Skip to main content
Log in

A Digital Image Steganography using Sierpinski Gasket Fractal and PLSB

  • Original Contribution
  • Published:
Journal of The Institution of Engineers (India): Series B Aims and scope Submit manuscript

Abstract

Information attacks are caused due to the weaknesses in the information security. These attacks affect the non-repudiation and integrity of the security services. In this paper, a novel security approach that can defend the message from information attacks is proposed. In this new approach the original message is encrypted by Fractal Sierpinski Gasket (FSG) cryptographic algorithm, that result is hidden into an image using penultimate and least significant bit (PLSB) embedding method. This method makes the security more robust than conventional approach. Important properties of fractals are sensitivity and self similarity. These can be exploited to produce avalanche effect. Stegoanalysis of the proposed method shows that it is resistant to various attacks and stronger than the existed steganographic approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Dr. Ch. Rupa, P.S. Avadhani, Information security using chains matrix multiplication, Advances in intelligent and soft computing, 167 (Springer, CSIA, 2012), 703–712

  2. P.M. Rubesh Anand, I.G. Bajpa, V. Bhaskar, Real-time symmetric crypto graphy using quaternion julia set, Int J Comp Sci Network Security, 9(3), 20–26 (2009)

    Google Scholar 

  3. Yongge Wang, Yvo Desmedt, Perfectly secure message transmission revisited, IEEE transactions on informaiton theory, (2008), 54(6), 2582–2596

  4. D.V. Popel, Sierpinski gaskets for logic functions representation multiple-valued logic (ISMVL, 2002)

  5. R.L. Devaney, Measure topology and fractal geometry (1990), 65–75

  6. M.A. Alia, A.B. Samsudin, Generalized scheme for fractal based digital signature (GFDS). IJCSNS International Journal of Computer Science and Network Security, 7(7) (July 2007)

  7. J. Jessica Fridrich, Miroslav Goljan, On estimation of secret message length in LSB steganography in spatial domain, IEEE transactions (2004), 23–34

  8. Christian Cachin, Jan Camenisch, Encrypting keys securely, IEEE Security & Privacy (2010), 66–69

  9. C.M. Wang, N.I. Wu, C.S. Tsai, A high quality steganographic method with pixel-value differencing and modulus function (Elsevier, Journal of Systems and Software, 2008)

    Google Scholar 

  10. Min Wu, Data hiding in binary image for authentication and annotation, Multimedia, IEEE Transactions (2004), pp 528–538

  11. M. Steven Bellovin, et al, Risking communications security: potential hazards of the protect America Act, Elsevier (2008), 6(1), 24–33

  12. Chang-Chou Lin, Wen-Hsiang Tsai, Secret image sharing with steganography and authentication, J Systems Software (2004), 405–414

  13. Sorina Dumitrescu, Xiaolin Wu, Nasir Memon, On steganalysis of random LSB embedding in continuous-tone images, IEEE International Conference on Image Process (2002), 641–644

  14. Sean O’Melia, Adam J. Elbirt, Enhancing the performance of symmetric-key cryptography via instruction set extensions, IEEE Trans. VLSI Syst (2010), 18(11), 1505–1518

  15. Rui Du, E. Larry Guthrie, Doug Buchy, Steganalysis with JPEG and GIF images, Springer (2004), 98–104

  16. Andreas Westfeld, Andreas Pfitzmann, Attacks on stegano graphic systems, Proceedings of the 3rd international conference on information systems security by ACM (2007), 16–20

  17. Sean O’Melia, Adam J. Elbirt, Enhancing the performance of symmetric-key cryptography via instruction set extensions, IEEE Trans. VLSI Syst (2008), 18(11), 1505–1518

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ch. Rupa.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rupa, C. A Digital Image Steganography using Sierpinski Gasket Fractal and PLSB. J. Inst. Eng. India Ser. B 94, 147–151 (2013). https://doi.org/10.1007/s40031-013-0054-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40031-013-0054-z

Keywords

Navigation