{"title":"分形隐写术使用人工生成的图像","authors":"S. Agaian, Johanna M. Susmilch","doi":"10.1117/12.777663","DOIUrl":null,"url":null,"abstract":"There exist a variety of fractal-based data hiding methods in an image. The main contribution of the previous work was to embed data by modifying the original, pre-existing image or embedding an encrypted datastream in an image. In this paper, we propose a fractal based approach for hiding sensitive information in a cover image (including artificially generated fractal images). The fractal parameters of the image are altered by the steganographic data while the image is generated. This results in an image that is generated with the data already hidden in it and not added after the fact. We show that the input parameters of the algorithm, such as the type of fractal and number of iterations, will serve as a simple encryption key for the hidden information. We also explain how the capacity of the image is affected by the variation of the parameters. Finally, we demonstrate that the proposed algorithms are immune to the commonly used steganographic detection algorithms.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Fractal steganography using artificially generated images\",\"authors\":\"S. Agaian, Johanna M. Susmilch\",\"doi\":\"10.1117/12.777663\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There exist a variety of fractal-based data hiding methods in an image. The main contribution of the previous work was to embed data by modifying the original, pre-existing image or embedding an encrypted datastream in an image. In this paper, we propose a fractal based approach for hiding sensitive information in a cover image (including artificially generated fractal images). The fractal parameters of the image are altered by the steganographic data while the image is generated. This results in an image that is generated with the data already hidden in it and not added after the fact. We show that the input parameters of the algorithm, such as the type of fractal and number of iterations, will serve as a simple encryption key for the hidden information. We also explain how the capacity of the image is affected by the variation of the parameters. Finally, we demonstrate that the proposed algorithms are immune to the commonly used steganographic detection algorithms.\",\"PeriodicalId\":385396,\"journal\":{\"name\":\"2006 IEEE Region 5 Conference\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 IEEE Region 5 Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.777663\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE Region 5 Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.777663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fractal steganography using artificially generated images
There exist a variety of fractal-based data hiding methods in an image. The main contribution of the previous work was to embed data by modifying the original, pre-existing image or embedding an encrypted datastream in an image. In this paper, we propose a fractal based approach for hiding sensitive information in a cover image (including artificially generated fractal images). The fractal parameters of the image are altered by the steganographic data while the image is generated. This results in an image that is generated with the data already hidden in it and not added after the fact. We show that the input parameters of the algorithm, such as the type of fractal and number of iterations, will serve as a simple encryption key for the hidden information. We also explain how the capacity of the image is affected by the variation of the parameters. Finally, we demonstrate that the proposed algorithms are immune to the commonly used steganographic detection algorithms.