Abstract
Steganography and Steganalysis are becoming increasingly relevant in information forensics and hiding data in the higher bitplanes without kee** any perceptible signature into the image is a challenging problem in this area. In this paper, we propose a unique solution to this problem using Fibonacci numbers as base. The pixels are selected from the busy part of the image where noticeable changes in pixel intensities occur. The business of the pixels is determined by their Fibonacci energy. The pixels values are converted into Fibonacci base and their corresponding Fibonacci energies are estimated by the Fibonacci expansion of pixel intensities. The set of energetic pixels are considered according to the descending order of their energy values. The binary data are concealed into higher bitplanes (up to 5) of the Fibonacci base of the pixel intensities. We theoretically derive some nice combinatorial properties related to distortion of pixel intensities and also experimentally show that our algorithm withstands against visual, structural and statistical attacks. The average embedding capacity is 3.98 bpp and average PSNR is 39.59 dB. We also demonstrate that our method is capable of resisting from the series of benchmark tests provided by StirMark 4.0.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-15504-9/MediaObjects/11042_2023_15504_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-15504-9/MediaObjects/11042_2023_15504_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-15504-9/MediaObjects/11042_2023_15504_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-15504-9/MediaObjects/11042_2023_15504_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-15504-9/MediaObjects/11042_2023_15504_Fig5_HTML.png)
Similar content being viewed by others
References
Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane map**. In: International conference on research in security standardisation. Springer, Cham, pp 151–166
Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13): 17799–17823
Anderson R, Petitcolas F, Kuhn M University of Cambridge: http://www.petitcolas.net/fabien/watermarking/stirmark
Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229
Battisti F, Carli M, Neri A, Egiaziarian K (2006) A generalized Fibonacci LSB data hiding technique. In: 3rd International conference on computers and devices for communication (CODEC-06), Institute of Radio Physics and Electronics, University of Calcutta, pp 1–4
Benesty J, Chen J, Huang Y, Cohen I (2009) Pearson correlation coefficient. In: Noise reduction in speech processing. Springer, Berlin, pp 1–4
Brown Jr JL (1965) A new characterization of the Fibonacci numbers. Fibonacci Quart 3(1):1–8
Camenisch J, Collberg C, Johnson NF, Sallee P (2007) Information hiding: 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Selected Papers (vol 4437). Springer
Chen M, Boroumand M, Fridrich J (2018) Deep learning regressors for quantitative steganalysis. Electron Imaging 2018(7):160–1
Cipra BA (1987) An introduction to the Ising model. Am Math Mon 94(10):937–959
Cogranne R, Zitzmann C, Fillatre L, Retraint F, Nikiforov I, Cornu P (2011) A cover image model for reliable steganalysis. In: International workshop on information hiding. Springer, Berlin, pp 178–192
Coremen T, Leiserson C, Rivest R, Stein C (2009) Introduction to algorithm, 3rd edn. McGraw Hill, ISBN 9780262533058
Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. In: Proceedings. International conference on image processing, vol 3. IEEE, pp 641–644
Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inform Forens Secur 6(3):920–935
Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. In: Security, steganography, and watermarking of multimedia contents VI. 5306, 23–34. SPIE
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forens Secur 7(3):868–882
Fridrich J, Soukual D (2006) Matrix embedding for large payload. IEEE Tran Inform Forens Secur 1:390–1295
Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8(4):22–28
Gu GS, Han GQ (2006) The application of chaos and DWT in image scrambling. In: 2006 International conference on machine learning and cybernetics. IEEE, pp 3729–3733
Kang S, Park H, Park JI (2020) Combining LSB embedding with modified Octa-PVD embedding. Multimed Tools Appl 79–29:21155–21175
Ker AD (2005) A general framework for structural steganalysis of LSB replacement. In: International workshop on information hiding. Springer, Berlin, pp 296–311
Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Delp EJ, Wong PW, Dittmann J, Memon ND (eds) Proceedings SPIE, electronic imaging, security, forensics, steganography, and watermarking of multimedia contents X, 6819(5), 1–17, San Jose
Khan NR, Tomar MRS (2013) Adaptive cryptosystem for digital images using fibonacci bit-plane decomposition. International Journal of Scientific and Research Publications, 681
Kim C (2014) Data hiding by an improved exploiting modification direction. Multimed Tools Appl 69(3):569–584
Knuth D (2006) The art of computer programming, 4(4), Generating All Trees – History of Combinatorial Generation. Addison–Wesley, 50, ISBN 978-0-321-33570-8
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inform Forens Secur 5(2):201–214
Ma K, Duanmu Z, Yeganeh H, Wang Z (2017) Multi-exposure image fusion by optimizing a structural similarity index. IEEE Trans Comput Imag 4 (1):60–72
Mammi E, Battisti F, Carli M, Neri A, Egiazarian K (2009) PSubstitutive steganography in the generalized Fibonacci domain. In: Image processing: algorithms and systems VII. 7245, 202–209. SPIE
Mandal PC, Mukherjee I (2022) High capacity data hiding based on multi-directional pixel value differencing and decreased difference expansion. Multimed Tools Appl 81(4):5325–5347
Mandal PC, Mukherjee I, Paul G, Chatterji BN (2022) Digital image steganography: a literature survey. Inform Sci 609:1451–1488. ISSN 0020-0255, https://doi.org/10.1016/j.ins.2022.07.120
Mukherjee (Ganguly) N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77 (14):18451–18481. https://doi.org/10.1007/s11042-018-5720-3
Paul G, Davidson I, Mukherjee I, Ravi SS (2017) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76(5):7445–7471
Pevny T, Fridrich J, Ker AD (2011) From blind to quantitative steganalysis. IEEE Trans Inform Forens Secur 7(2):445–454
Pfitzmann A (2000) Information hiding: third international workshop, IH’99, Dresden, Germany, September 29-October 1, 1999 Proceedings (No. 1768). Springer Science & Business Media, pp 61–76
Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. In: 2016 International conference on research advances in integrated navigation systems (RAINS). IEEE, pp 1–8
Provos N (2001) Defending against statistical steganalysis. In: 10th USENIX Security Symposium (USENIX Security 01)
Rouse DM, Hemami SS (2008) Understanding and simplifying the structural similarity metric. In: 2008 15th IEEE international conference on image processing. IEEE, pp 1188–1191
Sahu AK, Swain G (2019) An optimal information hiding approach based on pixel value differencing and modulus function. Wirel Pers Commun 108 (1):159–174
Tsai D-M, Lin C-T, Chen J-F (2003) The evaluation of normalized cross correlations for defect detection. Pattern Recogn Lett 24:2525–2535
Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proceedings-Vision Image and Signal Processing 152(5):611–615
Yang G, Li X, Wang J, Guo Z (2018) Efficient large payloads ternary matrix embedding. Multimed Tools Appl 77(2):1605–1622
Zeckendorf E (1972) Representations des nombres naturels par une somme de nombres de fibonacci on de nombres de lucas. Bulletin de La Society Royale des Sciences de Liege, 179–182
Zielińska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 57(3):86–95
Zitzmann C, Cogranne R, Retraint F, Nikiforov I, Fillatre L, Cornu P (2011) Statistical decision methods in hidden information detection. In: International workshop on information hiding. Springer, Berlin, pp 163–177
Zou J, Ward RK, Qi D (2004) A new digital image scrambling method based on Fibonacci numbers. In: 2004 IEEE International Symposium on Circuits and Systems (ISCAS), vol 3. IEEE, pp III-965
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Funding and/or Conflicts of interests/Competing interests
-- The authors did not receive support from any organization for the submitted work.
-- The authors have no relevant financial or non-financial interests to disclose.
-- The authors have no competing interests to declare that are relevant to the content of this article.
-- All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.
-- The authors have no financial or proprietary interests in any material discussed in this article.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Mukherjee, I., Paul, G. High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels. Multimed Tools Appl 83, 5181–5206 (2024). https://doi.org/10.1007/s11042-023-15504-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15504-9