Abstract
Information attacks are caused due to the weaknesses in the information security. These attacks affect the non-repudiation and integrity of the security services. In this paper, a novel security approach that can defend the message from information attacks is proposed. In this new approach the original message is encrypted by Fractal Sierpinski Gasket (FSG) cryptographic algorithm, that result is hidden into an image using penultimate and least significant bit (PLSB) embedding method. This method makes the security more robust than conventional approach. Important properties of fractals are sensitivity and self similarity. These can be exploited to produce avalanche effect. Stegoanalysis of the proposed method shows that it is resistant to various attacks and stronger than the existed steganographic approaches.
Similar content being viewed by others
References
Dr. Ch. Rupa, P.S. Avadhani, Information security using chains matrix multiplication, Advances in intelligent and soft computing, 167 (Springer, CSIA, 2012), 703–712
P.M. Rubesh Anand, I.G. Bajpa, V. Bhaskar, Real-time symmetric crypto graphy using quaternion julia set, Int J Comp Sci Network Security, 9(3), 20–26 (2009)
Yongge Wang, Yvo Desmedt, Perfectly secure message transmission revisited, IEEE transactions on informaiton theory, (2008), 54(6), 2582–2596
D.V. Popel, Sierpinski gaskets for logic functions representation multiple-valued logic (ISMVL, 2002)
R.L. Devaney, Measure topology and fractal geometry (1990), 65–75
M.A. Alia, A.B. Samsudin, Generalized scheme for fractal based digital signature (GFDS). IJCSNS International Journal of Computer Science and Network Security, 7(7) (July 2007)
J. Jessica Fridrich, Miroslav Goljan, On estimation of secret message length in LSB steganography in spatial domain, IEEE transactions (2004), 23–34
Christian Cachin, Jan Camenisch, Encrypting keys securely, IEEE Security & Privacy (2010), 66–69
C.M. Wang, N.I. Wu, C.S. Tsai, A high quality steganographic method with pixel-value differencing and modulus function (Elsevier, Journal of Systems and Software, 2008)
Min Wu, Data hiding in binary image for authentication and annotation, Multimedia, IEEE Transactions (2004), pp 528–538
M. Steven Bellovin, et al, Risking communications security: potential hazards of the protect America Act, Elsevier (2008), 6(1), 24–33
Chang-Chou Lin, Wen-Hsiang Tsai, Secret image sharing with steganography and authentication, J Systems Software (2004), 405–414
Sorina Dumitrescu, Xiaolin Wu, Nasir Memon, On steganalysis of random LSB embedding in continuous-tone images, IEEE International Conference on Image Process (2002), 641–644
Sean O’Melia, Adam J. Elbirt, Enhancing the performance of symmetric-key cryptography via instruction set extensions, IEEE Trans. VLSI Syst (2010), 18(11), 1505–1518
Rui Du, E. Larry Guthrie, Doug Buchy, Steganalysis with JPEG and GIF images, Springer (2004), 98–104
Andreas Westfeld, Andreas Pfitzmann, Attacks on stegano graphic systems, Proceedings of the 3rd international conference on information systems security by ACM (2007), 16–20
Sean O’Melia, Adam J. Elbirt, Enhancing the performance of symmetric-key cryptography via instruction set extensions, IEEE Trans. VLSI Syst (2008), 18(11), 1505–1518
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rupa, C. A Digital Image Steganography using Sierpinski Gasket Fractal and PLSB. J. Inst. Eng. India Ser. B 94, 147–151 (2013). https://doi.org/10.1007/s40031-013-0054-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40031-013-0054-z