Method of hidden transmission of information based on fractals and its software

被引:0
|
作者
Gasimov, Vagif A. [1 ]
Mammadov, Jabir, I [1 ]
Mammadzade, Nargiz F. [1 ]
机构
[1] Azerbaijan Tech Univ, Dept Comp Technol, Baku, Azerbaijan
关键词
hiding information; fractal; container; stego-key; stegoanalysis;
D O I
10.17223/19988605/65/10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article is considered hiding process of bits on least significant bits that make up the binary codes of confidential information with using fractal based stego-key. In order to increase resistance against stegoanalysis, it is proposed to use only a part of graphic images not all the pixels of the containers, but only a part determined by the appropriate rule. As a key-image file displaying a Mandelbrot and Julian fractal is used to determine positions of pixels for hiding secret information on least significant pixels of container. So after creation of fractal image as key file, border point of it is changed with according represented rule, then position of pixels is determined with obtained new positions to hiding information in least significant bits. The effectiveness of proposed method is studied with visual and statistical analysis, is verified by implementing it in the C# environment on examples of multiple containers and data files to be hidden.
引用
收藏
页码:95 / 104
页数:10
相关论文
共 50 条
  • [21] Lossy Information Transmission Method based on Semantic Computing Architecture
    Wang, Chuyan
    Qian, Liang
    Wei, Yichong
    Liu, Lingzhi
    PROCEEDINGS OF 2019 25TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2019, : 78 - 82
  • [22] Intelligent retrieval method of library document information based on hidden topic mining
    An, Yujie
    Yan, Yuwei
    WEB INTELLIGENCE, 2022, 20 (02) : 93 - 102
  • [23] The Hidden Information and Its Potential in Manufacturing Data
    Neat, Tom
    Ng, Felix
    ADVANCES IN MANUFACTURING TECHNOLOGY XXX, 2016, 3 : 3 - 3
  • [24] AN ANALYSIS OF A METHOD OF INFORMATION TRANSMISSION
    MOZZOCHI, CJ
    NOTICES OF THE AMERICAN MATHEMATICAL SOCIETY, 1970, 17 (01): : 292 - &
  • [25] A new software demodulation method for MSK signal based on phase information
    Shang, Junna
    ISSCAA 2006: 1st International Symposium on Systems and Control in Aerospace and Astronautics, Vols 1and 2, 2006, : 828 - 830
  • [26] A Software Requirement Analysis Method based on UML and its Application
    Lian Lixing
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 596 - 599
  • [27] Pre-Patch: Find Hidden Threats in Open Software Based on Machine Learning Method
    Yang, Mutian
    Wu, Jingzheng
    Ji, Shouling
    Luo, Tianyue
    Wu, Yanjun
    SERVICES - SERVICES 2018, 2018, 10975 : 48 - 65
  • [28] Method of Data Transmission for Penetration Information Based on Flexible Connecting Cable
    Li Shi-zhong
    Zhang Ya
    Zhang Xin-bin
    MECHATRONICS AND APPLIED MECHANICS II, PTS 1 AND 2, 2013, 300-301 : 649 - +
  • [29] An Improved Transformer Percentage Restraint Method Based on Transmission Line Information
    Zhang, Hao
    He, Jinghan
    Li, Bin
    Bo, Zhiqian
    2009 INTERNATIONAL CONFERENCE ON SUSTAINABLE POWER GENERATION AND SUPPLY, VOLS 1-4, 2009, : 58 - +
  • [30] A Security Information Transmission Method Based on DHR for Seafloor Observation Network
    Ying, Fei
    Zhao, Shengjie
    Wang, Jia
    SENSORS, 2024, 24 (04)