Abstract
A steganographic technique based on the Wada index is proposed in this paper. The definition of a perfect covering of the carrier image is introduced. Perfect coverings are used to produce a unique representation of the carrier image what enables the consecutive modification of pixels in the carrier image without destructing Wada indexes in previous overlapping observation windows. The only required information for the decoding step is the stego image itself. The stego image is split into dichotomous shares according to the Wada index. The decoding scheme is based on the disjunction of shares with odd indexes. Computational experiments are used to demonstrate the efficacy of the proposed scheme. The proposed steganographic scheme based on the Wada index ensures that the secret image is not leaked from the modified bit planes with lowest indexes, the stego image is robust against RS steganalysis algorithms, and the payload capacity of the carrier image is comparable to grayscale LSB schemes.
Similar content being viewed by others
Data Availability
The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.
References
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD thesis University of Buckingham
Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. In: 2013 IEEE International symposium on multimedia, pp 287–291. https://doi.org/10.1109/ISM.2013.55
Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping. In: Chen L, Mitchell C (eds) Security standardisation research. Springer, Cham, pp 151–166
Agaian SS, Cherukuri RC, Sifuentes R (2006) A new secure adaptive steganographic algorithm using fibonacci numbers. In: 2006 IEEE region 5 conference, pp 125–129. https://doi.org/10.1109/TPSD.2006.5507446
Aini DN, Moses Setiadi DRI, Putro SN, Rachmawanto EH, Sari CA (2019) Survey of methods in the spatial domain image steganography based imperceptibility and payload capacity. In: 2019 International seminar on application for technology of information and communication (isemantic), pp 434–439. https://doi.org/10.1109/ISEMANTIC.2019.8884333
Ahmad T, Holil M (2014) Increasing the performance of difference expansion-based steganography when securing medical data. Smart Comput Rev 4:307–322. https://doi.org/10.6029/smartcr.2014.04.007
Alhomoud AM (2021) Image steganography in spatial domain: current status, techniques, and trends. Intell Autom Soft Co 27(1):69–88. https://doi.org/10.32604/iasc.2021.014773
Daza A, Wagemakers A, Georgeot B, Guéry-Odelin D, Sanjuán MAF (2016) Basin entropy: a new tool to analyze uncertainty in dynamical systems. Sci Rep 6:3146. https://doi.org/10.1038/srep31416
De Luca Picione D, Battisti F, Carli M, Astola J, Egiazarian K (2006) A Fibonacci LSB data hiding tecnique. In: 2006 14th European signal processing conference, pp 1–5
Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8:22–28. https://doi.org/10.1109/93.959097
Gou H, Swaminathan A, Wu M (2007) Noise features for image tampering detection and steganalysis. In: 2007 IEEE International conference on image processing, vol 6, pp 97–100. https://doi.org/10.1109/ICIP.2007.4379530
Hosam O (2019) Attacking image watermarking and steganography—a survey. Int J Inf Comp Sci 11:23–37. https://doi.org/10.5815/ijitcs.2019.03.03
Hussain M, Wahab AWA, Anuar NB, Salleh R, Noor RM (2015) Pixel value differencing steganography techniques: analysis and open challenge. In: 2015 IEEE International conference on consumer electronics—Taiwan, pp 21–22. https://doi.org/10.1109/ICCE-TW.2015.7216859
Hussain M, Wahab AWA, Idris YIB, Ho ATS, Jung K -H (2018) Image steganography in spatial domain: a survey. Process Image Commun 65:46–66. https://doi.org/10.1016/j.image.2018.03.012
Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326. https://doi.org/10.1016/j.neucom.2018.06.075
Kennedy J, Yorke JA (1991) Basins of Wada. Physica D 51:213–225. https://doi.org/10.1016/0167-2789(91)90234-Z
Khalind O, Aziz B (2015) A better detection of 2LSB steganography via standard deviation of the extended pairs of values. In: Agaian SS, Jassim SA, Du EY (eds) Mobile multimedia/image processing, security, and applications 2015, vol 9497, pp 135–142. https://doi.org/10.1117/12.2184496
Khan S, Ahmad N, Ismail M, Minallah N, Khan T (2015) A secure true edge based 4 least significant bits steganography. In: 2015 International conference on emerging technologies (ICET), pp 1–4. https://doi.org/10.1109/ICET.2015.7389227
Khan S, Naeem M, Khan T, Ahmad N (2017) 4LSB based data hiding in complex region of digital images and its effects on edges and histogram. J Eng Appl Sci 36:67–75. https://doi.org/10.25211/jeas.v36i1.144
Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal 14(5):955–968. https://doi.org/10.1109/JSTSP.2020.3002391
Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE T Circ Syst Vid 30(3):685–696. https://doi.org/10.1109/TCSVT.2019.2896270
Liao X, Yin J, Chen M, Qin Z (2022) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Depend Secure 19(2):897–911. https://doi.org/10.1109/TDSC.2020.3004708
Lin KY, Hong W, Chen J, Chen TS, Chiang WC (2010) Data hiding by exploiting modification direction technique using optimal pixel grouping. In: 2010 2nd International conference on education technology and computer, vol 3, pp 3–1213123. https://doi.org/10.1109/ICETC.2010.5529581
Lu C -S (2004) Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. IGI Global, London, p 264
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Foren Sec 5(2):201–214. https://doi.org/10.1109/TIFS.2010.2041812
Manoharan S (2008) An empirical analysis of RS steganalysis. In: 2008 The third international conference on internet monitoring and protection, pp 172–177. https://doi.org/10.1109/ICIMP.2008.15
Moses Setiadi DRI (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:1–22. https://doi.org/10.1007/s11042-020-10035-z
Neeta D, Snehal K, Jacobs D (2007) Implementation of LSB steganography and its evaluation for various bits. In: 2006 1st International conference on digital information management, pp 173–178. https://doi.org/10.1109/ICDIM.2007.369349
Nguyen BC, Yoon SM, Lee H-K (2006) Multi bit plane image steganography. In: Shi Y Q, Jeon B (eds) Digital watermarking. Springer, Berlin, pp 61–70
Osipov AV, Serow DW (2018) Fractional densities for the Wada basins. Nonl Phen Compl Syst 21:389–394
Potdar VM, Chang E (2004) Grey level modification steganography for secret communication. In: 2nd IEEE international conference on industrial informatics, 2004. INDIN ’04, pp 223–228. https://doi.org/10.1109/INDIN.2004.1417333
Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. In: 2016 International conference on research advances in integrated navigation systems (RAINS), pp 1–8. https://doi.org/10.1109/RAINS.2016.7764399
Ratan R, Yadav A (2021) Security analysis of bit plane level image encryption schemes. Defence Sci J 71(2):209–221. https://doi.org/10.14429/dsj.71.15643
Safarpour M, Charmi M (2016) Capacity enlargement of the PVD steganography method using the GLM technique. abs/1601.00299
Sahu AK, Sahu M (2020) Digital image steganography and steganalysis: a journey of the past three decades. Open Comput Sci 10(1):296–342. https://doi.org/10.1515/comp-2020-0136
Saunoriene L, Ragulskis M, Cao J, Sanjuán M A F (2021) Wada index based on the weighted and truncated Shannon entropy. Nonlinear Dyn 1–13. https://doi.org/10.1007/s11071-021-06261-1
Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques, 2nd edn. CRC Press, Boca Raton, p 292
Swain G (2019) Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arab J Sci Eng 44(4):2995–3004. https://doi.org/10.1007/s13369-018-3372-2
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Sys Vid 13(8):890–896. https://doi.org/10.1109/TCSVT.2003.815962
Venkatraman S, Abraham A, Paprzycki M (2004) Significance of steganography on data security. In: International conference on information technology: coding and computing, 2004. Proceedings ITCC, vol 2, pp 347–351. https://doi.org/10.1109/ITCC.2004.1286660
Wagemakers A, Daza A, Sanjuán M A F (2021) How to detect Wada basins. Discrete Cont Dyn-B 26(1):717–739. https://doi.org/10.3934/dcdsb.2020330
Wayner P (2009) Chapter 17—steganalysis. In: Wayner P (ed) Disappearing cryptography, 3rd edn. The Morgan Kaufmann series in software engineering and programming. Morgan Kaufmann, Boston, pp 337–353. https://doi.org/10.1016/B978-012374479-1.50022-8
Wu D -C, Tsai W -H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626. https://doi.org/10.1016/S0167-8655(02)00402-6
Yoneyama K (1917) Theory of continuous set of points (not finished). Tohoku Math J, First Series 12:43–158
Zhang Y (2013) Switching-induced Wada basin boundaries in the Henon map. Nonlinear Dyn 73:2221–2229. https://doi.org/10.1007/s11071-013-0936-2
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783. https://doi.org/10.1109/LCOMM.2006.060863
Zhang Y, Zhang H, Gao W (2015) Multiple Wada basins with common boundaries in nonlinear driven oscillators. Nonlinear Dyn 79:2667–2674. https://doi.org/10.1007/s11071-014-1839-6
Ziaukas P, Ragulskis M (2017) Fractal dimension and Wada measure revisited: no straightforward relationships in NDDS. Nonlinear Dyn 88:871–882. https://doi.org/10.1007/s11071-016-3281-4
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Loreta Saunoriene and Minvydas Ragulskis contributed equally to this work.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Saunoriene, L., Ragulskis, M. A steganographic scheme based on the Wada index. Multimed Tools Appl 82, 40503–40529 (2023). https://doi.org/10.1007/s11042-023-14888-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-14888-y