Chaos and Fractal-Based Information Hiding Techniques as Applied to Steganography

被引:0
作者
Ntaoulas, Nikolaos [1 ]
Drakopoulos, Vasileios [1 ]
机构
[1] Univ Thessaly, Dept Comp Sci & Biomed Informat, Lamia, Greece
来源
PERSPECTIVES IN DYNAMICAL SYSTEMS II-NUMERICAL AND ANALYTICAL APPROACHES, DSTA 2021 | 2024年 / 454卷
关键词
Fractals; Steganography; Chaos; Information hiding; ALGORITHM;
D O I
10.1007/978-3-031-56496-3_25
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Exploiting chaos and fractals is a field of great interest and has attracted a lot of attention in the last decades as far as steganography and cryptography are concerned. Their dynamic and sensitive properties lead to numerous applications; thus, research is gradually increasing through the years. The exploration of the field and the proposed applications found in bibliography, through an effort to classify directions and techniques, is the main purpose of this work. The wide spread of networking and vast amount of data circulating everyday through internet reveal both opportunities and dangers as far as security is concerned. The opportunity arising for steganography is obvious allowing to select different channels to transmit information hidden in various multimedia files. The most frequently used files are images, as transmission is daily thriving, while efficiently provide the properties required for hiding information. The main goals in steganography are explored, that is robustness, tamper resistance, hiding capacity and perceptual transparency, presenting the role fractals and chaos theory play.
引用
收藏
页码:387 / 401
页数:15
相关论文
共 53 条
[1]  
Alabaichi A., 2020, INT J ELECT COMPUTER, V10, P935, DOI DOI 10.11591/IJECE.V10I1.PP935-946
[2]   Improved Steganography Scheme based on Fractal Set [J].
Alia, Mohammad ;
Suwais, Khaled .
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (01) :128-136
[3]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[4]  
Anisimova ES, 2014, Collection of Scientific Works Sworld, V6, P69
[5]  
[Anonymous], 2006, 2006 IEEE REG 5 C IE, DOI DOI 10.1109/TPSD.2006.5507412
[6]  
[Anonymous], 2014, International Journal of Innovative Research in Computer and Communication Engineering
[7]   A cycling chaos-based cryptic-free algorithm for image steganography [J].
Aziz, Mahdi ;
Tayarani-N, Mohammad H. ;
Afsar, Mehdi .
NONLINEAR DYNAMICS, 2015, 80 (03) :1271-1290
[8]  
Bandyopadhyay D, 2014, INT J SECURITY PRIVA, V3, P11
[9]   Secret Sharing using 3 level DWT method of Image Steganography based on Lorenz Chaotic Encryption and Visual Cryptography [J].
Banik, Barnali Gupta ;
Bandyopadhyay, Samir Kumar .
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, :1147-1152
[10]  
Chang CC, 2005, AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, P83