2011
DOI: 10.1103/physreve.84.056213
|View full text |Cite
|
Sign up to set email alerts
|

Secure steganographic communication algorithm based on self-organizing patterns

Abstract: A secure steganographic communication algorithm based on patterns evolving in a Beddington-de Angelis-type predator-prey model with self- and cross-diffusion is proposed in this paper. Small perturbations of initial states of the system around the state of equilibrium result in the evolution of self-organizing patterns. Small differences between initial perturbations result in slight differences also in the evolving patterns. It is shown that the generation of interpretable target patterns cannot be considered… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 26 publications
0
14
0
Order By: Relevance
“…The model had earlier been implemented in analog CMOS to repair fingerprint images, and has been confirmed suitable for hardware-based applications. A novel steganography method based on Reaction-diffusion had been earlier shown an efficient application using the reaction-diffusion phenomenon [17]. In RD steganography, the RD process is applied to improve data security after hiding a plain text within a random-dot image.…”
Section: Discussionmentioning
confidence: 99%
“…The model had earlier been implemented in analog CMOS to repair fingerprint images, and has been confirmed suitable for hardware-based applications. A novel steganography method based on Reaction-diffusion had been earlier shown an efficient application using the reaction-diffusion phenomenon [17]. In RD steganography, the RD process is applied to improve data security after hiding a plain text within a random-dot image.…”
Section: Discussionmentioning
confidence: 99%
“…The nonlinear model of the system governs the evolution of one pattern from a predetermined set of initial conditions -while the evolution of the second one is started from the perturbed initial conditions [1][2][3][4][5]. The secret image leaks in a form of a difference image between these two patterns:…”
Section: Adaptive Perturbation Strategymentioning
confidence: 99%
“…Image hiding scheme constructed based on spiral waves modeled patterns requires a slightly different approach than in [1][2][3][4][5]. Two images are still required, but as it is noted in [10], it is impossible to get a reasonable difference image of two patterns created using spiral wave model if only initial conditions are modified.…”
Section: Adaptive Perturbation Strategymentioning
confidence: 99%
See 1 more Smart Citation
“…A digital fingerprint image is used as the initial condition for the evolution of a pattern in a model of reaction-diffusion cellular automata [1]. A secure digital image communication scheme based on patterns evolving in a Beddington-DeAngelis-type predator-prey model with self-and cross-diffusion is proposed in [2]. Considerations on hardware implementation of image steganography based on reaction diffusion models are presented in [3].…”
Section: Introductionmentioning
confidence: 99%