects of private, public or government sectors including education, economy, military and medical application.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call