Share Email Print

Proceedings Paper

Image steganography in fractal compression
Author(s): Mei-Ching Chen; Sos S. Agaian; C. L. Philip Chen; Benjamin M. Rodriguez
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

This paper proposes a steganographic scheme utilizing within and/or after fractal encoding procedures on images for data security. Fractal generation exploits the concepts of iterated function systems (IFS) consisting of a collection of contractive transformations. Fractal images make use of partitioned iterated function systems (PIFS) to determine self similarity within images along with approximating the original uncompressed image. The transformed coefficients are stored in a fractal code table in order to decode the image as an alternative to storing or transmitting image pixel values directly. The proposed steganographic algorithm conceals secret information in the contrast/scaling and brightness/shifting coefficients in the code table, resulting in a stego fractal code table. Using fractal transform as a means of steganography provides a new embedding domain other than the existing steganography tools. The advantages of using fractal compression for securing information within images are: no current fractal detection methods exist, the hidden information is disseminated throughout the image in the spatial domain, the capacity of the image can be increased, and the decoding of the stego table results in a visually undistorted image.

Paper Details

Date Published: 4 May 2009
PDF: 12 pages
Proc. SPIE 7351, Mobile Multimedia/Image Processing, Security, and Applications 2009, 73510Y (4 May 2009); doi: 10.1117/12.818976
Show Author Affiliations
Mei-Ching Chen, The Univ. of Texas at San Antonio (United States)
Sos S. Agaian, The Univ. of Texas at San Antonio (United States)
C. L. Philip Chen, The Univ. of Texas at San Antonio (United States)
Benjamin M. Rodriguez, The Johns Hopkins Univ. Applied Physics Lab. (United States)

Published in SPIE Proceedings Vol. 7351:
Mobile Multimedia/Image Processing, Security, and Applications 2009
Sos S. Agaian; Sabah A. Jassim, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?