A Steganography Scheme Based on Fractal Images
In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedd...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 31 |
---|---|
container_issue | |
container_start_page | 28 |
container_title | |
container_volume | |
creator | Huaxiong Zhang Jie Hu Gang Wang Yu Zhang |
description | In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can extract secret information by comparing the difference between Stego-Images and Cover-Images recovered with the same initial parameters. The attackers can't recover the Cover-Images without initial parameters, then don't get secret information. On the other hand, the embedding and extracting are unsymmetrical, so the scheme has higher security and do well in resisting different steganalysis. Experiments show that the scheme has good imperceptibility and undetectability. The results of this paper have practical significance in extending the study of steganography. |
doi_str_mv | 10.1109/ICNDC.2011.13 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6047100</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6047100</ieee_id><sourcerecordid>6047100</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-3966857918182a107a6544c621d5e6679436b863b21d36f5b9814764eb9fee0d3</originalsourceid><addsrcrecordid>eNotjs1OwkAURidREgFZunIzL9B67_zcmVliFW1CdAF7Mm1vSw0F0nbD24uR1ZecnJx8QjwhpIgQXvLs6y1LFSCmqO_EDI11Dgw4dS-mCskmJoQwEbM_JWhSRj2IxTD8AIBG74N3U5Eu5WbkJh5PTR_P-4vclHvuWL7GgSt5OspVH8sxHmTexYaHRzGp42HgxW3nYrt632afyfr7I8-W66QNMCY6EHnrAnr0KiK4SNaYkhRWlolcMJoKT7q4Ak21LYJH48hwEWpmqPRcPP9nW2benfu2i_1lR2AcXr__AgHcQYI</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Steganography Scheme Based on Fractal Images</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Huaxiong Zhang ; Jie Hu ; Gang Wang ; Yu Zhang</creator><creatorcontrib>Huaxiong Zhang ; Jie Hu ; Gang Wang ; Yu Zhang</creatorcontrib><description>In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can extract secret information by comparing the difference between Stego-Images and Cover-Images recovered with the same initial parameters. The attackers can't recover the Cover-Images without initial parameters, then don't get secret information. On the other hand, the embedding and extracting are unsymmetrical, so the scheme has higher security and do well in resisting different steganalysis. Experiments show that the scheme has good imperceptibility and undetectability. The results of this paper have practical significance in extending the study of steganography.</description><identifier>ISSN: 2165-4999</identifier><identifier>ISBN: 1457704072</identifier><identifier>ISBN: 9781457704079</identifier><identifier>DOI: 10.1109/ICNDC.2011.13</identifier><identifier>LCCN: 2011936242</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computational modeling ; Data mining ; Educational institutions ; Fractal images ; Fractals ; Image color analysis ; Julia Set ; Receivers ; Security ; Steganalysis ; Steganography</subject><ispartof>2011 Second International Conference on Networking and Distributed Computing, 2011, p.28-31</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6047100$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6047100$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Huaxiong Zhang</creatorcontrib><creatorcontrib>Jie Hu</creatorcontrib><creatorcontrib>Gang Wang</creatorcontrib><creatorcontrib>Yu Zhang</creatorcontrib><title>A Steganography Scheme Based on Fractal Images</title><title>2011 Second International Conference on Networking and Distributed Computing</title><addtitle>icndc</addtitle><description>In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can extract secret information by comparing the difference between Stego-Images and Cover-Images recovered with the same initial parameters. The attackers can't recover the Cover-Images without initial parameters, then don't get secret information. On the other hand, the embedding and extracting are unsymmetrical, so the scheme has higher security and do well in resisting different steganalysis. Experiments show that the scheme has good imperceptibility and undetectability. The results of this paper have practical significance in extending the study of steganography.</description><subject>Computational modeling</subject><subject>Data mining</subject><subject>Educational institutions</subject><subject>Fractal images</subject><subject>Fractals</subject><subject>Image color analysis</subject><subject>Julia Set</subject><subject>Receivers</subject><subject>Security</subject><subject>Steganalysis</subject><subject>Steganography</subject><issn>2165-4999</issn><isbn>1457704072</isbn><isbn>9781457704079</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjs1OwkAURidREgFZunIzL9B67_zcmVliFW1CdAF7Mm1vSw0F0nbD24uR1ZecnJx8QjwhpIgQXvLs6y1LFSCmqO_EDI11Dgw4dS-mCskmJoQwEbM_JWhSRj2IxTD8AIBG74N3U5Eu5WbkJh5PTR_P-4vclHvuWL7GgSt5OspVH8sxHmTexYaHRzGp42HgxW3nYrt632afyfr7I8-W66QNMCY6EHnrAnr0KiK4SNaYkhRWlolcMJoKT7q4Ak21LYJH48hwEWpmqPRcPP9nW2benfu2i_1lR2AcXr__AgHcQYI</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Huaxiong Zhang</creator><creator>Jie Hu</creator><creator>Gang Wang</creator><creator>Yu Zhang</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>A Steganography Scheme Based on Fractal Images</title><author>Huaxiong Zhang ; Jie Hu ; Gang Wang ; Yu Zhang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-3966857918182a107a6544c621d5e6679436b863b21d36f5b9814764eb9fee0d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computational modeling</topic><topic>Data mining</topic><topic>Educational institutions</topic><topic>Fractal images</topic><topic>Fractals</topic><topic>Image color analysis</topic><topic>Julia Set</topic><topic>Receivers</topic><topic>Security</topic><topic>Steganalysis</topic><topic>Steganography</topic><toplevel>online_resources</toplevel><creatorcontrib>Huaxiong Zhang</creatorcontrib><creatorcontrib>Jie Hu</creatorcontrib><creatorcontrib>Gang Wang</creatorcontrib><creatorcontrib>Yu Zhang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Huaxiong Zhang</au><au>Jie Hu</au><au>Gang Wang</au><au>Yu Zhang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Steganography Scheme Based on Fractal Images</atitle><btitle>2011 Second International Conference on Networking and Distributed Computing</btitle><stitle>icndc</stitle><date>2011-09</date><risdate>2011</risdate><spage>28</spage><epage>31</epage><pages>28-31</pages><issn>2165-4999</issn><isbn>1457704072</isbn><isbn>9781457704079</isbn><abstract>In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can extract secret information by comparing the difference between Stego-Images and Cover-Images recovered with the same initial parameters. The attackers can't recover the Cover-Images without initial parameters, then don't get secret information. On the other hand, the embedding and extracting are unsymmetrical, so the scheme has higher security and do well in resisting different steganalysis. Experiments show that the scheme has good imperceptibility and undetectability. The results of this paper have practical significance in extending the study of steganography.</abstract><pub>IEEE</pub><doi>10.1109/ICNDC.2011.13</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2165-4999 |
ispartof | 2011 Second International Conference on Networking and Distributed Computing, 2011, p.28-31 |
issn | 2165-4999 |
language | eng |
recordid | cdi_ieee_primary_6047100 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computational modeling Data mining Educational institutions Fractal images Fractals Image color analysis Julia Set Receivers Security Steganalysis Steganography |
title | A Steganography Scheme Based on Fractal Images |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T00%3A52%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Steganography%20Scheme%20Based%20on%20Fractal%20Images&rft.btitle=2011%20Second%20International%20Conference%20on%20Networking%20and%20Distributed%20Computing&rft.au=Huaxiong%20Zhang&rft.date=2011-09&rft.spage=28&rft.epage=31&rft.pages=28-31&rft.issn=2165-4999&rft.isbn=1457704072&rft.isbn_list=9781457704079&rft_id=info:doi/10.1109/ICNDC.2011.13&rft_dat=%3Cieee_6IE%3E6047100%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6047100&rfr_iscdi=true |