Abstract
This paper introduces a steganography technique using the concept of virtual bit-plane. Purposely another number system has been used in this technique instead of binary to hide the target data. After that embedding of target data is done on different bit-planes. Here for conversion, Lucas Number system is used. The Lucas sequence is almost similar to Fibonacci, instead 1 and 2 it starts with 2 and 1. It helps to increase robustness by embedding data at the second bit-plane with a slight change of ±1. Here for embedding target data, Blue and Green channels of RGB color image are used. Red channel is used as indicator for proper extraction of target data at the receiver side. The indicator is used to avoid lexicographically higher order to consider for number representation. It may seem that the use of two channels for embedding reduces the capacity. But it does not really happen. The skip of pixel to follow Zekendrof’s rule for handling redundant representation by other existing methods, make the proposed one more capacitive than other. In order to establish its efficiency over the state-of-art-works the proposed method is analyzed by using different parameters and compared with relevant techniques. It has been found from the tested result that the proposed one is better. The stego quality of the method is also maintained along with the robustness and capacity. The PSNR of the proposed method is within the acceptable range, even in the highest embedding capacity.
Similar content being viewed by others
References
A. A. Abdulla, S. A. Jassim , H. Sellahewa, Efficient high-capacity steganography technique, proceedings of SPIE 8755 Mobile multimedia/image processing, security, and applications 8755 (2013).
A. A. Abdulla, H. Sellahewa, S. A. Jassim, Steganography based on pixel intensity value decomposition, proceedings of SPIE 9120 Mobile multimedia/image processing, security, and applications 9120 (2014).
A. A. Abdulla, H. Sellahewa, S. A. Jassim, Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping, Security Standardisation Research (SSR 2014), Lecture notes in computer science 8893, Springer, Cham, (2014) 151–166.
Andreas W, Pfitzmann A (1999) Attacks on Steganographic systems: breaking the Steganographic utilities EzStego, Jsteg, Steganos, and S-tools–and some lessons learned. Third International Workshop on Information Hiding:61–76
N. G. Aroukatos, K. Mane, S. Zimeras, F. Georgiakodis, Data hiding techniques in steganography using Fibonacci and Catalan numbers, Proceedings Ninth International Conference on Information Technology- New Generations, USA, 2012.
Aroukatos NG, Mane K, Zimeras S, Georgiakodis F (2014) Techniques in image steganography using famous number sequences. International Journal of Advanced Computer Science 4(12):544–549
F. Battisti, M. Carli, A. Neri, K. Egiaziarian, A generalized Fibonacci LSB data hiding technique, proceedings third international conference on computers and devices for communication (CODEC 06), India 2006.
Brown JL Jr (1969) Unique representation of integers as sums of distinct Lucas numbers. Fib Quart 7:243–252
Cachin C (2004) An Informationtheoretic model for steganography. Inf Comput 192(1):41–56
W. Cao, Y. Zhou, C. L. P. Chen, A new image encryption algorithm using truncated P-Fibonacci bit-planes, proceedings IEEE international conference on systems, man, and cybernetics, South Korea (2012) 1185–1188.
Carlitz L, Scoville R, Hoggatt VE Jr (1972) Fibonacci Representations. The Fibonacci Quarterly 10(1):l–28
Cha SH, Srihari SN (2002) On measuring the distance between histograms. Pattern Recognition, the Journal of Pattern Recognition Society 35:1355–1370
Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37:469–474
Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Elsevier Signal Processing 90:727–752
R. Crandall, C. Pomerance, Prime numbers: a computational perspective (2nd ed.), Berlin, New York Springer-Verlag (2005).
S. Dey, A. Abraham, S. Sanyal , An LSB data hiding technique using natural numbers, proceedings third IEEE international conference on intelligent information hiding and multimedia signal processing (IIHMSP07), Taiwan, IEEE computer society press, USA, (2007) 473–476.
S. Dey, A. Abraham, S. Sanyal, An LSB data hiding technique using prime numbers, third international symposium on information assurance and security, Manchester, United Kingdom, IEEE computer society press, USA, (2007) 101–106.
Dey S, Al-Qaheri H, Sane S, Sanyal S (2010) A note on the bounds for the generalized Fibonacci-p-sequence and its application in data hiding. Int J Comput Sci Appl 7(4):1–15
Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007
D. Dumitrescu, I. M. Stan, E. Simion, Steganography techniques, IACR Cryptology ePrint Archive (2017) pp. 341–361.
Fridrich J, Kodovsk J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868–882
V. E. Hoggatt, Jr., Fibonacci and Lucas numbers, Fibonacci Association Publication, 1969.
Hoggatt VE Jr, Bicknell-Johnson M (1982) Lexicographic ordering and Fibonacci representations. The Fibonacci Quarterly 20(3):193–218
Hussain M, Wahab AWA, Javed N, Jung KH (2016) Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images. Symmetry 8(6):41
Hussain M, Wahab AWA, Javed N, Jung KH (2016) Recursive information hiding scheme through LSB, PVD shift, and MPE. IETE Tech Rev:1–11
Hussain M, Wahab AWA, Ho ATS, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57
Hussain M, Wahab AWA, Idris YIB, Ho ATS, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66
A. D. Ker, R. Böhme, Revisiting Weighted Stego Image Steganalysis, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Proceedings of SPIE 6819 Electronic Imaging, 6819 (2008) 501–517.
Kodak Lossless True Color Image Suite n.d., Available at http://r0k.us/graphics/kodak/
Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems, electronic imaging '99. Security and Watermarking of Multimedia Contents 3657:219–239
Lin YT, Wang CM, Chen WS, Lin FP, Lin W (2017) A novel data hiding algorithm for high dynamic range images. IEEE Transactions on Multimedia 19(1):196–211
E. Mammi, F. Battisti, M. Carli, A. Neri, K. Egiazarian, A novel spatial data hiding scheme based on generalized Fibonacci sequences, proceedings of SPIE 6982, Mobile multimedia/image processing, security, and applications, 6982 (2008).
E. Mammi, F. Battisti, M. Carli, A. Neri, K. Egiazarian, Substitutive steganography in the generalized Fibonacci domain, proceedings of SPIE 7245, image processing: algorithms and systems VII 7245 (2009).
H. Michiel, Lucas polynomials, Encyclopedia of Mathematics, Springer (2001).
T. D. Nguyen, S. Arch-int, A secure steganographic algorithm based on cellular automata using Fibonacci representation, proceedings IEEE international conference on Information Science and Applications (ICISA), South Korea, 2013.
C. Patsakis, E. Fountas, Extending Fibonacci LSB data hiding technique to more integer bases, proceedings third IEEE international conference on advanced computer theory and engineering (ICACTE), China (2010) 18–21.
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proceedings IEEE, special issue on protection of multimedia content 87(7):1062–1078
Pund-Dange S, Desai CG (2017) Data hiding technique using Catalan-Lucas number sequence. Indian J Sci Technol 10(4):1–6
Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Elsevier International Journal of Information Sciences 277:90–101
The information hiding homepage, Photo Database n.d., Available at http://www.petitcolas.net/watermarking/image_database
USC-SIPI Image Database n.d., Vol. 3: Miscellaneous, Available at http://sipi.usc.edu/database/
Vyas AO, Dudul SV (2015) An overview of image Steganographic techniques. Int J Adv Res Comput Sci 6(5):67–72
Weisstein, W. Eric, Zeckendorf's Theorem, MathWorld - A Wolfram Web, Available at http://mathworld.wolfram.com/ZeckendorfsTheorem.html.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Datta, B., Dutta, K. & Roy, S. Data hiding in virtual bit-plane using efficient Lucas number sequences. Multimed Tools Appl 79, 22673–22703 (2020). https://doi.org/10.1007/s11042-020-08979-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08979-3