Substitutive steganography in the generalized Fibonacci domain

نویسندگان

  • Elena Mammi
  • Federica Battisti
  • Marco Carli
  • Alessandro Neri
  • Karen O. Egiazarian
چکیده

In this contribution the robustness of a novel steganographic scheme based on the generalized Fibonacci sequence against Chi-square attacks is investigated. In essence, an image is first represented in a basis defined by a generalized Fibonacci sequence. Then the secret data are inserted by substitution technique into selected bit planes preserving the first order distributions, and finally, the inverse Fibonacci decomposition is applied to obtain the stego-image. Secret data are scrambled before the embedding to improve the security of the whole system. In order to perform Chi-square attacks, the knowledge of both the parameters determining the binary Fibonacci representation of an image is assumed. Experimental results show that no visual impairments are introduced and the probability of detecting the presence of hidden data is small even if a modest capacity loss is present.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Note on the Bounds for the Generalized Fibonacci-P-Sequence and its Application in Datahiding

In this paper, we suggest a lower and an upper bound for the Generalized Fibonaccip-Sequence, for different values of p. The Fibonacci-p-Sequence is a generalization of the Classical Fibonacci Sequence. We first show that the ratio of two consecutive terms in generalized Fibonacci sequence converges to a p-degree polynomial and then use this result to prove the bounds for generalized Fibonacci-...

متن کامل

A Generalized Fibonacci Sequence and the Diophantine Equations $x^2pm kxy-y^2pm x=0$

In this paper some properties of a generalization of Fibonacci sequence are investigated. Then we solve the Diophantine equations $x^2pmkxy-y^2pm x=0$, where $k$ is positive integer, and describe the structure of solutions.

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

Non-Abelian Sequenceable Groups Involving ?-Covers

A non-abelian finite group is called sequenceable if for some positive integer , is -generated ( ) and there exist integers such that every element of is a term of the -step generalized Fibonacci sequence , , , . A remarkable application of this definition may be find on the study of random covers in the cryptography. The 2-step generalized sequences for the dihedral groups studi...

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009