Advertisement

Fractal based image steganography

  • Paul Davern
  • Michael Scott
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1174)

Abstract

This paper describes a new and novel steganographic method for inserting secret information into image files. The method uses fractal image compression techniques in the production of these steganographic image files. The method allows a user to specify a visual key when hiding the secret information. The visual key must then be used when retrieving the hidden data. The paper describes enhancements to the method which may enable the steganographic data to survive through normal processing which reduces image quality. The method may therefore be used to insert copyright labels into image files.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    David Kahn, The Codebreakers, Macmillan Publishing, 1967Google Scholar
  2. 2.
    netcom.com,/pub/qwerty, FTP site for reviewed image based steganographic softwareGoogle Scholar
  3. 3.
    E. Koch, J. Zhao, Embedding Robust Labels into Images for Copyright Protection, Proc. of the International Congress on Intellectual Property Rights for Specialized Information, Vienna, Austria, Aug 1995Google Scholar
  4. 4.
    J. Brassil, S.Low, N. Maxemchuk, Electronic Marking and Identification Techniques to Discourage Document Copying, AT&T Bell Labs, Murray Hill, NJGoogle Scholar
  5. 5.
    E. Koch, J. Rindfrey, J. Zhao, Copyright Protection for Multimedia Data, Proceedings of the International Conference on Digital Media and Electronic Publishing, Dec 1994, Leeds UKGoogle Scholar
  6. 6.
    A. Choudhury, N. Maxemchuk, S. Paul, Copyright Protection for Electronic Publishing over Computer Networks, AT&T Bell Labs, June 1994Google Scholar
  7. 7.
    E. Koch, J. Zhao, Towards Robust and Hidden Image Copyright Labelling, Proc. of 1995 Workshop on Nonlinear Signal and Image Processing,Neos Marmaras, Greece, June, 1995Google Scholar
  8. 8.
    K. Matusi, K. Tanaka, Video Steganography: How to secretly embed a signature in a picture, IMA intellectual Property Project Proceedings, vol. 1, no. 1, 1994Google Scholar
  9. 9.
    M. Barnsley, Fractal Image Compression, AK Peters, 1-56881-000-8Google Scholar
  10. 10.
    M. Barnsley, Fractals Everywhere, Academic Press, 0-12-079061-0Google Scholar
  11. 11.
    H. Peitgen, D. Saupe, H. Jurgens, Springer Verlag, Fractals for the Class Room, New York, 1991Google Scholar
  12. 12.
    Y. Fisher, Fractal Image Compression Theory and Application, Springer-Verlag,0-387942114Google Scholar
  13. 13.
    Y. Fisher, E.W. Jacobs, Fractal Image Compression Using Iterated Transforms, NOSC Technical Report, Naval Ocean Systems Center, San Diego CA 92152-5000Google Scholar
  14. 14.
    Y. Fisher, Fractal Image Compression Theory and Application, Chapter 1, Springer-Verlag,0-387942114Google Scholar
  15. 15.
    Y. Fisher, E.W. Jacobs, Fractal Image Compression Using Iterated Transforms, NOSC Technical Report, Naval Ocean Systems Center, San Diego CA 92152-5000Google Scholar
  16. 16.
    Y. Fisher, Fractal Image Compression, SIGGRAPH'92 Course NotesGoogle Scholar
  17. 17.
    Y. Fisher, Fractal Image Compression Theory and Application, Chapter 1, Springer-Verlag,0-387942114Google Scholar
  18. 18.
    Y. Fisher, Fractal Image Compression Theory and Application, Chapter 1, Springer-Verlag,0-387942114Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • Paul Davern
    • 1
  • Michael Scott
    • 2
  1. 1.Dept of Computer ScienceCarlow Regional Techical CollegeCarlowIreland
  2. 2.Department of Computer ApplicationsDublin City UniversityGlasnevin

Personalised recommendations