A Steganography Scheme Based on Fractal Images

In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedd...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Huaxiong Zhang, Jie Hu, Gang Wang, Yu Zhang
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 31
container_issue
container_start_page 28
container_title
container_volume
creator Huaxiong Zhang
Jie Hu
Gang Wang
Yu Zhang
description In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can extract secret information by comparing the difference between Stego-Images and Cover-Images recovered with the same initial parameters. The attackers can't recover the Cover-Images without initial parameters, then don't get secret information. On the other hand, the embedding and extracting are unsymmetrical, so the scheme has higher security and do well in resisting different steganalysis. Experiments show that the scheme has good imperceptibility and undetectability. The results of this paper have practical significance in extending the study of steganography.
doi_str_mv 10.1109/ICNDC.2011.13
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6047100</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6047100</ieee_id><sourcerecordid>6047100</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-3966857918182a107a6544c621d5e6679436b863b21d36f5b9814764eb9fee0d3</originalsourceid><addsrcrecordid>eNotjs1OwkAURidREgFZunIzL9B67_zcmVliFW1CdAF7Mm1vSw0F0nbD24uR1ZecnJx8QjwhpIgQXvLs6y1LFSCmqO_EDI11Dgw4dS-mCskmJoQwEbM_JWhSRj2IxTD8AIBG74N3U5Eu5WbkJh5PTR_P-4vclHvuWL7GgSt5OspVH8sxHmTexYaHRzGp42HgxW3nYrt632afyfr7I8-W66QNMCY6EHnrAnr0KiK4SNaYkhRWlolcMJoKT7q4Ak21LYJH48hwEWpmqPRcPP9nW2benfu2i_1lR2AcXr__AgHcQYI</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Steganography Scheme Based on Fractal Images</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Huaxiong Zhang ; Jie Hu ; Gang Wang ; Yu Zhang</creator><creatorcontrib>Huaxiong Zhang ; Jie Hu ; Gang Wang ; Yu Zhang</creatorcontrib><description>In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can extract secret information by comparing the difference between Stego-Images and Cover-Images recovered with the same initial parameters. The attackers can't recover the Cover-Images without initial parameters, then don't get secret information. On the other hand, the embedding and extracting are unsymmetrical, so the scheme has higher security and do well in resisting different steganalysis. Experiments show that the scheme has good imperceptibility and undetectability. The results of this paper have practical significance in extending the study of steganography.</description><identifier>ISSN: 2165-4999</identifier><identifier>ISBN: 1457704072</identifier><identifier>ISBN: 9781457704079</identifier><identifier>DOI: 10.1109/ICNDC.2011.13</identifier><identifier>LCCN: 2011936242</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computational modeling ; Data mining ; Educational institutions ; Fractal images ; Fractals ; Image color analysis ; Julia Set ; Receivers ; Security ; Steganalysis ; Steganography</subject><ispartof>2011 Second International Conference on Networking and Distributed Computing, 2011, p.28-31</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6047100$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6047100$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Huaxiong Zhang</creatorcontrib><creatorcontrib>Jie Hu</creatorcontrib><creatorcontrib>Gang Wang</creatorcontrib><creatorcontrib>Yu Zhang</creatorcontrib><title>A Steganography Scheme Based on Fractal Images</title><title>2011 Second International Conference on Networking and Distributed Computing</title><addtitle>icndc</addtitle><description>In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can extract secret information by comparing the difference between Stego-Images and Cover-Images recovered with the same initial parameters. The attackers can't recover the Cover-Images without initial parameters, then don't get secret information. On the other hand, the embedding and extracting are unsymmetrical, so the scheme has higher security and do well in resisting different steganalysis. Experiments show that the scheme has good imperceptibility and undetectability. The results of this paper have practical significance in extending the study of steganography.</description><subject>Computational modeling</subject><subject>Data mining</subject><subject>Educational institutions</subject><subject>Fractal images</subject><subject>Fractals</subject><subject>Image color analysis</subject><subject>Julia Set</subject><subject>Receivers</subject><subject>Security</subject><subject>Steganalysis</subject><subject>Steganography</subject><issn>2165-4999</issn><isbn>1457704072</isbn><isbn>9781457704079</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjs1OwkAURidREgFZunIzL9B67_zcmVliFW1CdAF7Mm1vSw0F0nbD24uR1ZecnJx8QjwhpIgQXvLs6y1LFSCmqO_EDI11Dgw4dS-mCskmJoQwEbM_JWhSRj2IxTD8AIBG74N3U5Eu5WbkJh5PTR_P-4vclHvuWL7GgSt5OspVH8sxHmTexYaHRzGp42HgxW3nYrt632afyfr7I8-W66QNMCY6EHnrAnr0KiK4SNaYkhRWlolcMJoKT7q4Ak21LYJH48hwEWpmqPRcPP9nW2benfu2i_1lR2AcXr__AgHcQYI</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Huaxiong Zhang</creator><creator>Jie Hu</creator><creator>Gang Wang</creator><creator>Yu Zhang</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>A Steganography Scheme Based on Fractal Images</title><author>Huaxiong Zhang ; Jie Hu ; Gang Wang ; Yu Zhang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-3966857918182a107a6544c621d5e6679436b863b21d36f5b9814764eb9fee0d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computational modeling</topic><topic>Data mining</topic><topic>Educational institutions</topic><topic>Fractal images</topic><topic>Fractals</topic><topic>Image color analysis</topic><topic>Julia Set</topic><topic>Receivers</topic><topic>Security</topic><topic>Steganalysis</topic><topic>Steganography</topic><toplevel>online_resources</toplevel><creatorcontrib>Huaxiong Zhang</creatorcontrib><creatorcontrib>Jie Hu</creatorcontrib><creatorcontrib>Gang Wang</creatorcontrib><creatorcontrib>Yu Zhang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Huaxiong Zhang</au><au>Jie Hu</au><au>Gang Wang</au><au>Yu Zhang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Steganography Scheme Based on Fractal Images</atitle><btitle>2011 Second International Conference on Networking and Distributed Computing</btitle><stitle>icndc</stitle><date>2011-09</date><risdate>2011</risdate><spage>28</spage><epage>31</epage><pages>28-31</pages><issn>2165-4999</issn><isbn>1457704072</isbn><isbn>9781457704079</isbn><abstract>In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can extract secret information by comparing the difference between Stego-Images and Cover-Images recovered with the same initial parameters. The attackers can't recover the Cover-Images without initial parameters, then don't get secret information. On the other hand, the embedding and extracting are unsymmetrical, so the scheme has higher security and do well in resisting different steganalysis. Experiments show that the scheme has good imperceptibility and undetectability. The results of this paper have practical significance in extending the study of steganography.</abstract><pub>IEEE</pub><doi>10.1109/ICNDC.2011.13</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2165-4999
ispartof 2011 Second International Conference on Networking and Distributed Computing, 2011, p.28-31
issn 2165-4999
language eng
recordid cdi_ieee_primary_6047100
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computational modeling
Data mining
Educational institutions
Fractal images
Fractals
Image color analysis
Julia Set
Receivers
Security
Steganalysis
Steganography
title A Steganography Scheme Based on Fractal Images
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T00%3A52%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Steganography%20Scheme%20Based%20on%20Fractal%20Images&rft.btitle=2011%20Second%20International%20Conference%20on%20Networking%20and%20Distributed%20Computing&rft.au=Huaxiong%20Zhang&rft.date=2011-09&rft.spage=28&rft.epage=31&rft.pages=28-31&rft.issn=2165-4999&rft.isbn=1457704072&rft.isbn_list=9781457704079&rft_id=info:doi/10.1109/ICNDC.2011.13&rft_dat=%3Cieee_6IE%3E6047100%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6047100&rfr_iscdi=true