Advertisement

Image Visually Meaningful Cryptography Based on Julia Set Generating and Information Hiding

  • Longfu Zhou
  • Sen BaiEmail author
  • Yuqiang Cao
  • YingLong Wang
Conference paper
  • 65 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12022)

Abstract

Secret and private image security storage and fast transmission are a relatively concerned issue in the field of information security. In existed image encryption schemes, plain image is transformed to meaningless random noise signal which is vulnerable to attack with suspicion. Image visually meaningful cryptography (IVMC) based on information hiding is difficult to hide large size images because of limited hiding capacity. To solve this problem,a new IVMC based on Julia set images (JSI) generating and information hiding was proposed.In this solution, firstly, JSI are generated by utilizing Julia set generating parameters (JSGP) and specific pixel coloring scheme (SPCS), as keys, escape-time algorithm (ETA). Then the secret image or the encrypted secret image is embedded into JSI’s detail-rich small areas to form a beautiful stego-JSI, so as to achieve the purpose of IVMC. The receiver can use the same JSGP and SPCS keys to generate the same cover-JSI, which greatly facilitates the extraction and decryption of the encrypted image. Theoretical analysis and experimental results show that the proposed method has good artistic beauty, high hiding capacity, good imperceptibility, strong anti-compression performance and good anti-steganalysis ability, as well as large key space and good key sensitivity.

Keywords

Image encryption Image visually meaningful cryptography (IVMC) Information hiding Julia set 

Notes

Acknowledgement

The work was supported by the Science and Technology Research Program of Chongqing Municipal Education Commission (Grant No. KJZD-K201801901).

References

  1. 1.
    Thomas, S.A., Gharge, S.: Review on various visual cryptography schemes. In: International Conference on Current Trends in Computer, Electrical, Electronics and Communication (ICCTCEEC 2017), pp. 1164–1167 (2017)Google Scholar
  2. 2.
    Zhang, H.X., Hu, J., Wang, G., et al.: A steganography scheme based on fractal images. In: Second International Conference on Networking and Distributed Computing, Beijing, China, pp. 28–31, September 2011Google Scholar
  3. 3.
    Mohammed, N.Q., Hussein, Q.M., Ahmed, M.S.: Suitability of using Julia set images as a cover for hiding information. In: Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology, NTCCIT 2018, pp. 71–74 (2018)Google Scholar
  4. 4.
    Gao, W.J., Sun, J., Qiao, W., et al.: Digital image encryption scheme based on generalized Mandelbrot-Julia set. Opt. Int. J. Light. Electron Opt. 185, 917–929 (2019)CrossRefGoogle Scholar
  5. 5.
    Su, X.H., Li, D., Hu, M.Z.: The resulting of the symmetric fractal art images with improved Newton-Raphson method. Chin. J. Comput. 22(11), 1147–1152 (1999)Google Scholar
  6. 6.
    Acar, R., Boulanger, P.: Digital marbling: a multiscale fluid model. IEEE Trans. Vis. Comput. Graph. 12(4), 600–614 (2006)CrossRefGoogle Scholar
  7. 7.
    Lu, S.F., Mok, P.Y., Jin, X.G.: From design methodology to evolutionary design: an interactive creation of marble-like textile patterns. Eng. Appl. Artif. Intell. 32, 124–135 (2014)CrossRefGoogle Scholar
  8. 8.
    Zhou, N., Yan, X., Liang, H., et al.: Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quantum Inf. Process. 17, 338 (2018)CrossRefGoogle Scholar
  9. 9.
    Agaian, S.S., Susmilch, J.M.: Fractal steganography using artificially generated images. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 6982, pp. 312–317 (2008)Google Scholar
  10. 10.
    Patel, H.N., Khant, D.R., Prajapati, D.: Design of a color palette based image steganography algorithm for fractal images. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (IEEE WiSPNET 2017), pp. 2584–2589 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Longfu Zhou
    • 1
  • Sen Bai
    • 1
    Email author
  • Yuqiang Cao
    • 2
  • YingLong Wang
    • 1
  1. 1.College of Software and Artificial IntelligenceChongqing Institute of EngineeringChongqingChina
  2. 2.College of ComputerChongqing Institute of EngineeringChongqingChina

Personalised recommendations