The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Improved Steganography Scheme based on Fractal Set

Steganography is the art of hiding secret data inside digital multimedia such as image, audio, text and video. It plays a significant role in current trends for providing secure communication and guarantees accessibility of secret information by authorised parties only. The Least-Significant Bit (LSB) approach is one of the important schemes in steganography. The majority of LSB-based schemes suffer from several problems due to distortion in a limited payload capacity for stego-image. In this paper, we have presented an alternative steganographic scheme that does not rely on cover images as in existing schemes. Instead, the image which includes the secure hidden data is generated as an image of a curve. This curve is resulted from a series of computation that is carried out over the mathematical chaotic fractal sets. The new scheme aims at improving the data concealing capacity, since it achieves limitless concealing capacity and disposes of the likelihood of the attackers to realise any secret information from the resulted stego-image. From the security side, the proposed scheme enhances the level of security as the scheme depends on the exact matching between secret information and the generated fractal (Mandelbrot-Julia) values. Accordingly, a key stream is created based on these matches. The proposed scheme is evaluated and tested successfully from different perspectives.


[1] Ali A., Abd El-Hafeez T., Seddik A., and Shaimaa M., “New Image Steganography Method using Zero Order Hold Zooming,” International Journal of Computer Applications, vol. 133, no. 9, pp. 27-38, 2016.

[2] Alia M. and Samsudin A., “New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets,” International Journal of Computer Science and Network Security, vol. 7, no. 2, pp. 302-307, 2007.

[3] Alia M. and Yahya A., “Public-Key Steganography Based on Matching Method,” European Journal of Scientific Research, vol. 40, no. 2, pp. 223-231, 2010.

[4] Alsarayreh M., Alia M., and Abu Maria K., “A Novel Image Steganographic System Based on Exact Matching Algorithm and Key-Dependent Data Technique,” Journal of Theoretical and Applied Information Technology, vol. 95, no. 5, pp. 1212-1224, 2017.

[5] Dehare P. and Bonde P., “Hiding Image in Image by using FMM with LSB Substitution in Image Steganography,” International Journal of Advance Research in Computer Science and Management Studies, vol. 2, no. 11, pp. 455-458, 2014.

[6] Devaney R., Complex Dynamical Systems: The Mathematics behind the Mandelbrot and Julia Sets, American Mathematical Society, 1994.

[7] Faraoun K., “Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption,” The International Arab Journal of Information Technology, vol. 7, no. 3, pp. 231- 240, 2010.

[8] Frame M. and Urry A., Fractal Worlds: Grown, Built, and Imagined, Yale University Press, Connecticut, 2016.

[9] Johnson N. and Jajodia S., “Exploring Steganography: Seeing the Unseen,” IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998.

[10] Lazareck L., Verch G., and Peter J., “Fractals in Circuits,” in Proceedings of Canadian Conference on Electrical and Computer Engineering, Toronto, pp. 589-594, 2001.

[11] Mandelbrot B., Fractal Geometry of Nature, Times Books, 1982.

[12] Mohamed M. and Mohamed L., “High Capacity Image Steganography Technique based on LSB Substitution Method,” Applied Mathematics and Information Sciences, vol. 10, no. 1, pp 259-266, 2016.

[13] Thenmozhi M. and Menakadevi T., “A New Secure Image Steganography Using Lsb and Spiht Based Compression Method,” International Journal of Engineering Re-Search and Science, vol. 2, no. 3, pp. 80-85, 2016. Mohammad Alia is an Associate professor at the computer information systems department, Faculty of science Computer and information technology, Al Zaytoonah University of Jordan. He received the B.Sc. degree in Science from the Al Zaytoonah University, Jordan, in 1999. He obtained his Ph.D. degree in Computer Science from University Science of Malaysia, in 2008. During 2000 until 2004, he worked at Al-Zaytoonah University of Jordan as an instructor of Computer sciences and Information Technology. Then, he worked as a lecturer at Al-Quds University in Saudi Arabia from 2004 - 2005. Currently he is working as a Faculty Deputy Dean and a Chair of Computer Information Systems Dept. at Al Zaytoonah University of Jordan. His research interests are in the field of Cryptography, and Network security. Khaled Suwais is an Associate Professor at the Faculty of Computer Studies, Arab Open University. He received his B.Sc in computer science from Al al-Bayt University, Jordan in 2004, M.Sc and PhD in computer science from University Sains Malaysia, Malaysia in 2005 and 2009, respectively. He joined the College of Computer Science and Information at Al-Imam University, Riyadh, Saudi Arabia, in 2009. In 2012, he joined the Faculty of Computer Studies at the Arab Open University. Dr. Suwais is specialized in the field of information security and cryptography. Currently, he is involved in reviewing several international journals and conferences. His research interest includes: cryptography, information security and operational research.