Steganography is the art of hiding secret data inside digital multimedia such as image, audio, text and video. It
plays a significant role in current trends for providing secure communication and guarantees accessibility of secret
information by authorised parties only. The Least-Significant Bit (LSB) approach is one of the important schemes in
steganography. The majority of LSB-based schemes suffer from several problems due to distortion in a limited payload
capacity for stego-image. In this paper, we have presented an alternative steganographic scheme that does not rely on cover
images as in existing schemes. Instead, the image which includes the secure hidden data is generated as an image of a curve.
This curve is resulted from a series of computation that is carried out over the mathematical chaotic fractal sets. The new
scheme aims at improving the data concealing capacity, since it achieves limitless concealing capacity and disposes of the
likelihood of the attackers to realise any secret information from the resulted stego-image. From the security side, the
proposed scheme enhances the level of security as the scheme depends on the exact matching between secret information and
the generated fractal (Mandelbrot-Julia) values. Accordingly, a key stream is created based on these matches. The proposed
scheme is evaluated and tested successfully from different perspectives.
[1] Ali A., Abd El-Hafeez T., Seddik A., and
Shaimaa M., “New Image Steganography
Method using Zero Order Hold Zooming,”
International Journal of Computer Applications,
vol. 133, no. 9, pp. 27-38, 2016.
[2] Alia M. and Samsudin A., “New Key Exchange
Protocol Based on Mandelbrot and Julia Fractal
Sets,” International Journal of Computer Science
and Network Security, vol. 7, no. 2, pp. 302-307,
2007.
[3] Alia M. and Yahya A., “Public-Key
Steganography Based on Matching Method,”
European Journal of Scientific Research, vol. 40,
no. 2, pp. 223-231, 2010.
[4] Alsarayreh M., Alia M., and Abu Maria K., “A
Novel Image Steganographic System Based on
Exact Matching Algorithm and Key-Dependent
Data Technique,” Journal of Theoretical and
Applied Information Technology, vol. 95, no. 5,
pp. 1212-1224, 2017.
[5] Dehare P. and Bonde P., “Hiding Image in Image
by using FMM with LSB Substitution in Image
Steganography,” International Journal of
Advance Research in Computer Science and
Management Studies, vol. 2, no. 11, pp. 455-458,
2014.
[6] Devaney R., Complex Dynamical Systems: The
Mathematics behind the Mandelbrot and Julia
Sets, American Mathematical Society, 1994.
[7] Faraoun K., “Chaos-Based Key Stream
Generator Based on Multiple Maps
Combinations and its Application to Images
Encryption,” The International Arab Journal of
Information Technology, vol. 7, no. 3, pp. 231-
240, 2010.
[8] Frame M. and Urry A., Fractal Worlds: Grown,
Built, and Imagined, Yale University Press,
Connecticut, 2016.
[9] Johnson N. and Jajodia S., “Exploring
Steganography: Seeing the Unseen,” IEEE
Computer, vol. 31, no. 2, pp. 26-34, 1998.
[10] Lazareck L., Verch G., and Peter J., “Fractals in
Circuits,” in Proceedings of Canadian
Conference on Electrical and Computer
Engineering, Toronto, pp. 589-594, 2001.
[11] Mandelbrot B., Fractal Geometry of Nature,
Times Books, 1982.
[12] Mohamed M. and Mohamed L., “High Capacity
Image Steganography Technique based on LSB
Substitution Method,” Applied Mathematics and
Information Sciences, vol. 10, no. 1, pp 259-266,
2016.
[13] Thenmozhi M. and Menakadevi T., “A New
Secure Image Steganography Using Lsb and
Spiht Based Compression Method,” International
Journal of Engineering Re-Search and Science,
vol. 2, no. 3, pp. 80-85, 2016.
Mohammad Alia is an Associate
professor at the computer
information systems department,
Faculty of science Computer and
information technology, Al
Zaytoonah University of Jordan. He
received the B.Sc. degree in Science
from the Al Zaytoonah University, Jordan, in 1999. He
obtained his Ph.D. degree in Computer Science from
University Science of Malaysia, in 2008. During 2000
until 2004, he worked at Al-Zaytoonah University of
Jordan as an instructor of Computer sciences and
Information Technology. Then, he worked as a lecturer
at Al-Quds University in Saudi Arabia from 2004 -
2005. Currently he is working as a Faculty Deputy
Dean and a Chair of Computer Information Systems
Dept. at Al Zaytoonah University of Jordan. His
research interests are in the field of Cryptography, and
Network security.
Khaled Suwais is an Associate
Professor at the Faculty of Computer
Studies, Arab Open University. He
received his B.Sc in computer
science from Al al-Bayt University,
Jordan in 2004, M.Sc and PhD in
computer science from University
Sains Malaysia, Malaysia in 2005 and 2009,
respectively. He joined the College of Computer
Science and Information at Al-Imam University,
Riyadh, Saudi Arabia, in 2009. In 2012, he joined the
Faculty of Computer Studies at the Arab Open
University. Dr. Suwais is specialized in the field of
information security and cryptography. Currently, he is
involved in reviewing several international journals
and conferences. His research interest includes:
cryptography, information security and operational
research.
Cite this
Mohammad Alia1 and Khaled Suwais2 1Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan, Jordan 2Faculty of Computer Studies, Arab Open University, Saudi Arabia, "Improved Steganography Scheme based on Fractal Set", The International Arab Journal of Information Technology (IAJIT) ,Volume 17, Number 01, pp. 128 - 136, January 2020, doi: 10.34028/iajit/17/1/15 .
@ARTICLE{2089,
author={Mohammad Alia1 and Khaled Suwais2 1Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan, Jordan 2Faculty of Computer Studies, Arab Open University, Saudi Arabia},
journal={The International Arab Journal of Information Technology (IAJIT)},
title={Improved Steganography Scheme based on Fractal Set},
volume={17},
number={01},
pages={128 - 136},
doi={10.34028/iajit/17/1/15 },
year={1970}
}
TY - JOUR
TI - Improved Steganography Scheme based on Fractal Set
T2 -
SP - 128
EP - 136
AU - Mohammad Alia1 and Khaled Suwais2 1Faculty of Sciences and Information Technology
AU - Al-Zaytoonah University of Jordan
AU - Jordan 2Faculty of Computer Studies
AU - Arab Open University
AU - Saudi Arabia
DO - 10.34028/iajit/17/1/15
JO - The International Arab Journal of Information Technology (IAJIT)
IS - 9
SN - 2413-9351
VO - 17
VL - 17
JA -
Y1 - Jan 1970
ER -
PY - 1970
Mohammad Alia1 and Khaled Suwais2 1Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan, Jordan 2Faculty of Computer Studies, Arab Open University, Saudi Arabia, " Improved Steganography Scheme based on Fractal Set", The International Arab Journal of Information Technology (IAJIT) ,Volume 17, Number 01, pp. 128 - 136, January 2020, doi: 10.34028/iajit/17/1/15 .
Abstract: Steganography is the art of hiding secret data inside digital multimedia such as image, audio, text and video. It
plays a significant role in current trends for providing secure communication and guarantees accessibility of secret
information by authorised parties only. The Least-Significant Bit (LSB) approach is one of the important schemes in
steganography. The majority of LSB-based schemes suffer from several problems due to distortion in a limited payload
capacity for stego-image. In this paper, we have presented an alternative steganographic scheme that does not rely on cover
images as in existing schemes. Instead, the image which includes the secure hidden data is generated as an image of a curve.
This curve is resulted from a series of computation that is carried out over the mathematical chaotic fractal sets. The new
scheme aims at improving the data concealing capacity, since it achieves limitless concealing capacity and disposes of the
likelihood of the attackers to realise any secret information from the resulted stego-image. From the security side, the
proposed scheme enhances the level of security as the scheme depends on the exact matching between secret information and
the generated fractal (Mandelbrot-Julia) values. Accordingly, a key stream is created based on these matches. The proposed
scheme is evaluated and tested successfully from different perspectives. URL: https://iajit.org/paper/2089
@ARTICLE{2089,
author={Mohammad Alia1 and Khaled Suwais2 1Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan, Jordan 2Faculty of Computer Studies, Arab Open University, Saudi Arabia},
journal={The International Arab Journal of Information Technology (IAJIT)},
title={Improved Steganography Scheme based on Fractal Set},
volume={17},
number={01},
pages={128 - 136},
doi={10.34028/iajit/17/1/15 },
year={1970}
,abstract={Steganography is the art of hiding secret data inside digital multimedia such as image, audio, text and video. It
plays a significant role in current trends for providing secure communication and guarantees accessibility of secret
information by authorised parties only. The Least-Significant Bit (LSB) approach is one of the important schemes in
steganography. The majority of LSB-based schemes suffer from several problems due to distortion in a limited payload
capacity for stego-image. In this paper, we have presented an alternative steganographic scheme that does not rely on cover
images as in existing schemes. Instead, the image which includes the secure hidden data is generated as an image of a curve.
This curve is resulted from a series of computation that is carried out over the mathematical chaotic fractal sets. The new
scheme aims at improving the data concealing capacity, since it achieves limitless concealing capacity and disposes of the
likelihood of the attackers to realise any secret information from the resulted stego-image. From the security side, the
proposed scheme enhances the level of security as the scheme depends on the exact matching between secret information and
the generated fractal (Mandelbrot-Julia) values. Accordingly, a key stream is created based on these matches. The proposed
scheme is evaluated and tested successfully from different perspectives.},
keywords={Steganography, data hiding, security, Julia set, Mandelbrot set, and fractal set},
ISSN={2413-9351},
month={Jan}}
TY - JOUR
TI - Improved Steganography Scheme based on Fractal Set
T2 -
SP - 128
EP - 136
AU - Mohammad Alia1 and Khaled Suwais2 1Faculty of Sciences and Information Technology
AU - Al-Zaytoonah University of Jordan
AU - Jordan 2Faculty of Computer Studies
AU - Arab Open University
AU - Saudi Arabia
DO - 10.34028/iajit/17/1/15
JO - The International Arab Journal of Information Technology (IAJIT)
IS - 9
SN - 2413-9351
VO - 17
VL - 17
JA -
Y1 - Jan 1970
ER -
PY - 1970
AB - Steganography is the art of hiding secret data inside digital multimedia such as image, audio, text and video. It
plays a significant role in current trends for providing secure communication and guarantees accessibility of secret
information by authorised parties only. The Least-Significant Bit (LSB) approach is one of the important schemes in
steganography. The majority of LSB-based schemes suffer from several problems due to distortion in a limited payload
capacity for stego-image. In this paper, we have presented an alternative steganographic scheme that does not rely on cover
images as in existing schemes. Instead, the image which includes the secure hidden data is generated as an image of a curve.
This curve is resulted from a series of computation that is carried out over the mathematical chaotic fractal sets. The new
scheme aims at improving the data concealing capacity, since it achieves limitless concealing capacity and disposes of the
likelihood of the attackers to realise any secret information from the resulted stego-image. From the security side, the
proposed scheme enhances the level of security as the scheme depends on the exact matching between secret information and
the generated fractal (Mandelbrot-Julia) values. Accordingly, a key stream is created based on these matches. The proposed
scheme is evaluated and tested successfully from different perspectives.