Skip to main content
Log in

A steganographic scheme based on the Wada index

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A steganographic technique based on the Wada index is proposed in this paper. The definition of a perfect covering of the carrier image is introduced. Perfect coverings are used to produce a unique representation of the carrier image what enables the consecutive modification of pixels in the carrier image without destructing Wada indexes in previous overlapping observation windows. The only required information for the decoding step is the stego image itself. The stego image is split into dichotomous shares according to the Wada index. The decoding scheme is based on the disjunction of shares with odd indexes. Computational experiments are used to demonstrate the efficacy of the proposed scheme. The proposed steganographic scheme based on the Wada index ensures that the secret image is not leaked from the modified bit planes with lowest indexes, the stego image is robust against RS steganalysis algorithms, and the payload capacity of the carrier image is comparable to grayscale LSB schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

Data Availability

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD thesis University of Buckingham

  2. Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. In: 2013 IEEE International symposium on multimedia, pp 287–291. https://doi.org/10.1109/ISM.2013.55

  3. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping. In: Chen L, Mitchell C (eds) Security standardisation research. Springer, Cham, pp 151–166

  4. Agaian SS, Cherukuri RC, Sifuentes R (2006) A new secure adaptive steganographic algorithm using fibonacci numbers. In: 2006 IEEE region 5 conference, pp 125–129. https://doi.org/10.1109/TPSD.2006.5507446

  5. Aini DN, Moses Setiadi DRI, Putro SN, Rachmawanto EH, Sari CA (2019) Survey of methods in the spatial domain image steganography based imperceptibility and payload capacity. In: 2019 International seminar on application for technology of information and communication (isemantic), pp 434–439. https://doi.org/10.1109/ISEMANTIC.2019.8884333

  6. Ahmad T, Holil M (2014) Increasing the performance of difference expansion-based steganography when securing medical data. Smart Comput Rev 4:307–322. https://doi.org/10.6029/smartcr.2014.04.007

    Article  Google Scholar 

  7. Alhomoud AM (2021) Image steganography in spatial domain: current status, techniques, and trends. Intell Autom Soft Co 27(1):69–88. https://doi.org/10.32604/iasc.2021.014773

    Article  Google Scholar 

  8. Daza A, Wagemakers A, Georgeot B, Guéry-Odelin D, Sanjuán MAF (2016) Basin entropy: a new tool to analyze uncertainty in dynamical systems. Sci Rep 6:3146. https://doi.org/10.1038/srep31416

    Article  MATH  Google Scholar 

  9. De Luca Picione D, Battisti F, Carli M, Astola J, Egiazarian K (2006) A Fibonacci LSB data hiding tecnique. In: 2006 14th European signal processing conference, pp 1–5

  10. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8:22–28. https://doi.org/10.1109/93.959097

    Article  Google Scholar 

  11. Gou H, Swaminathan A, Wu M (2007) Noise features for image tampering detection and steganalysis. In: 2007 IEEE International conference on image processing, vol 6, pp 97–100. https://doi.org/10.1109/ICIP.2007.4379530

  12. Hosam O (2019) Attacking image watermarking and steganography—a survey. Int J Inf Comp Sci 11:23–37. https://doi.org/10.5815/ijitcs.2019.03.03

    Google Scholar 

  13. Hussain M, Wahab AWA, Anuar NB, Salleh R, Noor RM (2015) Pixel value differencing steganography techniques: analysis and open challenge. In: 2015 IEEE International conference on consumer electronics—Taiwan, pp 21–22. https://doi.org/10.1109/ICCE-TW.2015.7216859

  14. Hussain M, Wahab AWA, Idris YIB, Ho ATS, Jung K -H (2018) Image steganography in spatial domain: a survey. Process Image Commun 65:46–66. https://doi.org/10.1016/j.image.2018.03.012

    Article  Google Scholar 

  15. Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326. https://doi.org/10.1016/j.neucom.2018.06.075

    Article  Google Scholar 

  16. Kennedy J, Yorke JA (1991) Basins of Wada. Physica D 51:213–225. https://doi.org/10.1016/0167-2789(91)90234-Z

    Article  MathSciNet  MATH  Google Scholar 

  17. Khalind O, Aziz B (2015) A better detection of 2LSB steganography via standard deviation of the extended pairs of values. In: Agaian SS, Jassim SA, Du EY (eds) Mobile multimedia/image processing, security, and applications 2015, vol 9497, pp 135–142. https://doi.org/10.1117/12.2184496

  18. Khan S, Ahmad N, Ismail M, Minallah N, Khan T (2015) A secure true edge based 4 least significant bits steganography. In: 2015 International conference on emerging technologies (ICET), pp 1–4. https://doi.org/10.1109/ICET.2015.7389227

  19. Khan S, Naeem M, Khan T, Ahmad N (2017) 4LSB based data hiding in complex region of digital images and its effects on edges and histogram. J Eng Appl Sci 36:67–75. https://doi.org/10.25211/jeas.v36i1.144

    Google Scholar 

  20. Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal 14(5):955–968. https://doi.org/10.1109/JSTSP.2020.3002391

    Article  Google Scholar 

  21. Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE T Circ Syst Vid 30(3):685–696. https://doi.org/10.1109/TCSVT.2019.2896270

    Article  Google Scholar 

  22. Liao X, Yin J, Chen M, Qin Z (2022) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Depend Secure 19(2):897–911. https://doi.org/10.1109/TDSC.2020.3004708

    Google Scholar 

  23. Lin KY, Hong W, Chen J, Chen TS, Chiang WC (2010) Data hiding by exploiting modification direction technique using optimal pixel grouping. In: 2010 2nd International conference on education technology and computer, vol 3, pp 3–1213123. https://doi.org/10.1109/ICETC.2010.5529581

  24. Lu C -S (2004) Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. IGI Global, London, p 264

    Google Scholar 

  25. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Foren Sec 5(2):201–214. https://doi.org/10.1109/TIFS.2010.2041812

    Article  Google Scholar 

  26. Manoharan S (2008) An empirical analysis of RS steganalysis. In: 2008 The third international conference on internet monitoring and protection, pp 172–177. https://doi.org/10.1109/ICIMP.2008.15

  27. Moses Setiadi DRI (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:1–22. https://doi.org/10.1007/s11042-020-10035-z

    Google Scholar 

  28. Neeta D, Snehal K, Jacobs D (2007) Implementation of LSB steganography and its evaluation for various bits. In: 2006 1st International conference on digital information management, pp 173–178. https://doi.org/10.1109/ICDIM.2007.369349

  29. Nguyen BC, Yoon SM, Lee H-K (2006) Multi bit plane image steganography. In: Shi Y Q, Jeon B (eds) Digital watermarking. Springer, Berlin, pp 61–70

  30. Osipov AV, Serow DW (2018) Fractional densities for the Wada basins. Nonl Phen Compl Syst 21:389–394

    MATH  Google Scholar 

  31. Potdar VM, Chang E (2004) Grey level modification steganography for secret communication. In: 2nd IEEE international conference on industrial informatics, 2004. INDIN ’04, pp 223–228. https://doi.org/10.1109/INDIN.2004.1417333

  32. Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. In: 2016 International conference on research advances in integrated navigation systems (RAINS), pp 1–8. https://doi.org/10.1109/RAINS.2016.7764399

  33. Ratan R, Yadav A (2021) Security analysis of bit plane level image encryption schemes. Defence Sci J 71(2):209–221. https://doi.org/10.14429/dsj.71.15643

    Article  Google Scholar 

  34. Safarpour M, Charmi M (2016) Capacity enlargement of the PVD steganography method using the GLM technique. abs/1601.00299

  35. Sahu AK, Sahu M (2020) Digital image steganography and steganalysis: a journey of the past three decades. Open Comput Sci 10(1):296–342. https://doi.org/10.1515/comp-2020-0136

    Article  Google Scholar 

  36. Saunoriene L, Ragulskis M, Cao J, Sanjuán M A F (2021) Wada index based on the weighted and truncated Shannon entropy. Nonlinear Dyn 1–13. https://doi.org/10.1007/s11071-021-06261-1

  37. Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques, 2nd edn. CRC Press, Boca Raton, p 292

    Book  Google Scholar 

  38. Swain G (2019) Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arab J Sci Eng 44(4):2995–3004. https://doi.org/10.1007/s13369-018-3372-2

    Article  Google Scholar 

  39. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Sys Vid 13(8):890–896. https://doi.org/10.1109/TCSVT.2003.815962

    Article  Google Scholar 

  40. Venkatraman S, Abraham A, Paprzycki M (2004) Significance of steganography on data security. In: International conference on information technology: coding and computing, 2004. Proceedings ITCC, vol 2, pp 347–351. https://doi.org/10.1109/ITCC.2004.1286660

  41. Wagemakers A, Daza A, Sanjuán M A F (2021) How to detect Wada basins. Discrete Cont Dyn-B 26(1):717–739. https://doi.org/10.3934/dcdsb.2020330

    MathSciNet  MATH  Google Scholar 

  42. Wayner P (2009) Chapter 17—steganalysis. In: Wayner P (ed) Disappearing cryptography, 3rd edn. The Morgan Kaufmann series in software engineering and programming. Morgan Kaufmann, Boston, pp 337–353. https://doi.org/10.1016/B978-012374479-1.50022-8

  43. Wu D -C, Tsai W -H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626. https://doi.org/10.1016/S0167-8655(02)00402-6

    Article  MATH  Google Scholar 

  44. Yoneyama K (1917) Theory of continuous set of points (not finished). Tohoku Math J, First Series 12:43–158

    Google Scholar 

  45. Zhang Y (2013) Switching-induced Wada basin boundaries in the Henon map. Nonlinear Dyn 73:2221–2229. https://doi.org/10.1007/s11071-013-0936-2

    Article  MATH  Google Scholar 

  46. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783. https://doi.org/10.1109/LCOMM.2006.060863

    Article  Google Scholar 

  47. Zhang Y, Zhang H, Gao W (2015) Multiple Wada basins with common boundaries in nonlinear driven oscillators. Nonlinear Dyn 79:2667–2674. https://doi.org/10.1007/s11071-014-1839-6

    Article  MathSciNet  Google Scholar 

  48. Ziaukas P, Ragulskis M (2017) Fractal dimension and Wada measure revisited: no straightforward relationships in NDDS. Nonlinear Dyn 88:871–882. https://doi.org/10.1007/s11071-016-3281-4

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Minvydas Ragulskis.

Ethics declarations

Competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Loreta Saunoriene and Minvydas Ragulskis contributed equally to this work.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saunoriene, L., Ragulskis, M. A steganographic scheme based on the Wada index. Multimed Tools Appl 82, 40503–40529 (2023). https://doi.org/10.1007/s11042-023-14888-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14888-y

Keywords

Navigation