A Steganography Scheme Based on Fractal Images

In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can extract secret information by comparing the difference between Stego-Images and Cover-Images recovered with the same initial parameters. The attackers can't recover the Cover-Images without initial parameters, then don't get secret information. On the other hand, the embedding and extracting are unsymmetrical, so the scheme has higher security and do well in resisting different steganalysis. Experiments show that the scheme has good imperceptibility and undetectability. The results of this paper have practical significance in extending the study of steganography.

[1]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[2]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[3]  Yang Yi-xian Research on the detecting algorithm of text document information hiding , 2004 .

[4]  Hideki Noda,et al.  High capacity and secure digital steganography to palette-based images , 2002, Proceedings. International Conference on Image Processing.

[5]  Min Wu,et al.  Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[6]  Kaliappan Gopalan Audio steganography by cepstrum modification , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[7]  Niu Xia-mu Information Hiding Technique Based on 2D Barcode , 2004 .

[8]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[9]  Hideki Noda,et al.  Application of BPCS steganography to wavelet compressed video , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[10]  Xingang You,et al.  A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[11]  Zhijun Wu,et al.  ABS-based speech information hiding approach , 2003 .

[12]  Yang Yi-xian Research on the Algorithm of Text Steganography , 2003 .

[13]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .