Log in

High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography and Steganalysis are becoming increasingly relevant in information forensics and hiding data in the higher bitplanes without kee** any perceptible signature into the image is a challenging problem in this area. In this paper, we propose a unique solution to this problem using Fibonacci numbers as base. The pixels are selected from the busy part of the image where noticeable changes in pixel intensities occur. The business of the pixels is determined by their Fibonacci energy. The pixels values are converted into Fibonacci base and their corresponding Fibonacci energies are estimated by the Fibonacci expansion of pixel intensities. The set of energetic pixels are considered according to the descending order of their energy values. The binary data are concealed into higher bitplanes (up to 5) of the Fibonacci base of the pixel intensities. We theoretically derive some nice combinatorial properties related to distortion of pixel intensities and also experimentally show that our algorithm withstands against visual, structural and statistical attacks. The average embedding capacity is 3.98 bpp and average PSNR is 39.59 dB. We also demonstrate that our method is capable of resisting from the series of benchmark tests provided by StirMark 4.0.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane map**. In: International conference on research in security standardisation. Springer, Cham, pp 151–166

  2. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13): 17799–17823

    Article  Google Scholar 

  3. Anderson R, Petitcolas F, Kuhn M University of Cambridge: http://www.petitcolas.net/fabien/watermarking/stirmark

  4. Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229

    Article  MathSciNet  Google Scholar 

  5. Battisti F, Carli M, Neri A, Egiaziarian K (2006) A generalized Fibonacci LSB data hiding technique. In: 3rd International conference on computers and devices for communication (CODEC-06), Institute of Radio Physics and Electronics, University of Calcutta, pp 1–4

  6. Benesty J, Chen J, Huang Y, Cohen I (2009) Pearson correlation coefficient. In: Noise reduction in speech processing. Springer, Berlin, pp 1–4

  7. Brown Jr JL (1965) A new characterization of the Fibonacci numbers. Fibonacci Quart 3(1):1–8

  8. Camenisch J, Collberg C, Johnson NF, Sallee P (2007) Information hiding: 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Selected Papers (vol 4437). Springer

  9. Chen M, Boroumand M, Fridrich J (2018) Deep learning regressors for quantitative steganalysis. Electron Imaging 2018(7):160–1

    Google Scholar 

  10. Cipra BA (1987) An introduction to the Ising model. Am Math Mon 94(10):937–959

    Article  MathSciNet  Google Scholar 

  11. Cogranne R, Zitzmann C, Fillatre L, Retraint F, Nikiforov I, Cornu P (2011) A cover image model for reliable steganalysis. In: International workshop on information hiding. Springer, Berlin, pp 178–192

  12. Coremen T, Leiserson C, Rivest R, Stein C (2009) Introduction to algorithm, 3rd edn. McGraw Hill, ISBN 9780262533058

  13. Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. In: Proceedings. International conference on image processing, vol 3. IEEE, pp 641–644

  14. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  Google Scholar 

  15. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inform Forens Secur 6(3):920–935

    Article  Google Scholar 

  16. Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. In: Security, steganography, and watermarking of multimedia contents VI. 5306, 23–34. SPIE

  17. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forens Secur 7(3):868–882

    Article  Google Scholar 

  18. Fridrich J, Soukual D (2006) Matrix embedding for large payload. IEEE Tran Inform Forens Secur 1:390–1295

    Article  Google Scholar 

  19. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8(4):22–28

    Article  Google Scholar 

  20. Gu GS, Han GQ (2006) The application of chaos and DWT in image scrambling. In: 2006 International conference on machine learning and cybernetics. IEEE, pp 3729–3733

  21. Kang S, Park H, Park JI (2020) Combining LSB embedding with modified Octa-PVD embedding. Multimed Tools Appl 79–29:21155–21175

    Article  Google Scholar 

  22. Ker AD (2005) A general framework for structural steganalysis of LSB replacement. In: International workshop on information hiding. Springer, Berlin, pp 296–311

  23. Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Delp EJ, Wong PW, Dittmann J, Memon ND (eds) Proceedings SPIE, electronic imaging, security, forensics, steganography, and watermarking of multimedia contents X, 6819(5), 1–17, San Jose

  24. Khan NR, Tomar MRS (2013) Adaptive cryptosystem for digital images using fibonacci bit-plane decomposition. International Journal of Scientific and Research Publications, 681

  25. Kim C (2014) Data hiding by an improved exploiting modification direction. Multimed Tools Appl 69(3):569–584

    Article  Google Scholar 

  26. Knuth D (2006) The art of computer programming, 4(4), Generating All Trees – History of Combinatorial Generation. Addison–Wesley, 50, ISBN 978-0-321-33570-8

  27. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inform Forens Secur 5(2):201–214

    Article  Google Scholar 

  28. Ma K, Duanmu Z, Yeganeh H, Wang Z (2017) Multi-exposure image fusion by optimizing a structural similarity index. IEEE Trans Comput Imag 4 (1):60–72

    Article  MathSciNet  Google Scholar 

  29. Mammi E, Battisti F, Carli M, Neri A, Egiazarian K (2009) PSubstitutive steganography in the generalized Fibonacci domain. In: Image processing: algorithms and systems VII. 7245, 202–209. SPIE

  30. Mandal PC, Mukherjee I (2022) High capacity data hiding based on multi-directional pixel value differencing and decreased difference expansion. Multimed Tools Appl 81(4):5325–5347

    Article  Google Scholar 

  31. Mandal PC, Mukherjee I, Paul G, Chatterji BN (2022) Digital image steganography: a literature survey. Inform Sci 609:1451–1488. ISSN 0020-0255, https://doi.org/10.1016/j.ins.2022.07.120

    Article  Google Scholar 

  32. Mukherjee (Ganguly) N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77 (14):18451–18481. https://doi.org/10.1007/s11042-018-5720-3

    Article  Google Scholar 

  33. Paul G, Davidson I, Mukherjee I, Ravi SS (2017) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76(5):7445–7471

    Article  Google Scholar 

  34. Pevny T, Fridrich J, Ker AD (2011) From blind to quantitative steganalysis. IEEE Trans Inform Forens Secur 7(2):445–454

    Article  Google Scholar 

  35. Pfitzmann A (2000) Information hiding: third international workshop, IH’99, Dresden, Germany, September 29-October 1, 1999 Proceedings (No. 1768). Springer Science & Business Media, pp 61–76

  36. Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. In: 2016 International conference on research advances in integrated navigation systems (RAINS). IEEE, pp 1–8

  37. Provos N (2001) Defending against statistical steganalysis. In: 10th USENIX Security Symposium (USENIX Security 01)

  38. Rouse DM, Hemami SS (2008) Understanding and simplifying the structural similarity metric. In: 2008 15th IEEE international conference on image processing. IEEE, pp 1188–1191

  39. Sahu AK, Swain G (2019) An optimal information hiding approach based on pixel value differencing and modulus function. Wirel Pers Commun 108 (1):159–174

    Article  Google Scholar 

  40. Tsai D-M, Lin C-T, Chen J-F (2003) The evaluation of normalized cross correlations for defect detection. Pattern Recogn Lett 24:2525–2535

    Article  Google Scholar 

  41. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84

    Article  Google Scholar 

  42. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  43. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proceedings-Vision Image and Signal Processing 152(5):611–615

    Article  Google Scholar 

  44. Yang G, Li X, Wang J, Guo Z (2018) Efficient large payloads ternary matrix embedding. Multimed Tools Appl 77(2):1605–1622

    Article  Google Scholar 

  45. Zeckendorf E (1972) Representations des nombres naturels par une somme de nombres de fibonacci on de nombres de lucas. Bulletin de La Society Royale des Sciences de Liege, 179–182

  46. Zielińska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 57(3):86–95

    Article  Google Scholar 

  47. Zitzmann C, Cogranne R, Retraint F, Nikiforov I, Fillatre L, Cornu P (2011) Statistical decision methods in hidden information detection. In: International workshop on information hiding. Springer, Berlin, pp 163–177

  48. Zou J, Ward RK, Qi D (2004) A new digital image scrambling method based on Fibonacci numbers. In: 2004 IEEE International Symposium on Circuits and Systems (ISCAS), vol 3. IEEE, pp III-965

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imon Mukherjee.

Ethics declarations

Funding and/or Conflicts of interests/Competing interests

-- The authors did not receive support from any organization for the submitted work.

-- The authors have no relevant financial or non-financial interests to disclose.

-- The authors have no competing interests to declare that are relevant to the content of this article.

-- All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

-- The authors have no financial or proprietary interests in any material discussed in this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mukherjee, I., Paul, G. High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels. Multimed Tools Appl 83, 5181–5206 (2024). https://doi.org/10.1007/s11042-023-15504-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15504-9

Keywords

Navigation