Abstract
Steganography is the art and science of secret communication where the message to be hidden is in an invisible form. The message to be transferred is hidden inside an image, known as cover. Once the message is hidden inside the image using a stego key, it becomes a stego image. We need to take care that inserting the secret message inside the cover does not produce any detectable artifacts. If any suspicion is raised our steganography fails. The information needs to be hidden inside the host image with minimal degradation of the host image. The information to be embedded inside the image can be in the form of text, image, audio or video. Generally, a large amount of data can be stored inside the cover. In this paper, we have selected a JPEG image as the cover. Selecting an appropriate cover decides the effectiveness of the steganographic technique. The cover selected should have the large variety of colors. The high-intensity pixel values are selected for hiding data as it is not easy for human eyes to make out the difference in small changes in RGB values. Newton’s fractal is chosen as the stego key to finding redundancy in a digital image and a secret message is embedded in it. The amendment of the host image must not raise any suspicion during transmission. The JPEG image is used to camouflage the information inside it.
R. Kawatra—Reserach Scholar, Banasthali Vidyapith.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Durvey, M.: A review paper on digital watermarking. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 3(4), 99–105 (2014). ISSN 2278-6856
Mamta, J., Parvinder, S.: A new approach for information security using and improved steganography technique. J. Inf. Process. Syst. 9(3), 405–424 (2013)
Petitcolas, F.A.: Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Boston, London (2000). ISBN 1-58053-035-4
Gupta, R., Singhal, A.: Importance and techniques of information hiding: a review. Int. J. Comput. Trends Technol. (IJCTT) 9(5), 260–265 (2014)
Sakakura, T., Hayashi, A.: A simple detection scheme of LSB steganography based on statistics of image difference signal. In: 2010 International Symposium on Information Theory and its Application, 17–20 October, pp. 320–325. IEEE (2010)
Eskandari, A.R.: A robust steganography method using adjustable parameters. Int. J. Electr. Comput. Eng. 3, 207–214 (2013)
Sadki, H.: A novel approach of amazigh text steganography based elliptic curve. Int. J. Inf. Netw. Secur. 3(2), 83–91 (2014)
Mandelbrot, B.B.: The Fractal Geometry of Nature. W. H. Freeman & Company, San Francisco (1982). ISBN 0-7167-1186-9
Li, Y., Wu, Y.: Create fractal graphics using Newton-overlapping method. J. Xi’an Univ. Sci. Technol. 26 (2005). ISSN 1672-9315
Abbas, T.A, Hamza, H.K.: Steganography using fractal images technique. IOSR J. Eng. (IOSRJEN) 4(2), 52–61 (2014). ISSN 2278-8719
Wu, Y., Noonan, J.P.: Image steganography scheme using chaos and fractals with the wavelet transform. Int. J. Innov. Manag. Technol. 3(3), 285–289 (2012)
Kumar, V., Muttoo, S.K.: A graph theoretic approach to sustainable steganography. MIS Rev.: Int. J. 17(1), 19–37 (2011)
Johnson, N., Jajodia, S.: Steganalysis: the investigation of hidden information. In: Proceedings of IEEE Information Technology Conference, New York, USA, 1st–3rd September 1998, pp. 113–116 (1998). ISBN 0-7803-5104-5
Hossain, M., Haque, S., Sharmin, F.: Variable rate steganography in gray scale digital images using neighborhood pixel information. Int. Arab. J. Inf. Technol. 7(1), 34–38 (2010)
Muttoo, S.K., Kumar, V.: Watermarking digital vector map using graph theoretic approach. Ann. GIS 18(2), 135–146 (2012)
Dunbar, B.: Steganographic techniques and their use in an open-systems environment. Sans Institute (2002)
Christersson, M. (2013). http://www.malinc.se/m/NewtonFractals.php
Maykh: Hiding text in Image file, coding in matlab (2015). http://www.instructables.com/id/Hide-data-in-an-Image-file-using-Matlab/step0/Hide-data-in-an-Image-file-using-Matlab
Madan, S., Kumar, V., Kawatra, R.: Curve approach to hide image based information in a digital cover. I-Manag. J. Inf. Technol. 5(4), 26–32 (2016)
Sharabyan, M., Ghorbani, H.: A new combined method with high security for digital images steganography based on imperialist competitive algorithm and symmetric encryption algorithm. Int. J. Res. Comput. Appl. Robot. 6(1), 1–12 (2018). ISSN 2320-7345
Cherma Rajan, A.: Hiding text in an image (2007). https://in.mathworks.com/matlabcentral/fileexchange/13698-hiding-multiple-text-pages-into-a-color-image/content/html/main.html
He, J.-H.: Fractal calculus and its geometrical explanation. Results Phys. 10, 272–276 (2018)
Zhang, Y., Jiang, J.: Research on embedding capacity and efficiency of information hiding based on digital images. Int. J. Intell. Sci. 3, 77–85 (2013)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kawatra, R., Kumar, V., Madan, S. (2020). Hiding Information Along Fractal in a Digital Cover to Improve Capacity. In: Singh, P., Panigrahi, B., Suryadevara, N., Sharma, S., Singh, A. (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, vol 605. Springer, Cham. https://doi.org/10.1007/978-3-030-30577-2_93
Download citation
DOI: https://doi.org/10.1007/978-3-030-30577-2_93
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30576-5
Online ISBN: 978-3-030-30577-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)