Image Visually Meaningful Cryptography Based on Julia Set Generating and Information Hiding
- 66 Downloads
Secret and private image security storage and fast transmission are a relatively concerned issue in the field of information security. In existed image encryption schemes, plain image is transformed to meaningless random noise signal which is vulnerable to attack with suspicion. Image visually meaningful cryptography (IVMC) based on information hiding is difficult to hide large size images because of limited hiding capacity. To solve this problem,a new IVMC based on Julia set images (JSI) generating and information hiding was proposed.In this solution, firstly, JSI are generated by utilizing Julia set generating parameters (JSGP) and specific pixel coloring scheme (SPCS), as keys, escape-time algorithm (ETA). Then the secret image or the encrypted secret image is embedded into JSI’s detail-rich small areas to form a beautiful stego-JSI, so as to achieve the purpose of IVMC. The receiver can use the same JSGP and SPCS keys to generate the same cover-JSI, which greatly facilitates the extraction and decryption of the encrypted image. Theoretical analysis and experimental results show that the proposed method has good artistic beauty, high hiding capacity, good imperceptibility, strong anti-compression performance and good anti-steganalysis ability, as well as large key space and good key sensitivity.
KeywordsImage encryption Image visually meaningful cryptography (IVMC) Information hiding Julia set
The work was supported by the Science and Technology Research Program of Chongqing Municipal Education Commission (Grant No. KJZD-K201801901).
- 1.Thomas, S.A., Gharge, S.: Review on various visual cryptography schemes. In: International Conference on Current Trends in Computer, Electrical, Electronics and Communication (ICCTCEEC 2017), pp. 1164–1167 (2017)Google Scholar
- 2.Zhang, H.X., Hu, J., Wang, G., et al.: A steganography scheme based on fractal images. In: Second International Conference on Networking and Distributed Computing, Beijing, China, pp. 28–31, September 2011Google Scholar
- 3.Mohammed, N.Q., Hussein, Q.M., Ahmed, M.S.: Suitability of using Julia set images as a cover for hiding information. In: Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology, NTCCIT 2018, pp. 71–74 (2018)Google Scholar
- 5.Su, X.H., Li, D., Hu, M.Z.: The resulting of the symmetric fractal art images with improved Newton-Raphson method. Chin. J. Comput. 22(11), 1147–1152 (1999)Google Scholar
- 9.Agaian, S.S., Susmilch, J.M.: Fractal steganography using artificially generated images. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 6982, pp. 312–317 (2008)Google Scholar
- 10.Patel, H.N., Khant, D.R., Prajapati, D.: Design of a color palette based image steganography algorithm for fractal images. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (IEEE WiSPNET 2017), pp. 2584–2589 (2017)Google Scholar