Professional Documents
Culture Documents
Fractals in
Information Hiding
by
Thenaa Ali Kadhum
supervised by
Dr. Nadia M. G.
:Linguistic steganography )2
this type hides the message in the carrier in some non_obvious ways
.and is further categorized as Semagrams or open codes
:Semagrams )3
Semagrams hide information by the use of symbols or signs. A text
Semagrams hides a message by modifying the appearance of the
carrier text, such as subtle changes in font size or type, adding extra
.spaces, or different flourishes in letters or handwritten text
:Covered or concealment )4
Ciphers hide a message openly in the carrier medium so that it can be
recovered by anyone who knows the secret for how it was
.concealed
These large changes between the figures "2.3" and "2.5" to the image
are very noticeable in a color image although an 8 bit grayscale
.image will produce relatively good results
he carrier of the stego information is a jpg format
T
picture for " Kadhum AlSaher" and a message of
four words" hi how are u". Using the
program "main" of appendix C to embed the message
and view the comparison between before and after
.the embedment in the same image
x a 11 0 x 0
W = + = AX → 10000000 = A .
y 0 0 y 0
x 0 0 x 0
W = + = AX → 00100000 = A .
y a 21 0 y 0
x 0 a 12 x 0
W = + = AX → 01000000 = A .
y 0 0 y 0
x 0 0 x 0
W = + = AX → 00110000 = A.
y a 21 a 22 y 0
x 0 0 x 0
W = + = AX → 01100000 = A .
y 0 a 22 y 0
x a 11 a 12 x 0
W = + = AX → 11000000 = A .
y 0 0 y 0
x a 11 0 x 0
W = + = AX → 10110000 = LLA .
y a 21 a 22 y 0
x a11 0 x 0
W = + = AX → 10010000 = DA .
y 0 a 22 y 0
x a 11 a 12 x 0
W = + = AX → 11110000 = ALLA .
y a 21 a 22 y 0
x 0 a 12 x 0
W = + = AX → 01100000 = SDA .
y a 21 0 y 0
Are all the possible inputs as a linear transformations, the first six orders are better to be ignored and
:the non- linear are
x x e
W = A + = AX + b → 11101000 = AX .
y y 0
x x 0
W = A + = AX + b → 11100100 = AY .
y y f
a 11 a 22
, and .
NK N K
Here a11, and a22 are the numerical values of the first two unit
messages in a ring of integers modulo Nk, i.e. the numerical value
of a number of kth -digit in a numeric system with N-digits. The
.sender can select the next member of the IFS
27 by: Thenaa Ali Kadhum
:Example1
to hide the message “Send me some money.”, and p=29 andk=2
Here A-Z takes the numerical values 0-25, '.', '?', and blank '$' take
. 26, 27, and 28 respectively
:MASSIC PART
The fractal transform basically involves multiplying a pixel in the selected
domain block by an average contrast "scaling factor" and adding an
brightness "offset factor" to the result. Thus the fractal transformation is
applied to the domain block to produce a new range block that is
visually similar to the original range block. This new block is written to
.the steganographic image in place of the old range block
(9) x w = W( x w )= w i ( x w)
i =1
Also xw :can be given by
x(10)
w = lim W 0n
( x ) = W (W(W(...W( x ).. .))) for any point x ∈ R 2
n→ ∞
x ' x ai bi x ei
(11)
y '
= wi
y =
+
d i y f i
.
ci
n(∑a i ) − (∑ai ) 2
2
i =1 i =1
1 n n
oi = ∑bi −si ∑a i .
n i =1 i =1
n 2 n n n n
2
R = ∑ bi + s (∑ ai − 2(∑ ai bi ) + 2o∑ ai ) + o(on − 2∑ bi ) n
2 2
i =1 i =1 i =1 i =1 i =1
n n n
if n 2
∑ ∑ i
a −
i =1
( a2
i) = 0 , then s
i =1
= 0 and2
o = ∑i .
b n 2
i =1
43 by: Thenaa Ali Kadhum
Before comparing a domain block Di with the range block
Ri, Dj is contracted by a factor of two on each side by
averaging neighboring pixels (figure 4.6), followed by the
application of one of the eight rotations and reflections
(figure 4.5) making up the isometrics of a square (figure
4.7).