Method of hidden transmission of information based on fractals and its software

被引:0
|
作者
Gasimov, Vagif A. [1 ]
Mammadov, Jabir, I [1 ]
Mammadzade, Nargiz F. [1 ]
机构
[1] Azerbaijan Tech Univ, Dept Comp Technol, Baku, Azerbaijan
关键词
hiding information; fractal; container; stego-key; stegoanalysis;
D O I
10.17223/19988605/65/10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article is considered hiding process of bits on least significant bits that make up the binary codes of confidential information with using fractal based stego-key. In order to increase resistance against stegoanalysis, it is proposed to use only a part of graphic images not all the pixels of the containers, but only a part determined by the appropriate rule. As a key-image file displaying a Mandelbrot and Julian fractal is used to determine positions of pixels for hiding secret information on least significant pixels of container. So after creation of fractal image as key file, border point of it is changed with according represented rule, then position of pixels is determined with obtained new positions to hiding information in least significant bits. The effectiveness of proposed method is studied with visual and statistical analysis, is verified by implementing it in the C# environment on examples of multiple containers and data files to be hidden.
引用
收藏
页码:95 / 104
页数:10
相关论文
共 50 条
  • [31] Feature Extraction Method for Hidden Information in Audio Streams Based on HM-EMD
    Lou, Jiu
    Xu, Zhongliang
    Zuo, Decheng
    Liu, Hongwei
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [32] The information security transmission method for intelligent examination based on ZigBee communication
    Xie H.
    Yang B.
    Ren Z.
    Mu K.
    Zhao X.
    Li B.
    International Journal of Information and Communication Technology, 2021, 19 (03) : 258 - 274
  • [33] Anti-tampering method of QR code hidden information based on deep learning
    Wang, Nan
    Zhang, Lina
    Jiang, Tian
    Shen, Tengfei
    SIGNAL IMAGE AND VIDEO PROCESSING, 2025, 19 (04)
  • [34] Communication information exchange and transmission method of industrial Internet of things based on audio information hiding
    Tian, Yinlei
    Wang, Haiyan
    WEB INTELLIGENCE, 2023, 21 (02) : 127 - 137
  • [35] An Information-Entropy-based Risk Measurement Method of Software Development Project
    Jiang, Rong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (05) : 1279 - 1301
  • [36] Analysis Method of App Software User Experience Based on Multisource Information Fusion
    Chen, Yongquan
    Jiang, Ying
    Liu, Haiyi
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2023, 19 (01)
  • [37] Active-connector-based software architecture and its description method
    Zhang, Jiachen
    Feng, Tie
    Chen, Wei
    Jin, Chunzhao
    2000, Chinese Acad Sci, China (11):
  • [38] The MIMO method for transmission of telecode information
    Slyusar V.I.
    Dubik A.N.
    Voloshko S.V.
    Radioelectron. Commun. Syst., 2007, 3 (161-167): : 161 - 167
  • [39] Object based software engineering with Hidden Sorted ECATNets and Hidden Labeled Rewriting Logic
    Bettaz, M
    ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2001, : 386 - 391
  • [40] Fragile Watermarking Based on Robust Hidden Information
    张新鹏
    王朔中
    Journal of Shanghai University, 2003, (03) : 261 - 264