Fractal steganography using artificially generated images

There exist a variety of fractal-based data hiding methods in an image. The main contribution of the previous work was to embed data by modifying the original, pre-existing image or embedding an encrypted datastream in an image. In this paper, we propose a fractal based approach for hiding sensitive information in a cover image (including artificially generated fractal images). The fractal parameters of the image are altered by the steganographic data while the image is generated. This results in an image that is generated with the data already hidden in it and not added after the fact. We show that the input parameters of the algorithm, such as the type of fractal and number of iterations, will serve as a simple encryption key for the hidden information. We also explain how the capacity of the image is affected by the variation of the parameters. Finally, we demonstrate that the proposed algorithms are immune to the commonly used steganographic detection algorithms.

[1]  Sung Shik Koh,et al.  Fractal image coding based on the accurate estimation of image paramters from noise image , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..

[2]  Michael Scott,et al.  Fractal Based Image Steganography , 1996, Information Hiding.

[3]  Christophe De Vleeschouwer,et al.  Watermarking algorithm based on a human visual model , 1998, Signal Process..

[4]  G. C. Langelaar,et al.  Watermarking digital image and video data , 2000 .

[5]  Franck Davoine,et al.  Using the fractal code to watermark images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  Chin-Chen Chang,et al.  A DCT-domain system for hiding fractal compressed images , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[7]  D. Levicky,et al.  Robust digital watermarking in color images , 2008, 2008 15th International Conference on Systems, Signals and Image Processing.

[8]  Arnaud E. Jacquin,et al.  Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..

[9]  Joan Puate,et al.  Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.

[10]  W. Tsai,et al.  Spatial-domain image hiding using image differencing , 2000 .

[11]  Shuenn-Shyang Wang,et al.  Digital Watermarking Using Fractal Image Coding , 2000 .

[12]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[13]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[14]  Brendt Wohlberg,et al.  A review of the fractal image coding literature , 1999, IEEE Trans. Image Process..

[15]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[16]  Zhou Jingli,et al.  A new still image watermark embedding algorithm based on fractal transformation , 2004, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004..

[17]  A. Jacquin Fractal image coding: a review , 1993, Proc. IEEE.

[18]  Chun-hung Li,et al.  A novel fractal watermarking technique , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.