In this contribution the robustness of a novel steganographic scheme based on the generalized Fibonacci sequence against Chi-square attacks is investigated. In essence, an image is first represented in a basis defined by a generalized Fibonacci sequence. Then the secret data are inserted by substitution technique into selected bit planes preserving the first order distributions, and finally, the inverse Fibonacci decomposition is applied to obtain the stego-image. Secret data are scrambled before the embedding to improve the security of the whole system. In order to perform Chi-square attacks, the knowledge of both the parameters determining the binary Fibonacci representation of an image is assumed. Experimental results show that no visual impairments are introduced and the probability of detecting the presence of hidden data is small even if a modest capacity loss is present. © 2009 SPIE-IS&T.
Mammi, E., Battisti, F., Carli, M., Neri, A., Egiazarian, K. (2009). Substitutive steganography in the generalized fibonacci domain. In Proceedings of SPIE - The International Society for Optical Engineering (pp.72450P) [10.1117/12.807535].
Substitutive steganography in the generalized fibonacci domain
MAMMI, ELENA;BATTISTI, FEDERICA;CARLI, Marco;NERI, Alessandro;
2009-01-01
Abstract
In this contribution the robustness of a novel steganographic scheme based on the generalized Fibonacci sequence against Chi-square attacks is investigated. In essence, an image is first represented in a basis defined by a generalized Fibonacci sequence. Then the secret data are inserted by substitution technique into selected bit planes preserving the first order distributions, and finally, the inverse Fibonacci decomposition is applied to obtain the stego-image. Secret data are scrambled before the embedding to improve the security of the whole system. In order to perform Chi-square attacks, the knowledge of both the parameters determining the binary Fibonacci representation of an image is assumed. Experimental results show that no visual impairments are introduced and the probability of detecting the presence of hidden data is small even if a modest capacity loss is present. © 2009 SPIE-IS&T.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.