<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
<journal-title-group><journal-title>Informatica</journal-title></journal-title-group>
<issn pub-type="epub">1822-8844</issn><issn pub-type="ppub">0868-4952</issn><issn-l>0868-4952</issn-l>
<publisher>
<publisher-name>Vilnius University</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">INFOR606</article-id>
<article-id pub-id-type="doi">10.15388/25-INFOR606</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Research Article</subject></subj-group></article-categories>
<title-group>
<article-title>A Steganographic Scheme Based on Perfect Coverings of Dichotomous Shares with Sparse Observation Windows</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Saunoriene</surname><given-names>Loreta</given-names></name><email xlink:href="loreta.saunoriene@ktu.lt">loreta.saunoriene@ktu.lt</email><xref ref-type="aff" rid="j_infor606_aff_001">1</xref><bio>
<p><bold>L. Saunoriene</bold> received the PhD degree from Kaunas University of Technology in 2007. Since 2011, she has been an associate professor at the Department of Mathematical Modelling at Kaunas University of Technology. Her research interests focus on the analysis and modelling of nonlinear systems.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Ragulskiene</surname><given-names>Jurate</given-names></name><email xlink:href="jurate.ragulskiene@ktu.lt">jurate.ragulskiene@ktu.lt</email><xref ref-type="aff" rid="j_infor606_aff_001">1</xref><bio>
<p><bold>J. Ragulskiene</bold> received the PhD degree from Lithuanian University of Agricultural Sciences and since 2010 she has been an associate professor at the Department of Mathematical Modelling at Kaunas University of Technology. Her research interests are focused on numerical algorithms and simulations.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Saunoris</surname><given-names>Marius</given-names></name><email xlink:href="marius.saunoris@ktu.lt">marius.saunoris@ktu.lt</email><xref ref-type="aff" rid="j_infor606_aff_002">2</xref><bio>
<p><bold>M. Saunoris</bold> received the PhD degree from Kaunas University of Technology in 2007. Since 2009, he has been an associate professor at the Department of Electronics Engineering at Kaunas University of Technology. His research interests include computer simulation and signal processing techniques.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Ragulskis</surname><given-names>Minvydas</given-names></name><email xlink:href="minvydas.ragulskis@ktu.lt">minvydas.ragulskis@ktu.lt</email><xref ref-type="aff" rid="j_infor606_aff_001">1</xref><xref ref-type="corresp" rid="cor1">∗</xref><bio>
<p><bold>M. Ragulskis</bold> received the PhD degree from Kaunas University of Technology and since 2005 he has been a full professor at the Department of Mathematical Modelling at Kaunas University of Technology. His research interests are focused on nonlinear and complex systems.</p></bio>
</contrib>
<aff id="j_infor606_aff_001"><label>1</label><institution>Kaunas University of Technology</institution>, Department of Mathematical Modelling, Studentu st. 50-146, 51368 Kaunas, <country>Lithuania</country></aff>
<aff id="j_infor606_aff_002"><label>2</label><institution>Kaunas University of Technology</institution>, Department of Electronics Engineering, Studentu st. 50-443, 51368 Kaunas, <country>Lithuania</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2025</year></pub-date><pub-date pub-type="epub"><day>27</day><month>10</month><year>2025</year></pub-date><volume>36</volume><issue>4</issue><fpage>959</fpage><lpage>984</lpage><history><date date-type="received"><month>4</month><year>2025</year></date><date date-type="accepted"><month>10</month><year>2025</year></date></history>
<permissions><copyright-statement>© 2025 Vilnius University</copyright-statement><copyright-year>2025</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>A steganographic scheme based on perfect coverings of dichotomous shares with sparse observation windows is presented in this paper. The manipulations with pixels are based on the number of different colours in the sparse cells of the current observation window. The conditions for the existence of perfect coverings for different architectures of sparse observation windows are derived. The number and distribution of active cells in the current observation window contribute to the additional security of the proposed scheme. This paper also provides performance measures, statistical features, and demonstrates the robustness of the proposed steganographic scheme.</p>
</abstract>
<kwd-group>
<label>Key words</label>
<kwd>steganography</kwd>
<kwd>perfect covering</kwd>
<kwd>sparse observation window</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="j_infor606_s_001">
<label>1</label>
<title>Introduction</title>
<p>Image steganography is the science and art of hiding secret information within an image using various methods and techniques (Kaur <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_010">2022</xref>; Setiadi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_028">2023</xref>). Image steganography ensures that hidden data remain invisible to the human eye, allowing safe communication and data storage (Rahman <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_022">2023a</xref>).</p>
<p>Least significant bit (LSB) substitution is one of the most well-known techniques in spatial domain steganography. In LSB, the least significant bit of each pixel in the carrier image is modified to embed one bit of the dichotomous secret message (Kurak and McHugh, <xref ref-type="bibr" rid="j_infor606_ref_012">1992</xref>). These adjustments are almost imperceptible to the human eye. However, traditional bit plane analysis can easily uncover the hidden secret information (Wayner, <xref ref-type="bibr" rid="j_infor606_ref_031">2009</xref>; Sahu and Sahu, <xref ref-type="bibr" rid="j_infor606_ref_026">2020</xref>). In recent decades, various improvements of LSB steganography have been introduced making the detection of the concealed data more challenging. For example, two least significant bit (2LSB) technique enhances the conventional LSB method by embedding two bits of secret information into the last two bit planes of the carrier image (Khalind and Aziz, <xref ref-type="bibr" rid="j_infor606_ref_011">2015</xref>). In the random 2LSB technique, a single secret bit is inserted randomly into either the first or the second bit plane. Different manipulations with the indices of the bit planes are used to enhance the existing LSB techniques (Abdulla <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_001">2013</xref>; Al-Faydi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_003">2023</xref>; Njoum <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_021">2024</xref>).</p>
<p>Multiple Bit Planes Based (MBPB) steganography extends LSB methods by employing the bit planes with greater complexity for embedding secret data (Nguyen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_019">2006</xref>). LSB Matching technique (LSB-M) is a variation of LSB substitution, which adds or subtracts 1 from the pixel value instead of directly replacing the least significant bit (Luo <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_017">2010</xref>) what makes LSB-M technique more resistant to steganalysis than the standard LSB technique. Pixel Value Differencing (PVD) hides information by modifying the difference between two neighbouring pixel values (Hussain <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_009">2015</xref>). Larger differences allow more bits to be hidden, while smaller differences allow fewer bits.</p>
<p>The main challenges in image steganography include achieving a high embedding capacity and ensuring a high level of security (Aini <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_002">2019</xref>; Zhang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_035">2019</xref>; Li <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_014">2024</xref>; Liu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_015">2024</xref>). The security of a steganographic scheme largely depends on the effectiveness of its embedding strategy and is based on two key factors: imperceptibility, meaning the hidden data remains undetectable within the medium, and confidentiality, ensuring that only the intended recipient can detect and extract the concealed information (Ghoul <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_007">2023</xref>; Mukherjee and Paul, <xref ref-type="bibr" rid="j_infor606_ref_018">2024</xref>). Together, these factors protect the hidden content from unauthorized detection and access (Luo <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_016">2023</xref>; Sreenidhi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_030">2024</xref>).</p>
<p>The integration of adaptive embedding techniques, cryptography, and chaotic systems into the steganographic schemes can significantly enhance the security of the hidden information (Haverkamp and Sarmah, <xref ref-type="bibr" rid="j_infor606_ref_008">2024</xref>; Mukherjee and Paul, <xref ref-type="bibr" rid="j_infor606_ref_018">2024</xref>; Xing <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_034">2022</xref>). For example, embedding the secret information in the sparse representation of the carrier image, in the edge or noisy areas conceals data where it is least noticeable, reducing the risk of detection (Nipanikar <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_020">2018</xref>; Rashid and Majeed, <xref ref-type="bibr" rid="j_infor606_ref_025">2019</xref>; Setiadi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_029">2024</xref>; George <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_006">2024</xref>). Encrypting the hidden data before embedding ensures that the message remains unreadable, even if detected (Rahman <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_023">2023b</xref>; Rajabi-Ghaleh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_024">2024</xref>; Haverkamp and Sarmah, <xref ref-type="bibr" rid="j_infor606_ref_008">2024</xref>). Incorporating randomization and perturbations generated by different chaotic systems into steganographic schemes helps to hide the message in a way that makes it difficult to detect (Laimeche <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_013">2020</xref>; EL-Hady <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_005">2024</xref>; Aziz <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor606_ref_004">2015</xref>).</p>
<p>An alternative approach to the development of steganographic schemes is proposed in Saunoriene and Ragulskis (<xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>) where the concept of the Wada index is used to extend the classical LSB technique. In this scheme, the grayscale carrier image is covered by overlapping square windows of a specified size. The process of hiding secret information relies on manipulating the number of distinct grayscale levels within these overlapping windows (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). This scheme ensures that the bit planes of the resulting stego image do not reveal the hidden message. Furthermore, the stego image is resistant to steganalysis algorithms, and its payload capacity is comparable to that of grayscale LSB techniques (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>).</p>
<p>However, according to the “no-free-lunch” theorems (Wolpert and Macready, <xref ref-type="bibr" rid="j_infor606_ref_032">1997</xref>; Wolpert, <xref ref-type="bibr" rid="j_infor606_ref_033">2013</xref>), every algorithm has its drawbacks. A possible drawback of the steganographic scheme based on the Wada index is a rather simple decoding process. One needs to use an observation window (the size of the window must be predefined) and count the number of different colours in that window (of course, one needs to know that the number of different colours must be counted).</p>
<p>The primary objective of this paper is to introduce the concept of a sparse observation window into the steganographic scheme based on the Wada index. Sparse observation windows with randomly distributed active cells could seriously increase the confidentiality of the scheme (the distribution of active cells would serve as an additional secret key for the proposed scheme).</p>
<p>However, the decoding algorithm of the steganographic scheme based on the Wada index is rather simple because it is based on the computation of the number of different colours in the current observation window. The main contribution of this paper is the introduction of sparse observation windows. A straightforward computation of the number of different colours in the current observation window becomes insufficient for decoding the secret. This paper also answers a number of other important questions about the existence of perfect coverings, the structure of dichotomous shares, and the robustness of the proposed scheme to different attacks.</p>
<p>The paper is structured as follows. Preliminaries on the steganographic scheme based on the Wada index are given in Section <xref rid="j_infor606_s_002">2</xref>. Rectangular observation windows are discussed in Section <xref rid="j_infor606_s_007">3</xref>. Sparse observation windows are introduced in Section <xref rid="j_infor606_s_008">4</xref>. The security of the proposed steganographic scheme is investigated in Section <xref rid="j_infor606_s_012">5</xref>. The robustness of the proposed scheme is presented in Section <xref rid="j_infor606_s_013">6</xref>. Concluding remarks are given in the final section.</p>
</sec>
<sec id="j_infor606_s_002">
<label>2</label>
<title>Preliminaries and Motivation</title>
<p>The steganographic scheme based on the Wada index is introduced in Saunoriene and Ragulskis (<xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). The secret dichotomous image <italic>S</italic> is embedded into the grayscale carrier image <italic>C</italic> producing the grayscale stego image <italic>T</italic>. The size of the carrier and the stego images (measured in pixels) is <inline-formula id="j_infor606_ineq_001"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${n_{x}}\times {n_{y}}$]]></tex-math></alternatives></inline-formula>; the size of the rectangular observation window is <inline-formula id="j_infor606_ineq_002"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${r_{x}}\times {r_{y}}$]]></tex-math></alternatives></inline-formula>; the size of the secret image <italic>S</italic> is <inline-formula id="j_infor606_ineq_003"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>×</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$({n_{x}}-{r_{x}}+1)\times ({n_{y}}-{r_{y}}+1)$]]></tex-math></alternatives></inline-formula>. The carrier image <italic>C</italic> is split into <inline-formula id="j_infor606_ineq_004"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>·</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${r_{x}}\cdot {r_{y}}$]]></tex-math></alternatives></inline-formula> dichotomous shares <inline-formula id="j_infor606_ineq_005"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{k}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_006"><alternatives><mml:math>
<mml:mi mathvariant="italic">k</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mo>…</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>·</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[$k=1,2,\dots ,{r_{x}}\cdot {r_{y}}$]]></tex-math></alternatives></inline-formula>. The size of <inline-formula id="j_infor606_ineq_007"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{k}}$]]></tex-math></alternatives></inline-formula> is <inline-formula id="j_infor606_ineq_008"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>×</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$({n_{x}}-{r_{x}}+1)\times ({n_{y}}-{r_{y}}+1)$]]></tex-math></alternatives></inline-formula>.</p>
<fig id="j_infor606_fig_001">
<label>Fig. 1</label>
<caption>
<p>The decoding process of the standard steganographic scheme based on the Wada index. The size of the stego image is <inline-formula id="j_infor606_ineq_009"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$3\times 4$]]></tex-math></alternatives></inline-formula> pixels, and the size of the observation window is <inline-formula id="j_infor606_ineq_010"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> cells. The size of the secret image is <inline-formula id="j_infor606_ineq_011"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$2\times 3$]]></tex-math></alternatives></inline-formula> pixels which corresponds to all possible different locations of the observation window. The parameter <italic>m</italic> shows the number of different colours in the current observation window; <italic>i</italic> and <italic>j</italic> depict the coordinates of the current observation window; <inline-formula id="j_infor606_ineq_012"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{k}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_013"><alternatives><mml:math>
<mml:mi mathvariant="italic">k</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mo>…</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$k=1,\dots ,4$]]></tex-math></alternatives></inline-formula> are dichotomous shares (the number of shares is predefined by the size of the observation window). The disjunction of shares with odd indexes leaks the secret.</p>
</caption>
<graphic xlink:href="infor606_g001.jpg"/>
</fig>
<sec id="j_infor606_s_003">
<label>2.1</label>
<title>The Decoding Scheme</title>
<p>The schematic description of the standard steganographic scheme based on the Wada index is presented in Fig. <xref rid="j_infor606_fig_001">1</xref>. Let us consider <inline-formula id="j_infor606_ineq_014"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[${n_{x}}=3$]]></tex-math></alternatives></inline-formula>; <inline-formula id="j_infor606_ineq_015"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[${n_{y}}=4$]]></tex-math></alternatives></inline-formula>; <inline-formula id="j_infor606_ineq_016"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[${r_{x}}={r_{y}}=2$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_001">1</xref>). The decoding process of the standard scheme is based on the number of different colours (different grayscale levels) of pixels in the current observation window. The stego image <italic>T</italic> is covered by overlapping observation windows resulting into the size of the dichotomous secret <italic>S</italic> equal to <inline-formula id="j_infor606_ineq_017"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$2\times 3$]]></tex-math></alternatives></inline-formula> pixels (Fig. <xref rid="j_infor606_fig_001">1</xref>). The size of the observation window results into 4 dichotomous shares <inline-formula id="j_infor606_ineq_018"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{k}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_019"><alternatives><mml:math>
<mml:mi mathvariant="italic">k</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mo>…</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$k=1,\dots ,4$]]></tex-math></alternatives></inline-formula> (the size of all shares is <inline-formula id="j_infor606_ineq_020"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$2\times 3$]]></tex-math></alternatives></inline-formula> pixels). All cells of all shares <inline-formula id="j_infor606_ineq_021"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{k}}$]]></tex-math></alternatives></inline-formula> are set to zero at the beginning of the decoding process.</p>
<p>The number of different colours in the observation window located at the top left corner of the stego image <italic>T</italic> is <inline-formula id="j_infor606_ineq_022"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_001">1</xref>). The coordinates of this observation window are <inline-formula id="j_infor606_ineq_023"><alternatives><mml:math>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[$i=1$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor606_ineq_024"><alternatives><mml:math>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[$j=1$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_001">1</xref>). Since the number of different colours in this observation window is <inline-formula id="j_infor606_ineq_025"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula>, the third share <inline-formula id="j_infor606_ineq_026"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{3}}$]]></tex-math></alternatives></inline-formula> is modified. The cell of <inline-formula id="j_infor606_ineq_027"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${H_{3}}$]]></tex-math></alternatives></inline-formula> located at the local coordinates <inline-formula id="j_infor606_ineq_028"><alternatives><mml:math>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[$i=1$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor606_ineq_029"><alternatives><mml:math>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[$j=1$]]></tex-math></alternatives></inline-formula> is flipped from zero to one (Fig. <xref rid="j_infor606_fig_001">1</xref>). The process is continued until the observation window reaches the bottom left corner of the stego image <italic>T</italic> (<inline-formula id="j_infor606_ineq_030"><alternatives><mml:math>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$i=2$]]></tex-math></alternatives></inline-formula>; <inline-formula id="j_infor606_ineq_031"><alternatives><mml:math>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$j=3$]]></tex-math></alternatives></inline-formula>). Finally, the disjunction of shares with odd indexes leaks the dichotomous secret <italic>S</italic> (Fig. <xref rid="j_infor606_fig_001">1</xref>).</p>
<p>The decoding scheme of the secret image <italic>S</italic> is represented as the disjunction of shares with odd indexes: 
<disp-formula id="j_infor606_eq_001">
<label>(1)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="right">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">→</mml:mo>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">⋁</mml:mo></mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">k</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo fence="true" stretchy="false">[</mml:mo><mml:mstyle displaystyle="false">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>·</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo fence="true" stretchy="false">]</mml:mo>
</mml:mrow>
</mml:munderover>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi mathvariant="italic">k</mml:mi>
<mml:mo>−</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>×</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>=</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>×</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {T^{{n_{x}}\times {n_{y}}}}\to {\underset{k=1}{\overset{[\frac{{r_{x}}\cdot {r_{y}}}{2}]}{\bigvee }}}{H_{2k-1}^{({n_{x}}-{r_{x}}+1)\times ({n_{y}}-{r_{y}}+1)}}={S^{({n_{x}}-{r_{x}}+1)\times ({n_{y}}-{r_{y}}+1)}},\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor606_ineq_032"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>.</mml:mo>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[.]$]]></tex-math></alternatives></inline-formula> denotes the rounding operation.</p>
<fig id="j_infor606_fig_002">
<label>Fig. 2</label>
<caption>
<p>A schematic diagram illustrating how the number of different colours in the current observation window can be changed. The size of the observation window is <inline-formula id="j_infor606_ineq_033"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> cells; the modifications are allowed only in the bottom right cell. Panel (a) depicts a situation when the number of different colours <inline-formula id="j_infor606_ineq_034"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula> is increased to 4 (note that it is impossible to decrease <italic>m</italic> to 2). The number 140 can be decreased by 1 or increased by 1. Both options result into a minimal modification equal to 1. Panel (b) also illustrates the increase of <inline-formula id="j_infor606_ineq_035"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula> to 4. However, it is not possible to decrease 35 by 1 (that would result into <inline-formula id="j_infor606_ineq_036"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula>). The minimal modification is possible only by adding 1 to 35. Panel (c) shows the situation when <inline-formula id="j_infor606_ineq_037"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula> is decreased to 2 (note that it is impossible to increase <inline-formula id="j_infor606_ineq_038"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula> to 4). The minimal modification is executed by <inline-formula id="j_infor606_ineq_039"><alternatives><mml:math>
<mml:mn>50</mml:mn>
<mml:mo>−</mml:mo>
<mml:mn>25</mml:mn>
<mml:mo>=</mml:mo>
<mml:mn>25</mml:mn></mml:math><tex-math><![CDATA[$50-25=25$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="infor606_g002.jpg"/>
</fig>
</sec>
<sec id="j_infor606_s_004">
<label>2.2</label>
<title>The Encoding Scheme</title>
<p>Such a straightforward decoding scheme defines the structure of the encoding algorithm. Let us consider the current <inline-formula id="j_infor606_ineq_040"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> observation window resulting into <inline-formula id="j_infor606_ineq_041"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula> different colours (Fig. <xref rid="j_infor606_fig_002">2</xref>). Let us assume that the coordinates of the current observation window are <inline-formula id="j_infor606_ineq_042"><alternatives><mml:math>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi></mml:math><tex-math><![CDATA[$i,j$]]></tex-math></alternatives></inline-formula>. No modifications are required in the current observation window if <inline-formula id="j_infor606_ineq_043"><alternatives><mml:math>
<mml:mi mathvariant="italic">S</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[$S(i,j)=1$]]></tex-math></alternatives></inline-formula> because <inline-formula id="j_infor606_ineq_044"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[${H_{3}}(i,j)=1$]]></tex-math></alternatives></inline-formula> and the disjunction of shares with odd indexes will result into 1. However, modifications are required in the current observation window if <inline-formula id="j_infor606_ineq_045"><alternatives><mml:math>
<mml:mi mathvariant="italic">S</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo>
<mml:mn>0</mml:mn></mml:math><tex-math><![CDATA[$S(i,j)=0$]]></tex-math></alternatives></inline-formula>. Then, the number of different colours in the current observation window should be changed to <inline-formula id="j_infor606_ineq_046"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$m=2$]]></tex-math></alternatives></inline-formula> or <inline-formula id="j_infor606_ineq_047"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$m=4$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_002">2</xref>).</p>
<p>Let us assume that the modifications in the current observation window are allowed only in the bottom right cell (marked in gray in Fig. <xref rid="j_infor606_fig_002">2</xref>). Figure <xref rid="j_infor606_fig_002">2</xref>(a) depicts a situation when <italic>m</italic> cannot be decreased to 2 (the modifications are allowed only in the bottom right cell). The number 140 can be decreased by 1 or increased by 1. Both options result into a minimal modification equal to 1.</p>
<p>Figure <xref rid="j_infor606_fig_002">2</xref>(b) also illustrates a situation when <italic>m</italic> can be only increased to 4. However, it is not possible to decrease 35 by 1 (that would result into <inline-formula id="j_infor606_ineq_048"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula>). The minimal modification is possible only by adding 1 to 35.</p>
<p>Finally, Fig. <xref rid="j_infor606_fig_002">2</xref>(c) illustrates the situation when <inline-formula id="j_infor606_ineq_049"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula> is decreased to 2 (note that it is impossible to increase <inline-formula id="j_infor606_ineq_050"><alternatives><mml:math>
<mml:mi mathvariant="italic">m</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$m=3$]]></tex-math></alternatives></inline-formula> to 4). The minimal modification is executed by <inline-formula id="j_infor606_ineq_051"><alternatives><mml:math>
<mml:mn>50</mml:mn>
<mml:mo>−</mml:mo>
<mml:mn>25</mml:mn>
<mml:mo>=</mml:mo>
<mml:mn>25</mml:mn></mml:math><tex-math><![CDATA[$50-25=25$]]></tex-math></alternatives></inline-formula>.</p>
</sec>
<sec id="j_infor606_s_005">
<label>2.3</label>
<title>The Concept of the Perfect Covering</title>
<p>Without loss of generality, consider a carrier image <italic>C</italic> of size <inline-formula id="j_infor606_ineq_052"><alternatives><mml:math>
<mml:mn>5</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>5</mml:mn></mml:math><tex-math><![CDATA[$5\times 5$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_003">3</xref>(a)). The <inline-formula id="j_infor606_ineq_053"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> observation window is used to encode the <inline-formula id="j_infor606_ineq_054"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> secret image <italic>S</italic> into the carrier image <italic>C</italic> (Fig. <xref rid="j_infor606_fig_003">3</xref>). Let us assume that the observation window (depicted by the highlighted rectangle) is initially placed at the top left corner of the carrier image.</p>
<p>The number of different colours in the current observation window can be changed (if required) by modifying the value in the cell positioned at the bottom right corner of the observation window (the modifying cell is marked in gray in Fig. <xref rid="j_infor606_fig_003">3</xref>). The local coordinates of the modifying cell are <inline-formula id="j_infor606_ineq_055"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(2,2)$]]></tex-math></alternatives></inline-formula>. When the first modification is made (indicated by “1”), the observation window travels by one pixel to the right. Green arrows indicate the travel direction of the current observation window and the numbers mark the sequential order of modifications. After each modification, the observation window travels by one pixel to the right until it reaches the right edge of the carrier image. Then the observation window travels by one pixel downwards, and the process is repeated from the left edge of the carrier image. The process continues until the observation window reaches the bottom right corner of the carrier image.</p>
<fig id="j_infor606_fig_003">
<label>Fig. 3</label>
<caption>
<p>The construction of the perfect covering scheme requires three different definitions. The first is the size and the initial position of the observation window (the <inline-formula id="j_infor606_ineq_056"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> highlighted rectangle). The second is the location of the cell where the modifications are allowed inside the current observation window (marked as a gray-shaded cell in the initial observation window). Finally, the covering strategy must be defined (marked by green arrows). The perfect covering ensures that the change in the current observation window does not cause any changes in all previous observation windows (in terms of the number of different colours). Different perfect coverings are depicted in panels (a), (b), (c), and (d).</p>
</caption>
<graphic xlink:href="infor606_g003.jpg"/>
</fig>
<p>Such a covering scheme is a perfect covering scheme, as the changes in the current observation window do not change the number of different colours in any previous observation windows (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). This covering scheme is denoted as the perfect covering scheme <inline-formula id="j_infor606_ineq_057"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(2,2)}}$]]></tex-math></alternatives></inline-formula> (the numbers in the subscript denote the size of the observation window; the numbers in the superscript denote the local coordinates of the modifying cell).</p>
<p>Note that the perfect covering scheme <inline-formula id="j_infor606_ineq_058"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(2,2)}}$]]></tex-math></alternatives></inline-formula> can be executed by moving the observation windows horizontally or vertically over the carrier image <italic>C</italic> (Fig. <xref rid="j_infor606_fig_003">3</xref>(a)). However, both vertical and horizontal encodings result in the same stego image <italic>T</italic> (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>).</p>
</sec>
<sec id="j_infor606_s_006">
<label>2.4</label>
<title>The Motivation of this Paper</title>
<p>The existing steganographic scheme based on the Wada index (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>) possesses a number of advantageous features. The statistical performance measures of the steganographic scheme based on the Wada index are comparable with the performance measures of the best LSB-type schemes (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). The payload capacity of the carrier image is also comparable to grayscale LSB schemes (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). The secret information is encoded into the different bit planes which guarantees that the secret image is not revealed from the bit planes with lower indexes (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). Moreover, the proposed scheme is robust to the steganalysis algorithms (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>).</p>
<p>The well-known “no-free-lunch” theorems (Wolpert and Macready, <xref ref-type="bibr" rid="j_infor606_ref_032">1997</xref>; Wolpert, <xref ref-type="bibr" rid="j_infor606_ref_033">2013</xref>) imply that every algorithm has some drawbacks in specific conditions and situations. One of the potential drawbacks of the steganographic scheme based on the Wada index (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>) is a rather simple decoding scheme. It is sufficient to compute the number of different colours in the current observation window (applied to the carrier image <italic>C</italic>) to identify the current pixel in the secret image <italic>S</italic> (of course, the eavesdropper would need to know the size of the observation window, and that the number of different colours must be counted).</p>
<p>The motivation of this paper is to propose a very different approach to the structure of the observation window. It is not necessary to count the number of different colours in all cells of the current observation window. The number (and the distribution) of active cells inside the current observation window could be a parameter contributing to the additional security of the steganographic scheme. Of course, such modifications of the observation window raise many important questions about the existence of the perfect covering scheme, about the applicable patterns of the distribution of active cells in the observation window, about the statistical features of such a steganographic scheme. Seeking answers to those questions is the main objective of this paper.</p>
</sec>
</sec>
<sec id="j_infor606_s_007">
<label>3</label>
<title>Rectangular Observation Windows</title>
<p>As defined previously, <inline-formula id="j_infor606_ineq_059"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(2,2)}}$]]></tex-math></alternatives></inline-formula> is a <inline-formula id="j_infor606_ineq_060"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> perfect covering scheme with the modifying cell located at the local coordinates <inline-formula id="j_infor606_ineq_061"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(2,2)$]]></tex-math></alternatives></inline-formula>.</p>
<p>What happens if the observation window is initially placed at any other corner of the carrier image, not necessarily at the top left corner (Fig. <xref rid="j_infor606_fig_003">3</xref>(b)–(d))?</p>
<p>Positioning the observation window at the left-bottom corner of the carrier image can also result in a perfect covering (Fig. <xref rid="j_infor606_fig_003">3</xref>(b)) if the coordinates of the modifying cell are set to <inline-formula id="j_infor606_ineq_062"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(1,2)$]]></tex-math></alternatives></inline-formula> and the travel direction is set from left to right (horizontal perfect covering) or from bottom to top (vertical perfect covering) as illustrated in Fig. <xref rid="j_infor606_fig_003">3</xref>(b). Such a covering scheme is denoted as <inline-formula id="j_infor606_ineq_063"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(1,2)}}$]]></tex-math></alternatives></inline-formula>.</p>
<p>Similarly, a perfect covering can be constructed by setting the initial position of the observation window at the bottom right corner of the carrier image and placing the modifying cell at local coordinates <inline-formula id="j_infor606_ineq_064"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(1,1)$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_003">3</xref>(c)). Such a covering scheme is denoted as <inline-formula id="j_infor606_ineq_065"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(1,1)}}$]]></tex-math></alternatives></inline-formula>.</p>
<p>Finally, placing the observation window at the top right corner of the carrier image and the modifying cell at local coordinates <inline-formula id="j_infor606_ineq_066"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(2,1)$]]></tex-math></alternatives></inline-formula> also results in a perfect covering (Fig. <xref rid="j_infor606_fig_003">3</xref>(d)). Such a covering scheme is denoted as <inline-formula id="j_infor606_ineq_067"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(2,1)}}$]]></tex-math></alternatives></inline-formula>.</p>
<p>Note that the horizontal and vertical perfect covering schemes depicted in Fig. <xref rid="j_infor606_fig_003">3</xref>(b) result in identical stego images (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). The same holds true for the horizontal and vertical perfect coverings depicted in panels (c)–(d). However, we will show that schemes <inline-formula id="j_infor606_ineq_068"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(2,2)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_069"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(2,1)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_070"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(1,2)}}$]]></tex-math></alternatives></inline-formula>, and <inline-formula id="j_infor606_ineq_071"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(1,1)}}$]]></tex-math></alternatives></inline-formula> do produce different stego images.</p>
<fig id="j_infor606_fig_004">
<label>Fig. 4</label>
<caption>
<p>The initial position of the observation window, the location of the modifying cell, and the covering strategy must be properly organized to yield a perfect covering. Panel (a) shows a perfect covering where the initial observation window is placed at the top left corner of the carrier image, the modifying cell is at the bottom right corner, and the covering strategy is horizontal (Fig. <xref rid="j_infor606_fig_003">3</xref>(a)). Panel (b) depicts a conflict in step 3 (the initial observation window is placed at the top left corner of the carrier image, the modifying cell is at the top right corner, and the covering strategy is horizontal (Fig. <xref rid="j_infor606_fig_003">3</xref>(a))). Panel (c) shows a conflict already in step 2 (the initial observation window is placed at the top right corner of the carrier image, the modifying cell is at the bottom right corner, and the covering strategy is horizontal (Fig. <xref rid="j_infor606_fig_003">3</xref>(d))).</p>
</caption>
<graphic xlink:href="infor606_g004.jpg"/>
</fig>
<p>One should be careful with the selection of the horizontal and vertical travel directions for each particular perfect covering scheme. For example, a straightforward application of the horizontal left-to-right strategy may fail if the local coordinates of the modifying cell are not properly defined (Fig. <xref rid="j_infor606_fig_004">4</xref>). Figure <xref rid="j_infor606_fig_004">4</xref>(a) illustrates the perfect scheme <inline-formula id="j_infor606_ineq_072"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(2,2)}}$]]></tex-math></alternatives></inline-formula> (the size of the carrier image is <inline-formula id="j_infor606_ineq_073"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$3\times 3$]]></tex-math></alternatives></inline-formula>).</p>
<fig id="j_infor606_fig_005">
<label>Fig. 5</label>
<caption>
<p>The modifying cell must be located at one of the corners of the rectangular observation window. Otherwise, any combination of the initial position of the observation window and the covering strategy will result into conflicts. The conflict occurs in step 2 when the initial observation window is placed at the top left corner of the carrier image, the modifying cell is the bottom middle cell of the <inline-formula id="j_infor606_ineq_074"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$3\times 3$]]></tex-math></alternatives></inline-formula> observation window, and the covering strategy is horizontal (Fig. <xref rid="j_infor606_fig_003">3</xref>(a)).</p>
</caption>
<graphic xlink:href="infor606_g005.jpg"/>
</fig>
<p>However, <inline-formula id="j_infor606_ineq_075"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(1,2)}}$]]></tex-math></alternatives></inline-formula> is not a perfect covering scheme for the same left-to-right travel strategy (the first conflict occurs at the third step depicted in red in Fig. <xref rid="j_infor606_fig_004">4</xref>(b)). Analogously, <inline-formula id="j_infor606_ineq_076"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{2\times 2}^{(2,2)}}$]]></tex-math></alternatives></inline-formula> is not a perfect scheme if the horizontal right-to-left strategy is used (the first conflict is generated at the second step marked in red in Fig. <xref rid="j_infor606_fig_004">4</xref>(c)).</p>
<p>So far, only <inline-formula id="j_infor606_ineq_077"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> observation windows have been discussed. It appears that the modifying cells should be placed only in the corners of the rectangular observation window (this condition is automatically fulfilled for <inline-formula id="j_infor606_ineq_078"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> observation windows). For example, both left-to-right and right-to-left travel strategies fail for the <inline-formula id="j_infor606_ineq_079"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,2)}}$]]></tex-math></alternatives></inline-formula> scheme (Fig. <xref rid="j_infor606_fig_005">5</xref>). The same holds true for the vertical bottom-to-top and top-to-bottom travel strategies. In other words, <inline-formula id="j_infor606_ineq_080"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,2)}}$]]></tex-math></alternatives></inline-formula> is not a perfect covering scheme.</p>
<p>Let us consider a secret dichotomous city-map image (<inline-formula id="j_infor606_ineq_081"><alternatives><mml:math>
<mml:mn>510</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>510</mml:mn></mml:math><tex-math><![CDATA[$510\times 510$]]></tex-math></alternatives></inline-formula> pixels) shown in Fig. <xref rid="j_infor606_fig_006">6</xref>. The city-map image is encoded into the grayscale Lena carrier image (<inline-formula id="j_infor606_ineq_082"><alternatives><mml:math>
<mml:mn>512</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>512</mml:mn></mml:math><tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> pixels). The size of the observation window used for the encoding is fixed to <inline-formula id="j_infor606_ineq_083"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$3\times 3$]]></tex-math></alternatives></inline-formula> pixels. Four different perfect covering schemes <inline-formula id="j_infor606_ineq_084"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,3)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_085"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,3)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_086"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,1)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_087"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,1)}}$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_003">3</xref>(a)–(d)) are used to encode the secret city-map image into the carrier Lena image.</p>
<p>It is interesting to observe that four perfect covering schemes yield four different stego images (the middle row in Fig. <xref rid="j_infor606_fig_006">6</xref>). Although no differences can be noticed by a naked eye, the modifications in the carrier image made during the encoding of the secret image into the carrier image are different (the bottom row in Fig. <xref rid="j_infor606_fig_006">6</xref>).</p>
<fig id="j_infor606_fig_006">
<label>Fig. 6</label>
<caption>
<p>The secret dichotomous city-map image (<inline-formula id="j_infor606_ineq_088"><alternatives><mml:math>
<mml:mn>510</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>510</mml:mn></mml:math><tex-math><![CDATA[$510\times 510$]]></tex-math></alternatives></inline-formula>) is encoded into the grayscale Lena carrier image (<inline-formula id="j_infor606_ineq_089"><alternatives><mml:math>
<mml:mn>512</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>512</mml:mn></mml:math><tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula>) employing four different perfect coverings in Fig. <xref rid="j_infor606_fig_003">3</xref>. The initial position of the <inline-formula id="j_infor606_ineq_090"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$3\times 3$]]></tex-math></alternatives></inline-formula> observation window is shown (out of scale) on top of the Lena image (the modifying cell is marked in green). Stego images produced by four different perfect coverings are depicted in panels (a), (b), (c), and (d) accordingly. The images in the bottom row of panels (a)–(d) illustrate the magnitude of the performed modifications.</p>
</caption>
<graphic xlink:href="infor606_g006.jpg"/>
</fig>
<p>The statistical measures such as the range of the performed changes, the mean error (ME), the mean absolute error (MAE), the mean square error (MSE), the peak-signal-to-noise ratio (PSNR), the structural similarity index (SSIM) describe the difference between the original carrier and stego images and help to evaluate the performance of the employed steganographic scheme. The values of these performance measures are presented in Table <xref rid="j_infor606_tab_001">1</xref> for each perfect covering scheme <inline-formula id="j_infor606_ineq_091"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,3)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_092"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,3)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_093"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,1)}}$]]></tex-math></alternatives></inline-formula>, and <inline-formula id="j_infor606_ineq_094"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,1)}}$]]></tex-math></alternatives></inline-formula>. However, neither of the four coverings significantly outperforms the other.</p>
<table-wrap id="j_infor606_tab_001">
<label>Table 1</label>
<caption>
<p>Performance measures of the encoding algorithm for different perfect covering schemes.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Performance measure</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor606_ineq_095"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,3)}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor606_ineq_096"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,3)}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor606_ineq_097"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,1)}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor606_ineq_098"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,1)}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Range</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_099"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>139</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>143</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-139;143]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_100"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>128</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>75</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-128;75]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_101"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>156</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>110</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-156;110]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_102"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>83</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>130</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-83;130]$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">ME</td>
<td style="vertical-align: top; text-align: left">−0.0428</td>
<td style="vertical-align: top; text-align: left">−0.0706</td>
<td style="vertical-align: top; text-align: left">−0.0478</td>
<td style="vertical-align: top; text-align: left">−0.0085</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">MAE</td>
<td style="vertical-align: top; text-align: left">1.5710</td>
<td style="vertical-align: top; text-align: left">1.3077</td>
<td style="vertical-align: top; text-align: left">1.5204</td>
<td style="vertical-align: top; text-align: left">1.2987</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">MSE</td>
<td style="vertical-align: top; text-align: left">20.9018</td>
<td style="vertical-align: top; text-align: left">13.7056</td>
<td style="vertical-align: top; text-align: left">21.4416</td>
<td style="vertical-align: top; text-align: left">13.4223</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">PSNR</td>
<td style="vertical-align: top; text-align: left">34.9290</td>
<td style="vertical-align: top; text-align: left">36.7618</td>
<td style="vertical-align: top; text-align: left">34.8182</td>
<td style="vertical-align: top; text-align: left">36.8526</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">SSIM</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9692</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9758</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9689</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9760</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Therefore, changing the position of the modifying cell does not significantly increase the effectiveness of the encoding strategy (Table <xref rid="j_infor606_tab_001">1</xref>). Also, it is important to observe that the decoding of the secret information from the stego image does not depend on a particular encoding scheme <inline-formula id="j_infor606_ineq_103"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,3)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_104"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,3)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_105"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,1)}}$]]></tex-math></alternatives></inline-formula>, or <inline-formula id="j_infor606_ineq_106"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,1)}}$]]></tex-math></alternatives></inline-formula>. The decoding process requires to cover the stego image by overlapping observation windows in any order (and evaluate the number of different colours in each observation window). Therefore, the individual selection of a scheme (<inline-formula id="j_infor606_ineq_107"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,3)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_108"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,3)}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_109"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(1,1)}}$]]></tex-math></alternatives></inline-formula>, or <inline-formula id="j_infor606_ineq_110"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{3\times 3}^{(3,1)}}$]]></tex-math></alternatives></inline-formula>) has no impact on the safety of the decoding scheme.</p>
<p>So far, the <inline-formula id="j_infor606_ineq_111"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$2\times 2$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor606_ineq_112"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$3\times 3$]]></tex-math></alternatives></inline-formula> observation windows have been used in the perfect covering schemes. A natural question is whether better performance measures could be achieved when the size of the observation window is increased. Unfortunately, the results shown in Fig. <xref rid="j_infor606_fig_007">7</xref> do not indicate such an improvement. Computational experiments are continued with the secret dichotomous city-map image encoded into the grayscale Lena image using the perfect covering scheme <inline-formula id="j_infor606_ineq_113"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\mathcal{P}_{r\times r}^{(r,r)}}$]]></tex-math></alternatives></inline-formula>. The range of changes is not significantly decreased at <inline-formula id="j_infor606_ineq_114"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>20</mml:mn></mml:math><tex-math><![CDATA[$r=20$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_007">7</xref>). The minimum ME is reached at <inline-formula id="j_infor606_ineq_115"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$r=2$]]></tex-math></alternatives></inline-formula>, the minimum of MAE and MSE – at <inline-formula id="j_infor606_ineq_116"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$r=4$]]></tex-math></alternatives></inline-formula>. The maximum values of SSIM and PSNR are achieved at <inline-formula id="j_infor606_ineq_117"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$r=4$]]></tex-math></alternatives></inline-formula>.</p>
<p>Therefore, larger rectangular observation windows do not help to achieve better performance features and a higher security of the decoding scheme. Another approach is required to achieve these purposes.</p>
<fig id="j_infor606_fig_007">
<label>Fig. 7</label>
<caption>
<p>Performance measures of the standard steganographic scheme based on the Wada index for different sizes of the observation window. The secret dichotomous city-map image is encoded into the grayscale Lena image using the perfect covering scheme depicted in Fig. <xref rid="j_infor606_fig_006">6</xref>(a). The size of the square observation window is set to <inline-formula id="j_infor606_ineq_118"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[$r={r_{x}}={r_{y}}$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="infor606_g007.jpg"/>
</fig>
</sec>
<sec id="j_infor606_s_008">
<label>4</label>
<title>Sparse Observation Windows</title>
<p>Up to now, rectangular observation windows have been used to count the number of different colours and to perform necessary modifications in the carrier image at the modifying cell located at one of the corners of this rectangle.</p>
<p>Let us introduce the concept of an active and a passive cell inside the observation window. Active cells are used to compute the number of different colours in the current observation window (passive cells are not used for counting). Also, the modifying cell must be one of the active cells (otherwise the number of different colours measured at the locations of the active cells of the current observation window would not change).</p>
<p>An observation window with at least one passive cell is defined as a rectangular sparse observation window (SOW). The notion of SOW is represented by the size of the rectangular observation window and the location of the modifying cell (the active cells are plotted in white, and the passive cells are shown in gray). For example, the SOW shown in Fig. <xref rid="j_infor606_fig_008">8</xref>(a) is denoted as <inline-formula id="j_infor606_ineq_119"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{\mathcal{P}}_{3\times 6}^{(3,6)}}$]]></tex-math></alternatives></inline-formula> and two active cells are located at the top left and bottom right corners of the rectangular window.</p>
<p>Note that such a definition of SOW requires a proper placement of active cells inside the observation window. It is assumed that the size of the rectangular window of SOW is minimal (effective) to accommodate all active cells. For example, the effective size of SOW in Fig. <xref rid="j_infor606_fig_008">8</xref>(c) is <inline-formula id="j_infor606_ineq_120"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$2\times 4$]]></tex-math></alternatives></inline-formula>, not <inline-formula id="j_infor606_ineq_121"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn></mml:math><tex-math><![CDATA[$3\times 6$]]></tex-math></alternatives></inline-formula>.</p>
<fig id="j_infor606_fig_008">
<label>Fig. 8</label>
<caption>
<p>The effective size of the rectangular sparse observation window is predetermined by the location of active cells. The size of the rectangular SOW is <inline-formula id="j_infor606_ineq_122"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn></mml:math><tex-math><![CDATA[$3\times 6$]]></tex-math></alternatives></inline-formula> in panels (a) and (b). However, the effective size of the observation window is only <inline-formula id="j_infor606_ineq_123"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$2\times 4$]]></tex-math></alternatives></inline-formula> in panel (c). Note that the effective size of the rectangular SOW does not depend on the type of the perfect covering scheme.</p>
</caption>
<graphic xlink:href="infor606_g008.jpg"/>
</fig>
<sec id="j_infor606_s_009">
<label>4.1</label>
<title>The Definition of a Perfect SOW</title>
<p>The concept of a perfect covering scheme is presented in Saunoriene and Ragulskis (<xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>) and is also used in this paper. However, it appears that special care must be taken for the selection of the modifying cell in SOW (otherwise the SOW may not produce a perfect covering).</p>
<p>Let us consider <inline-formula id="j_infor606_ineq_124"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{\mathcal{P}}_{3\times 6}^{(3,6)}}$]]></tex-math></alternatives></inline-formula> shown in Fig. <xref rid="j_infor606_fig_009">9</xref>(a) (the modifying cell is plotted in green). It is clear that this SOW results into a perfect covering if the scheme depicted in Fig. <xref rid="j_infor606_fig_003">3</xref>(a) is used.</p>
<p>It appears that the modifying cell can be located not only in the corners of the rectangular observation window. In fact, <inline-formula id="j_infor606_ineq_125"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{\mathcal{P}}_{3\times 6}^{(3,4)}}$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_009">9</xref>(b)) and <inline-formula id="j_infor606_ineq_126"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{\mathcal{P}}_{3\times 6}^{(3,1)}}$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_009">9</xref>(c)) also result into perfect covering schemes.</p>
<p>However, the placement of the modifying cell cannot be arbitrary. For example, <inline-formula id="j_infor606_ineq_127"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{\mathcal{P}}_{3\times 6}^{(3,4)}}$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_009">9</xref>(d)), <inline-formula id="j_infor606_ineq_128"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{\mathcal{P}}_{3\times 6}^{(2,6)}}$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_009">9</xref>(e)), and <inline-formula id="j_infor606_ineq_129"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{\mathcal{P}}_{3\times 6}^{(2,3)}}$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_009">9</xref>(f)) are not perfect covering schemes if the horizontal scheme depicted in Fig. <xref rid="j_infor606_fig_003">3</xref>(a) is used (the modifying cell is marked in red).</p>
<p>Figure <xref rid="j_infor606_fig_010">10</xref> is used to demonstrate that SOW <inline-formula id="j_infor606_ineq_130"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{\mathcal{P}}_{3\times 6}^{(2,6)}}$]]></tex-math></alternatives></inline-formula> does not result into a perfect covering when the scheme in Fig. <xref rid="j_infor606_fig_003">3</xref>(a) is used. The size of the carrier image is set to <inline-formula id="j_infor606_ineq_131"><alternatives><mml:math>
<mml:mn>5</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>8</mml:mn></mml:math><tex-math><![CDATA[$5\times 8$]]></tex-math></alternatives></inline-formula> pixels (Fig. <xref rid="j_infor606_fig_010">10</xref>). Initially, the SOW is placed at the top left corner of the carrier image (the global coordinates of the top left cell of the current SOW are <inline-formula id="j_infor606_ineq_132"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(1,1)$]]></tex-math></alternatives></inline-formula>). The SOW then travels horizontally from left to right until the top left corner of the SOW reaches pixel <inline-formula id="j_infor606_ineq_133"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(1,3)$]]></tex-math></alternatives></inline-formula> of the carrier image (Fig. <xref rid="j_infor606_fig_010">10</xref>). Note that no conflict with previous observation windows is generated at steps 1, 2, and 3 (the modifying cell is shown in green). However, a conflict occurs at step 4 (Fig. <xref rid="j_infor606_fig_010">10</xref>). The global coordinates of the modifying cell at this step are <inline-formula id="j_infor606_ineq_134"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(3,6)$]]></tex-math></alternatives></inline-formula>. However, this cell is an active cell of the SOW at step 3. Changing the value of the modifying cell at step 4 can change the number of different colours measured by the SOW at previous step 3. Thus, the conflict with the previous SOW appears at step 4 and the modifying cell is now plotted in red.</p>
<fig id="j_infor606_fig_009">
<label>Fig. 9</label>
<caption>
<p>Perfect SOW yields the perfect covering. The architecture of a perfect SOW depends on the type of the covering scheme (the covering scheme depicted in Fig. <xref rid="j_infor606_fig_006">6</xref>(a) is used for further illustrations). Active cells are not allowed in rows below the modifying cell and on the right hand side of the current row. Panels (a), (b) and (c) depict perfect SOW (the modifying cell is plotted in green). Panels (d), (e) and (f) show non-perfect SOWs (the modifying cell is plotted in red).</p>
</caption>
<graphic xlink:href="infor606_g009.jpg"/>
</fig>
<fig id="j_infor606_fig_010">
<label>Fig. 10</label>
<caption>
<p>The SOW shown in Fig. <xref rid="j_infor606_fig_009">9</xref> (e) causes a conflict using the covering scheme depicted in Fig. <xref rid="j_infor606_fig_003">3</xref>(a). Initially, the SOW is placed at the top left corner of the carrier image (coordinates at the top left SOW cell are <inline-formula id="j_infor606_ineq_135"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(1,1)$]]></tex-math></alternatives></inline-formula>, the coordinates of the modifying cell are <inline-formula id="j_infor606_ineq_136"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(2,6)$]]></tex-math></alternatives></inline-formula>). Horizontal shifts to the right hand corner of the carrier image do not generate any conflicts with previous observation windows. However, a conflict occurs at step number 4. The coordinates of the modifying cell at step number 4 are <inline-formula id="j_infor606_ineq_137"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(3,6)$]]></tex-math></alternatives></inline-formula>. However, coordinates of one of the active cells at step number 3 are also <inline-formula id="j_infor606_ineq_138"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(3,6)$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="infor606_g010.jpg"/>
</fig>
</sec>
<sec id="j_infor606_s_010">
<label>4.2</label>
<title>Partially Overlapping Boundary Conditions</title>
<p>In Saunoriene and Ragulskis (<xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>), it is demonstrated that the steganographic scheme based on the Wada index does not support overlapping periodic boundary conditions. In other words, the size of the secret image <italic>S</italic> is always smaller than the size of the carrier image <italic>C</italic>. For example, if we consider the scheme <inline-formula id="j_infor606_ineq_139"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${P_{3\times 6}^{(3,6)}}$]]></tex-math></alternatives></inline-formula>, we can encode the secret image <italic>S</italic> that contains <inline-formula id="j_infor606_ineq_140"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>×</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$({n_{x}}-{r_{x}}+1)\times ({n_{y}}-{r_{y}}+1)$]]></tex-math></alternatives></inline-formula> pixels into the carrier image <italic>C</italic>, containing <inline-formula id="j_infor606_ineq_141"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${n_{x}}\times {n_{y}}$]]></tex-math></alternatives></inline-formula> pixels.</p>
<p>It is interesting to observe that partially overlapping periodic boundary conditions are applicable for the perfect covering scheme based on the SOW. However, there is one condition: the last row of the SOW should contain only one active cell, which is a modifying cell (Fig. <xref rid="j_infor606_fig_011">11</xref>(a)–(b)). Modifying cells that allow partially overlapping periodic boundary conditions are depicted in green in Fig. <xref rid="j_infor606_fig_011">11</xref>(a)–(b). Otherwise, partially overlapping periodic boundary conditions are impossible (Fig. <xref rid="j_infor606_fig_011">11</xref>(c)–(d)). Modifying cells that do not allow the use of partially overlapping periodic boundary conditions are depicted in red in Fig. <xref rid="j_infor606_fig_011">11</xref>(c)–(d).</p>
<p>Figure <xref rid="j_infor606_fig_012">12</xref> shows that no conflict with all previous observation windows is generated if partially overlapping periodic boundary conditions are used with the perfect SOW scheme <inline-formula id="j_infor606_ineq_142"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{P}_{3\times 6}^{(3,4)}}$]]></tex-math></alternatives></inline-formula>.</p>
<p>If partially overlapping periodic boundary conditions (using a SOW containing a single active cell in the last row) are applied, the width of the encoded secret image can be expanded to match the width of the carrier image. For example, secret image <italic>S</italic> containing <inline-formula id="j_infor606_ineq_143"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>×</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[$({n_{x}}-{r_{x}}+1)\times {n_{y}}$]]></tex-math></alternatives></inline-formula> pixels can be encoded into the carrier image <italic>C</italic>, containing <inline-formula id="j_infor606_ineq_144"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${n_{x}}\times {n_{y}}$]]></tex-math></alternatives></inline-formula> pixels (using the perfect SOW scheme <inline-formula id="j_infor606_ineq_145"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{P}_{3\times 6}^{(3,4)}}$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_011">11</xref>(a)–(b))).</p>
<fig id="j_infor606_fig_011">
<label>Fig. 11</label>
<caption>
<p>Partially overlapping periodic boundary conditions are possible if the last row of the SOW contains only one active cell. Such situations are depicted in panels (a) and (b). Otherwise, partially overlapping periodic boundary conditions are impossible (panels (c) and (d)). The green and the red cells depict the modifying cells allowing (or not allowing) partially overlapping periodic boundary conditions.</p>
</caption>
<graphic xlink:href="infor606_g011.jpg"/>
</fig>
<fig id="j_infor606_fig_012">
<label>Fig. 12</label>
<caption>
<p>The SOW depicted in Fig. <xref rid="j_infor606_fig_011">11</xref>(b) allows partially overlapping periodic boundary conditions. The width of the carrier image is 8 cells, the width of the SOW is 6 cells. The coordinates of the top left corner of the SOW can vary from <inline-formula id="j_infor606_ineq_146"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(1,1)$]]></tex-math></alternatives></inline-formula> to <inline-formula id="j_infor606_ineq_147"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>8</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(1,8)$]]></tex-math></alternatives></inline-formula> without causing any conflicts with all previous observation windows. The same reasoning holds for all lower rows.</p>
</caption>
<graphic xlink:href="infor606_g012.jpg"/>
</fig>
</sec>
<sec id="j_infor606_s_011">
<label>4.3</label>
<title>The Distribution of Observable Pixels in the Carrier Image</title>
<p>It is interesting to observe how the pixels of the carrier image are processed during the encoding and the decoding of the secret image while using perfect covering schemes. Let us consider the <inline-formula id="j_infor606_ineq_148"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${P_{3\times 6}^{(3,6)}}$]]></tex-math></alternatives></inline-formula> covering scheme, and the size of the carrier image <inline-formula id="j_infor606_ineq_149"><alternatives><mml:math>
<mml:mn>20</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>20</mml:mn></mml:math><tex-math><![CDATA[$20\times 20$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_013">13</xref>(a)). The colour scheme in Fig. <xref rid="j_infor606_fig_013">13</xref>(a) depicts how many times a pixel is measured (when evaluating the number of different colours in the current observation window) during the whole process of the encoding (and the decoding).</p>
<fig id="j_infor606_fig_013">
<label>Fig. 13</label>
<caption>
<p>Not all perfect SOWs exploit all pixels of the carrier image in the process of encoding and decoding of the secret image. The size of the carrier image is <inline-formula id="j_infor606_ineq_150"><alternatives><mml:math>
<mml:mn>20</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>20</mml:mn></mml:math><tex-math><![CDATA[$20\times 20$]]></tex-math></alternatives></inline-formula> pixels, the size of the SOW is 3 cells. The colour plot for each SOW shows how many times each pixel of the carrier image plays a role in the encoding algorithm when the used covering scheme is depicted in Fig. <xref rid="j_infor606_fig_003">3</xref>(a). Note that pixels coloured in black are not used in the encoding process at all.</p>
</caption>
<graphic xlink:href="infor606_g013.jpg"/>
</fig>
<p>It appears that the number of times a pixel in the carrier image is evaluated does depend on its location (Fig. <xref rid="j_infor606_fig_013">13</xref>(a)). This effect can be explained by the fact that periodic boundary conditions are not possible for the scheme <inline-formula id="j_infor606_ineq_151"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${P_{3\times 6}^{(3,6)}}$]]></tex-math></alternatives></inline-formula> (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). For example, the pixels on the corners of the carrier image are measured only once, while the pixels in the central part of the carrier image are measured 18 times during the whole process of the encoding (and the decoding) (Fig. <xref rid="j_infor606_fig_013">13</xref>(a)).</p>
<p>The situation changes when SOW are used instead of standard observation windows (without passive cells). The perfect covering schemes <inline-formula id="j_infor606_ineq_152"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{P}_{3\times 6}^{(3,6)}}$]]></tex-math></alternatives></inline-formula> with different ratios and distributions of the active and passive cells in the observation window are illustrated in panels (b)–(f) of Fig. <xref rid="j_infor606_fig_013">13</xref>. It can be observed that some pixels (in and around some of the corners of the carrier image) are not used even once in panels (c), (d), and (e) of Fig. <xref rid="j_infor606_fig_013">13</xref>. The mostly uniform distribution of the number of times a pixel is evaluated is achieved when the only four active cells are located at the corners of the observation window (Fig. <xref rid="j_infor606_fig_013">13</xref>(f)).</p>
</sec>
</sec>
<sec id="j_infor606_s_012">
<label>5</label>
<title>The Security of the Steganographic Scheme Based on SOW</title>
<p>The general concept of SOW-based scheme is somewhat similar to the steganographic scheme based on Wada index (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>) (Fig. <xref rid="j_infor606_fig_014">14</xref>). The perfect covering scheme is employed to encode the secret image; the counting of different colours in the current observation window is used to decode the secret image. The major difference between the two schemes is in the structure of the observation window. Such a modification can be considered as a serious enhancement of the security of the proposed scheme.</p>
<fig id="j_infor606_fig_014">
<label>Fig. 14</label>
<caption>
<p>A schematic diagram illustrating the basic steps of the encoding and decoding schemes. The encoding scheme requires the carrier image, the secret image, and the SOW (with the predetermined perfect covering scheme). The decoding scheme requires the stego image and the identical SOW used for the encoding.</p>
</caption>
<graphic xlink:href="infor606_g014.jpg"/>
</fig>
<p>Note that the statistical performance measures of the steganographic scheme based on the Wada index are comparable to the performance measures of the best LSB-type schemes (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). Moreover, this scheme is robust to the steganalysis algorithms (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>), and the payload capacity of the carrier image is similar to the grayscale LSB schemes (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). The same holds true for the steganographic scheme based on SOW.</p>
<fig id="j_infor606_fig_015">
<label>Fig. 15</label>
<caption>
<p>The SOW used for the decoding must be identical to the SOW used for the encoding. The first column shows the SOW used to encode the city-map into the Lena image (the <inline-formula id="j_infor606_ineq_153"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> SOW contains 9 active cells). The second column shows the SOW used to decode the secret image. The third column depicts the decoded image. Panel (a) illustrates a perfect decoding (the SOW used for decoding is identical to the SOW used for the encoding). A single permutation of the active cells in the SOW prevents the decoding of the secret image (panel (b)). Full <inline-formula id="j_infor606_ineq_154"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$3\times 3$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor606_ineq_155"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> observation windows also fail to decode the secret (panels (c) and (d)).</p>
</caption>
<graphic xlink:href="infor606_g015.jpg"/>
</fig>
<p>However, the major advantage of the SOW-based scheme is the extra security feature which is enabled by SOWs. Let us assume that the secret city-map image (<inline-formula id="j_infor606_ineq_156"><alternatives><mml:math>
<mml:mn>509</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>509</mml:mn></mml:math><tex-math><![CDATA[$509\times 509$]]></tex-math></alternatives></inline-formula> pixels) is encoded into the Lena carrier image (<inline-formula id="j_infor606_ineq_157"><alternatives><mml:math>
<mml:mn>512</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>512</mml:mn></mml:math><tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> pixels) using a perfect SOW scheme <inline-formula id="j_infor606_ineq_158"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{P}_{4\times 4}^{(4,2)}}$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_015">15</xref>). Note, that the SOW used for encoding the secret image in Fig. <xref rid="j_infor606_fig_015">15</xref> comprises 9 active and 7 passive cells. It is important to observe that the secret image can be correctly decoded from the stego image if only the SOW used for the decoding is identical to the SOW used for the encoding. The first column in Fig. <xref rid="j_infor606_fig_015">15</xref> shows the SOW used to encode the city-map into the Lena image; the middle column – SOWs used to decode the secret information from the stego image. The decoded secret images are depicted in the third column in Fig. <xref rid="j_infor606_fig_015">15</xref>.</p>
<p>Figure <xref rid="j_infor606_fig_015">15</xref>(a) demonstrates a successful decoding, when the SOW used for the decoding matches the SOW used for the encoding. A single permutation of the active cells in the SOW disrupts the decoding of the secret image (Fig. <xref rid="j_infor606_fig_015">15</xref>(b)). Similarly, full observation windows <inline-formula id="j_infor606_ineq_159"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${P_{3\times 3}^{(3,3)}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor606_ineq_160"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${P_{4\times 4}^{(4,4)}}$]]></tex-math></alternatives></inline-formula> are unable to decode the secret (Fig. <xref rid="j_infor606_fig_015">15</xref>(c)–(d)).</p>
<p>Also note that statistical performance indicators for the encoding scheme based on the perfect SOW <inline-formula id="j_infor606_ineq_161"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{P}_{4\times 4}^{(4,2)}}$]]></tex-math></alternatives></inline-formula> (containing 9 active cells) are at least as good as the same statistical indicators of the encoding scheme <inline-formula id="j_infor606_ineq_162"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${P_{3\times 3}^{(3,3)}}$]]></tex-math></alternatives></inline-formula> or <inline-formula id="j_infor606_ineq_163"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${P_{4\times 4}^{(4,4)}}$]]></tex-math></alternatives></inline-formula> based on the Wada index (Fig. <xref rid="j_infor606_fig_007">7</xref>). For example, for the encoding in Fig. <xref rid="j_infor606_fig_015">15</xref>(a), the range of modifications in the stego image is <inline-formula id="j_infor606_ineq_164"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>78</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>77</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-78,77]$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_165"><alternatives><mml:math>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mo>=</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>0.0210</mml:mn></mml:math><tex-math><![CDATA[$ME=-0.0210$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_166"><alternatives><mml:math>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mi mathvariant="italic">A</mml:mi>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1.1031</mml:mn></mml:math><tex-math><![CDATA[$MAE=1.1031$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_167"><alternatives><mml:math>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mi mathvariant="italic">S</mml:mi>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>7.3853</mml:mn></mml:math><tex-math><![CDATA[$MSE=7.3853$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_168"><alternatives><mml:math>
<mml:mi mathvariant="italic">S</mml:mi>
<mml:mi mathvariant="italic">S</mml:mi>
<mml:mi mathvariant="italic">I</mml:mi>
<mml:mi mathvariant="italic">M</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>0.9823</mml:mn></mml:math><tex-math><![CDATA[$SSIM=0.9823$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor606_ineq_169"><alternatives><mml:math>
<mml:mi mathvariant="italic">P</mml:mi>
<mml:mi mathvariant="italic">S</mml:mi>
<mml:mi mathvariant="italic">N</mml:mi>
<mml:mi mathvariant="italic">R</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>39.4471</mml:mn></mml:math><tex-math><![CDATA[$PSNR=39.4471$]]></tex-math></alternatives></inline-formula>.</p>
<p>Further computational experiments are conducted with different standard carrier (Cameraman, Peppers, Jetplane) and secret images (Random, Checkerboard) (Table <xref rid="j_infor606_tab_002">2</xref>). Sparse observation window <inline-formula id="j_infor606_ineq_170"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{P}_{4\times 4}^{(4,2)}}$]]></tex-math></alternatives></inline-formula> presented in Fig. <xref rid="j_infor606_fig_015">15</xref>(a) is used for these computations.</p>
<table-wrap id="j_infor606_tab_002">
<label>Table 2</label>
<caption>
<p>Performance evaluation measures for the steganographic scheme with different carrier and secret images (sparse observation window <inline-formula id="j_infor606_ineq_171"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\tilde{P}_{4\times 4}^{(4,2)}}$]]></tex-math></alternatives></inline-formula> presented in Fig. <xref rid="j_infor606_fig_015">15</xref>(a) is used for the computational experiment).</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin"/>
<td colspan="3" style="vertical-align: top; text-align: center; border-top: solid thin; border-bottom: solid thin">Lena</td>
<td colspan="3" style="vertical-align: top; text-align: center; border-top: solid thin; border-bottom: solid thin">Cameraman</td>
<td colspan="3" style="vertical-align: top; text-align: center; border-top: solid thin; border-bottom: solid thin">Peppers</td>
<td colspan="3" style="vertical-align: top; text-align: center; border-top: solid thin; border-bottom: solid thin">Jetplane</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Performance evaluation measures</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">City-map</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Random</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Checker</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">City-map</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Random</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Checker</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">City-map</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Random</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Checker</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">City-map</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Random</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Checker</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Pixels with increased brightness, %</td>
<td style="vertical-align: top; text-align: left">24.41</td>
<td style="vertical-align: top; text-align: left">24.5</td>
<td style="vertical-align: top; text-align: left">24.6</td>
<td style="vertical-align: top; text-align: left">24.68</td>
<td style="vertical-align: top; text-align: left">24.81</td>
<td style="vertical-align: top; text-align: left">24.73</td>
<td style="vertical-align: top; text-align: left">24.55</td>
<td style="vertical-align: top; text-align: left">24.5</td>
<td style="vertical-align: top; text-align: left">24.29</td>
<td style="vertical-align: top; text-align: left">24.76</td>
<td style="vertical-align: top; text-align: left">24.79</td>
<td style="vertical-align: top; text-align: left">24.89</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Pixels with decreased brightness, %</td>
<td style="vertical-align: top; text-align: left">24.59</td>
<td style="vertical-align: top; text-align: left">24.79</td>
<td style="vertical-align: top; text-align: left">24.64</td>
<td style="vertical-align: top; text-align: left">24.52</td>
<td style="vertical-align: top; text-align: left">24.52</td>
<td style="vertical-align: top; text-align: left">24.51</td>
<td style="vertical-align: top; text-align: left">24.86</td>
<td style="vertical-align: top; text-align: left">24.72</td>
<td style="vertical-align: top; text-align: left">24.68</td>
<td style="vertical-align: top; text-align: left">24.46</td>
<td style="vertical-align: top; text-align: left">24.45</td>
<td style="vertical-align: top; text-align: left">24.32</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">The range of changes</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_172"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>78</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>77</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-78;77]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_173"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>82</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>81</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-82;81]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_174"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>71</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>77</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-71;77]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_175"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>112</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>96</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-112;96]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_176"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>107</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>103</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-107;103]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_177"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>107</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>90</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-107;90]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_178"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>96</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>103</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-96;103]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_179"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>92</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>105</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-92;105]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_180"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>81</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>115</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-81;115]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_181"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>96</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>119</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-96;119]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_182"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>80</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>124</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-80;124]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor606_ineq_183"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mo>−</mml:mo>
<mml:mn>115</mml:mn>
<mml:mo>;</mml:mo>
<mml:mn>120</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[-115;120]$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Median of changes</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">ME</td>
<td style="vertical-align: top; text-align: left">−0.0210</td>
<td style="vertical-align: top; text-align: left">−0.0205</td>
<td style="vertical-align: top; text-align: left">−0.0144</td>
<td style="vertical-align: top; text-align: left">0.0075</td>
<td style="vertical-align: top; text-align: left">0.0161</td>
<td style="vertical-align: top; text-align: left">0.0203</td>
<td style="vertical-align: top; text-align: left">−0.0157</td>
<td style="vertical-align: top; text-align: left">−0.0224</td>
<td style="vertical-align: top; text-align: left">−0.0192</td>
<td style="vertical-align: top; text-align: left">0.0436</td>
<td style="vertical-align: top; text-align: left">0.0365</td>
<td style="vertical-align: top; text-align: left">0.0407</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">MAE</td>
<td style="vertical-align: top; text-align: left">1.1031</td>
<td style="vertical-align: top; text-align: left">1.1180</td>
<td style="vertical-align: top; text-align: left">1.1107</td>
<td style="vertical-align: top; text-align: left">1.1484</td>
<td style="vertical-align: top; text-align: left">1.1563</td>
<td style="vertical-align: top; text-align: left">1.1525</td>
<td style="vertical-align: top; text-align: left">1.1888</td>
<td style="vertical-align: top; text-align: left">1.1903</td>
<td style="vertical-align: top; text-align: left">1.1697</td>
<td style="vertical-align: top; text-align: left">1.2497</td>
<td style="vertical-align: top; text-align: left">1.2346</td>
<td style="vertical-align: top; text-align: left">1.2437</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">MSE</td>
<td style="vertical-align: top; text-align: left">7.3853</td>
<td style="vertical-align: top; text-align: left">7.6400</td>
<td style="vertical-align: top; text-align: left">7.4456</td>
<td style="vertical-align: top; text-align: left">9.2872</td>
<td style="vertical-align: top; text-align: left">9.5251</td>
<td style="vertical-align: top; text-align: left">9.4747</td>
<td style="vertical-align: top; text-align: left">9.4435</td>
<td style="vertical-align: top; text-align: left">9.4914</td>
<td style="vertical-align: top; text-align: left">9.0201</td>
<td style="vertical-align: top; text-align: left">11.4037</td>
<td style="vertical-align: top; text-align: left">10.6796</td>
<td style="vertical-align: top; text-align: left">11.0781</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">SSIM</td>
<td style="vertical-align: top; text-align: left">0.9823</td>
<td style="vertical-align: top; text-align: left">0.9818</td>
<td style="vertical-align: top; text-align: left">0.9821</td>
<td style="vertical-align: top; text-align: left">0.9767</td>
<td style="vertical-align: top; text-align: left">0.9759</td>
<td style="vertical-align: top; text-align: left">0.9765</td>
<td style="vertical-align: top; text-align: left">0.9790</td>
<td style="vertical-align: top; text-align: left">0.9790</td>
<td style="vertical-align: top; text-align: left">0.9794</td>
<td style="vertical-align: top; text-align: left">0.9798</td>
<td style="vertical-align: top; text-align: left">0.9803</td>
<td style="vertical-align: top; text-align: left">0.9800</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">PSNR</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">39.45</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">39.30</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">39.41</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">38.45</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">38.34</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">38.37</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">38.38</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">38.36</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">38.58</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">37.56</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">37.85</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">37.69</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Clearly, 9 active cells can be distributed in many different ways inside the <inline-formula id="j_infor606_ineq_184"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> SOW. It is interesting to observe that there are 10564 distinct layouts of the <inline-formula id="j_infor606_ineq_185"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> SOW consisting of 9 active cells and 7 passive cells (<inline-formula id="j_infor606_ineq_186"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>16</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>9</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>−</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo>·</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>12</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>9</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>+</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo>=</mml:mo>
<mml:mn>10564</mml:mn></mml:math><tex-math><![CDATA[${C_{16}^{9}}-4\cdot {C_{12}^{9}}+4=10564$]]></tex-math></alternatives></inline-formula>; Fig. <xref rid="j_infor606_fig_016">16</xref>). If the modifying cell is fixed at the bottom right corner of the <inline-formula id="j_infor606_ineq_187"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> SOW with 9 active cells, the position of one active cell (out of 9) is already predefined. There are <inline-formula id="j_infor606_ineq_188"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>15</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>8</mml:mn>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${C_{15}^{8}}$]]></tex-math></alternatives></inline-formula> ways to distribute 8 active cells in the rest of 15 positions of the <inline-formula id="j_infor606_ineq_189"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> observation window. However, some of these layouts consist of the first row and/or the first column containing only inactive cells, which produces the SOW of a smaller size than <inline-formula id="j_infor606_ineq_190"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> (there are <inline-formula id="j_infor606_ineq_191"><alternatives><mml:math>
<mml:mn>2</mml:mn>
<mml:mo>·</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>11</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>8</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>−</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[$2\cdot {C_{11}^{8}}-1$]]></tex-math></alternatives></inline-formula> such inappropriate layouts). Thus, there are <inline-formula id="j_infor606_ineq_192"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>15</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>8</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>−</mml:mo>
<mml:mn>2</mml:mn>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>11</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>8</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>=</mml:mo>
<mml:mn>6106</mml:mn></mml:math><tex-math><![CDATA[${C_{15}^{8}}-2{C_{11}^{8}}+1=6106$]]></tex-math></alternatives></inline-formula> ways to distribute 9 active cells in <inline-formula id="j_infor606_ineq_193"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> observation window if the modifying cell is fixed at the bottom right corner of the SOW.</p>
<fig id="j_infor606_fig_016">
<label>Fig. 16</label>
<caption>
<p>There exist 10564 different layouts of the <inline-formula id="j_infor606_ineq_194"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> SOW with 9 active cells (<inline-formula id="j_infor606_ineq_195"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>16</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>9</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>−</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo>·</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>12</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>9</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>+</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo>=</mml:mo>
<mml:mn>10564</mml:mn></mml:math><tex-math><![CDATA[${C_{16}^{9}}-4\cdot {C_{12}^{9}}+4=10564$]]></tex-math></alternatives></inline-formula>). If the modifying cell is fixed at the bottom right corner of the SOW, the number of different layouts of the <inline-formula id="j_infor606_ineq_196"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> SOW with 9 active cells decreases to: 6106 (<inline-formula id="j_infor606_ineq_197"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>15</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>8</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>−</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo>·</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>11</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>8</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>=</mml:mo>
<mml:mn>6106</mml:mn></mml:math><tex-math><![CDATA[${C_{15}^{8}}-2\cdot {C_{11}^{8}}+1=6106$]]></tex-math></alternatives></inline-formula>).</p>
</caption>
<graphic xlink:href="infor606_g016.jpg"/>
</fig>
</sec>
<sec id="j_infor606_s_013">
<label>6</label>
<title>The Robustness of the Proposed Scheme</title>
<p>Robustness to partial destruction of the stego image is one of the main features of the steganographic scheme. The proposed scheme is robust against partial blocking of a stego image (Fig. <xref rid="j_infor606_fig_017">17</xref>, blocked areas are depicted in white). Although it is impossible to decode the secret information from the blocked part of the stego image (black areas in the decoded secret images), the remaining part of the secret image can be decoded correctly (Fig. <xref rid="j_infor606_fig_017">17</xref>).</p>
<fig id="j_infor606_fig_017">
<label>Fig. 17</label>
<caption>
<p>The robustness of the proposed steganographic scheme against partial blocking of the stego image: the secret image cannot be decoded from the blocked part of the stego image. The blocked part of the stego image is indicated in white, the lost part of the decoded secret – in black.</p>
</caption>
<graphic xlink:href="infor606_g017.jpg"/>
</fig>
<p>The “salt and pepper” noise applied to the stego image has a negative impact on the quality of the decoded secret image (Fig. <xref rid="j_infor606_fig_018">18</xref>). The higher is the density of the “salt and pepper” noise, the larger is the amount of incorrectly decoded secret pixels (Fig. <xref rid="j_infor606_fig_018">18</xref>).</p>
<fig id="j_infor606_fig_018">
<label>Fig. 18</label>
<caption>
<p>The “salt and pepper” noise applied to the stego image reduces the quality of the decoded secret image. Higher noise density results into larger amount of incorrectly decoded secret pixels. The density of the “salt and pepper” noise applied to the stego image is equal to 0.005 in panel (a), 0.025 in panel (b), and 0.1 in panel (c).</p>
</caption>
<graphic xlink:href="infor606_g018.jpg"/>
</fig>
<p>The Gaussian noise applied to the stego image affects the quality of the decoded secret image as well (Fig. <xref rid="j_infor606_fig_019">19</xref>). The higher is the variance of the Gaussian noise, the larger is the amount of incorrectly decoded secret pixels. For example, the secret image can be decoded and fully recognized if the stego is degraded by the Gaussian noise with zero mean and variance equal to <inline-formula id="j_infor606_ineq_198"><alternatives><mml:math>
<mml:mn>7.5</mml:mn>
<mml:mo>·</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>−</mml:mo>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:msup></mml:math><tex-math><![CDATA[$7.5\cdot {10^{-7}}$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_019">19</xref>(a)). Unfortunately, it is impossible to decode the secret image if the stego image is affected by the Gaussian noise with higher variances (Fig. <xref rid="j_infor606_fig_019">19</xref>(c)).</p>
<fig id="j_infor606_fig_019">
<label>Fig. 19</label>
<caption>
<p>The Gaussian noise applied to the stego image affects the quality of the decoded secret image. The higher is the variance of the noise, the larger is the amount of incorrectly decoded secret pixels. The stego image is degraded by the Gaussian noise with zero mean and different variances: <inline-formula id="j_infor606_ineq_199"><alternatives><mml:math>
<mml:mn>7.5</mml:mn>
<mml:mo>·</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>−</mml:mo>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:msup></mml:math><tex-math><![CDATA[$7.5\cdot {10^{-7}}$]]></tex-math></alternatives></inline-formula> in panel (a), <inline-formula id="j_infor606_ineq_200"><alternatives><mml:math>
<mml:msup>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>−</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
</mml:msup></mml:math><tex-math><![CDATA[${10^{-6}}$]]></tex-math></alternatives></inline-formula> in panel (b), and <inline-formula id="j_infor606_ineq_201"><alternatives><mml:math>
<mml:mn>3</mml:mn>
<mml:mo>·</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>−</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
</mml:msup></mml:math><tex-math><![CDATA[$3\cdot {10^{-6}}$]]></tex-math></alternatives></inline-formula> in panel (c).</p>
</caption>
<graphic xlink:href="infor606_g019.jpg"/>
</fig>
<fig id="j_infor606_fig_020">
<label>Fig. 20</label>
<caption>
<p>The adjustment of the contrast of the stego image affects the quality of the decoded secret. The brightness of each pixel of the stego image is increased by 50 in panel (a) and decreased by 50 in panel (b). The brightness of each pixel of the stego image is increased by multiplying by 1.2 in panel (c) and decreased by multiplying by 0.8 in panel (d).</p>
</caption>
<graphic xlink:href="infor606_g020.jpg"/>
</fig>
<p>Let us suppose that the brightness of the stego image is adjusted by adding a constant <inline-formula id="j_infor606_ineq_202"><alternatives><mml:math>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>50</mml:mn></mml:math><tex-math><![CDATA[$c=50$]]></tex-math></alternatives></inline-formula> to the brightness of all pixels in the stego image (values greater than 255 are truncated to 255). The secret image is decoded correctly in those areas of the stego image where the original brightness of pixels is not greater than <inline-formula id="j_infor606_ineq_203"><alternatives><mml:math>
<mml:mn>255</mml:mn>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">c</mml:mi></mml:math><tex-math><![CDATA[$255-c$]]></tex-math></alternatives></inline-formula> (Fig. <xref rid="j_infor606_fig_020">20</xref>(a)).</p>
<p>If the brightness of the stego image is modified by subtracting a constant <inline-formula id="j_infor606_ineq_204"><alternatives><mml:math>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>50</mml:mn></mml:math><tex-math><![CDATA[$c=50$]]></tex-math></alternatives></inline-formula> (values lower than 0 are truncated to 0, the encoded secret image remains undamaged in the areas where the brightness of original pixels in stego image is not less than <italic>c</italic> (Fig. <xref rid="j_infor606_fig_020">20</xref>(b)).</p>
<p>Figure <xref rid="j_infor606_fig_020">20</xref>(c)–(d) demonstrates the influence of the multiplicative brightness adjustment of the stego image on the secret decoded image. The brightness of each pixel of the stego image is multiplied by <inline-formula id="j_infor606_ineq_205"><alternatives><mml:math>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1.2</mml:mn></mml:math><tex-math><![CDATA[$c=1.2$]]></tex-math></alternatives></inline-formula> (values greater than 255 are truncated to 255; Fig. <xref rid="j_infor606_fig_020">20</xref>(c)). Similarly, the brightness of each pixel in the stego image is multiplied by <inline-formula id="j_infor606_ineq_206"><alternatives><mml:math>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>0.8</mml:mn></mml:math><tex-math><![CDATA[$c=0.8$]]></tex-math></alternatives></inline-formula> in Fig. <xref rid="j_infor606_fig_020">20</xref>(d). The damage to the secret decoded image is much greater in Fig. <xref rid="j_infor606_fig_020">20</xref>(d) than in Fig. <xref rid="j_infor606_fig_020">20</xref>(c) because the brightness range of the stego image is reduced to <inline-formula id="j_infor606_ineq_207"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>204</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[0,204]$]]></tex-math></alternatives></inline-formula> when multiplied by <inline-formula id="j_infor606_ineq_208"><alternatives><mml:math>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>0.8</mml:mn></mml:math><tex-math><![CDATA[$c=0.8$]]></tex-math></alternatives></inline-formula> compared to the multiplication by <inline-formula id="j_infor606_ineq_209"><alternatives><mml:math>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1.2</mml:mn></mml:math><tex-math><![CDATA[$c=1.2$]]></tex-math></alternatives></inline-formula> (the brightness range remains <inline-formula id="j_infor606_ineq_210"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>255</mml:mn>
<mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$[0,255]$]]></tex-math></alternatives></inline-formula> then).</p>
</sec>
<sec id="j_infor606_s_014">
<label>7</label>
<title>Discussion and Limitations</title>
<p>It is clear that the steganographic scheme based on the SOW outperforms the standard steganographic scheme based on the Wada index (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>) in a sense of MAE, MSE, PSNR, and SSIM. The statistics of the scheme based on SOW is presented at the end of Section <xref rid="j_infor606_s_012">5</xref>; the statistics of the standard scheme based on the Wada index proposed in Table <xref rid="j_infor606_tab_001">1</xref>. Comparison of the performance evaluation measures of the standard steganographic scheme and LSB, 2LSB, random 2LSB, improved 2LSB, random 3LSB, and random 4LSB steganographic schemes can be found in Saunoriene and Ragulskis (<xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>).</p>
<p>The proposed steganographic scheme has several other important advantages over the steganographic scheme based on the Wada index (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). The fact that the brightness of pixels is evaluated only in designated locations sparsely distributed in the current observation window yields a significant improvement in the security of the encoding scheme. For example, the <inline-formula id="j_infor606_ineq_211"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> SOW comprising 9 active and 7 passive cells yields 10564 different layouts resulting into perfect coverings.</p>
<p>The apparent simplicity of the scheme is misleading. Several specific requirements are derived for the structure of the sparse observation windows capable of producing perfect coverings. A subtle interplay between the possible placement of the modifying cell and the active cells in the current observation window must be identified and properly introduced into the encoding process to guarantee the proper functioning of the proposed steganographic scheme.</p>
<p>The major advantages of the proposed scheme can be characterized by its ability to perform pixel modifications in different bit planes of the carrier image. The proposed scheme directly inherits this property from the steganographic scheme based on the Wada index (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). The robustness of this scheme to RS steganalysis is discussed in detail in Saunoriene and Ragulskis (<xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). Analogous computational experiments demonstrate that the proposed scheme is also robust to RS steganalysis algorithms.</p>
<p>One of the limitations of the proposed steganographic scheme is the need to share information about the structure of the observation window between the communicating parties. In other words, the distribution of active cells and the location of the modifying cell must be exchanged between the parties before the secret image is decoded.</p>
<p>Another minor limitation of the proposed scheme is related to the payload capacity. In fact, the payload capacity of the scheme is comparable to LSB schemes. However, the proposed architecture of the observation window implies that some pixels lying on the borders of the carrier image are not employed in the process of encoding and decoding the secret image (Fig. <xref rid="j_infor606_fig_013">13</xref>).</p>
<p>Finally, one must keep in mind that not every distribution of active cells and the modifying cell inside the observation window results into a perfect SOW. Therefore, communicating party responsible for the encoding of the secret must know the basic rules governing the structure of a perfect SOW.</p>
<p>In the decoding stage, the number of different colours is estimated in each of the overlapping observation windows. There are <inline-formula id="j_infor606_ineq_212"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>·</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>−</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$({n_{x}}-{r_{x}}+1)\cdot ({n_{y}}-{r_{y}}+1)$]]></tex-math></alternatives></inline-formula> observation windows in the <inline-formula id="j_infor606_ineq_213"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${n_{x}}\times {n_{y}}$]]></tex-math></alternatives></inline-formula> stego image, covered by <inline-formula id="j_infor606_ineq_214"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${r_{x}}\times {r_{y}}$]]></tex-math></alternatives></inline-formula> SOW (with <inline-formula id="j_infor606_ineq_215"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">a</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${r_{a}}$]]></tex-math></alternatives></inline-formula> active cells). The time complexity to determine the number of different values within a single observation window and decode the brightness of the corresponding secret pixel is <inline-formula id="j_infor606_ineq_216"><alternatives><mml:math>
<mml:mi mathvariant="italic">O</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mo movablelimits="false">log</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$O({r_{a}}{\log _{2}}{r_{a}})$]]></tex-math></alternatives></inline-formula>. In the encoding stage, one has to determine if the number of different colours in the current observation window is odd or even, and to make a decision if a modification is required (<inline-formula id="j_infor606_ineq_217"><alternatives><mml:math>
<mml:mi mathvariant="italic">O</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mo movablelimits="false">log</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">a</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[$O({r_{a}}{\log _{2}}{r_{a}}$]]></tex-math></alternatives></inline-formula>) operations). Statistically, changes are required for around a half of the pixels in the carrier image. The number of operations needed to modify the number of colours in each observation window is also <inline-formula id="j_infor606_ineq_218"><alternatives><mml:math>
<mml:mi mathvariant="italic">O</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mo movablelimits="false">log</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$O({r_{a}}{\log _{2}}{r_{a}})$]]></tex-math></alternatives></inline-formula>.</p>
<p>The encoding and decoding algorithms are implemented in Matlab and executed on a MacBook Air M2 (8-core CPU, 8-core GPU, 16-core Neural Engine, 100 GB/s memory bandwidth). The decoding of the <inline-formula id="j_infor606_ineq_219"><alternatives><mml:math>
<mml:mn>510</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>510</mml:mn></mml:math><tex-math><![CDATA[$510\times 510$]]></tex-math></alternatives></inline-formula> secret image from the <inline-formula id="j_infor606_ineq_220"><alternatives><mml:math>
<mml:mn>512</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>512</mml:mn></mml:math><tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> stego image employing <inline-formula id="j_infor606_ineq_221"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> SOW with 9 active cells takes 15.23 seconds on average (based on 100 identical decoding runs). However, since the sequence in which the brightness of secret pixels is decoded does not have any influence on the reconstructed secret image, the process could be executed simultaneously across multiple CPU cores, which would result in a considerably higher processing speed. For the same <inline-formula id="j_infor606_ineq_222"><alternatives><mml:math>
<mml:mn>510</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>510</mml:mn></mml:math><tex-math><![CDATA[$510\times 510$]]></tex-math></alternatives></inline-formula> secret image to be encoded in the <inline-formula id="j_infor606_ineq_223"><alternatives><mml:math>
<mml:mn>512</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>512</mml:mn></mml:math><tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> carrier image (using <inline-formula id="j_infor606_ineq_224"><alternatives><mml:math>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$4\times 4$]]></tex-math></alternatives></inline-formula> SOW with 9 active cells), the process takes 22.14 seconds on average (based on 100 identical encoding runs).</p>
<p>The time required to run the encoding algorithms using high-resolution digital images prevents a possible application of the proposed scheme on edge devices using video streams. However, the enhanced security measures of the proposed scheme (compared to the steganographic proposed in Saunoriene and Ragulskis (<xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>)) make it an attractive alternative to many classical steganographic schemes.</p>
<p>The proposed steganographic scheme is capable of encoding dichotomous secret images only. In principle, the scheme could be extended to grayscale secret images. However, the Wada membership function defining the decision to modify a pixel should be modified. The decision making process cannot be based on the odd or even number of different pixels in the current observation window (Saunoriene and Ragulskis, <xref ref-type="bibr" rid="j_infor606_ref_027">2023</xref>). The ability to encode a grayscale image would immediately open the possibility to encode RGB color images (by hiding R, G, and B components of the colour image separately). Such modifications remain a definite objective of future research.</p>
</sec>
</body>
<back>
<ref-list id="j_infor606_reflist_001">
<title>References</title>
<ref id="j_infor606_ref_001">
<mixed-citation publication-type="chapter"><string-name><surname>Abdulla</surname>, <given-names>A.A.</given-names></string-name>, <string-name><surname>Jassim</surname>, <given-names>S.A.</given-names></string-name>, <string-name><surname>Sellahewa</surname>, <given-names>H.</given-names></string-name> (<year>2013</year>). <chapter-title>Secure steganography technique based on bitplane indexes</chapter-title>. In: <source>2013 IEEE International Symposium on Multimedia</source>, pp. <fpage>287</fpage>–<lpage>291</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ISM.2013.55" xlink:type="simple">https://doi.org/10.1109/ISM.2013.55</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_002">
<mixed-citation publication-type="chapter"><string-name><surname>Aini</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Setiadi</surname>, <given-names>D.R.I.M.</given-names></string-name>, <string-name><surname>Putro</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Rachmawanto</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Sari</surname>, <given-names>A.</given-names></string-name> (<year>2019</year>). <chapter-title>Survey of methods in the spatial domain image steganography based imperceptibility and payload capacity</chapter-title>. In: <source>2019 International Seminar on Application for Technology of Information and Communication (iSemantic)</source>, pp. <fpage>434</fpage>–<lpage>439</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ISEMANTIC.2019.8884333" xlink:type="simple">https://doi.org/10.1109/ISEMANTIC.2019.8884333</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_003">
<mixed-citation publication-type="journal"><string-name><surname>Al-Faydi</surname>, <given-names>S.N.M.</given-names></string-name>, <string-name><surname>Ahmed</surname>, <given-names>S.K.</given-names></string-name>, <string-name><surname>Al-Talb</surname>, <given-names>H.N.Y.</given-names></string-name> (<year>2023</year>). <article-title>Improved LSB image steganography with high imperceptibility based on cover-stego matching</article-title>. <source>IET Image Processing</source>, <volume>17</volume>(<issue>7</issue>), <fpage>2072</fpage>–<lpage>2082</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1049/ipr2.12773" xlink:type="simple">https://doi.org/10.1049/ipr2.12773</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_004">
<mixed-citation publication-type="journal"><string-name><surname>Aziz</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Tayarani-N</surname>, <given-names>M.H.</given-names></string-name>, <string-name><surname>Afsar</surname>, <given-names>M.</given-names></string-name> (<year>2015</year>). <article-title>A cycling chaos-based cryptic-free algorithm for image steganography</article-title>. <source>Nonlinear Dynamics</source>, <volume>80</volume>, <fpage>1271</fpage>–<lpage>1290</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11071-015-1943-2" xlink:type="simple">https://doi.org/10.1007/s11071-015-1943-2</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_005">
<mixed-citation publication-type="journal"><string-name><surname>EL-Hady</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Abbas</surname>, <given-names>M.H.</given-names></string-name>, <string-name><surname>Khanday</surname>, <given-names>F.A.</given-names></string-name>, <string-name><surname>Said</surname>, <given-names>L.A.</given-names></string-name>, <string-name><surname>Radwan</surname>, <given-names>A.G.</given-names></string-name> (<year>2024</year>). <article-title>DISH: digital image steganography using stochastic-computing with high-capacity</article-title>. <source>Multimedia Tools and Applications</source>, <volume>83</volume>, <fpage>66033</fpage>–<lpage>66048</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11042-023-17998-9" xlink:type="simple">https://doi.org/10.1007/s11042-023-17998-9</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_006">
<mixed-citation publication-type="journal"><string-name><surname>George</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Navanesan</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Thangathurai</surname>, <given-names>K.</given-names></string-name> (<year>2024</year>). <article-title>Revisiting the steganography techniques with a novel region-based separation approach</article-title>. <source>Multimedia Tools and Applications</source>, <volume>83</volume>, <fpage>71089</fpage>–<lpage>71114</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11042-023-17961-8" xlink:type="simple">https://doi.org/10.1007/s11042-023-17961-8</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_007">
<mixed-citation publication-type="journal"><string-name><surname>Ghoul</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Sulaiman</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Shukur</surname>, <given-names>Z.</given-names></string-name> (<year>2023</year>). <article-title>A review on security techniques in image steganography</article-title>. <source>International Journal of Advanced Computer Science and Applications</source>, <volume>14</volume>(<issue>6</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.14569/IJACSA.2023.0140640" xlink:type="simple">https://doi.org/10.14569/IJACSA.2023.0140640</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_008">
<mixed-citation publication-type="journal"><string-name><surname>Haverkamp</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Sarmah</surname>, <given-names>D.K.</given-names></string-name> (<year>2024</year>). <article-title>Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis</article-title>. <source>International Journal of Information Security</source>, <volume>23</volume>, <fpage>2607</fpage>–<lpage>2635</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s10207-024-00853-9" xlink:type="simple">https://doi.org/10.1007/s10207-024-00853-9</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_009">
<mixed-citation publication-type="chapter"><string-name><surname>Hussain</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Wahab</surname>, <given-names>A.W.A.</given-names></string-name>, <string-name><surname>Anuar</surname>, <given-names>N.B.</given-names></string-name>, <string-name><surname>Salleh</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Noor</surname>, <given-names>R.M.</given-names></string-name> (<year>2015</year>). <chapter-title>Pixel value differencing steganography techniques: analysis and open challenge</chapter-title>. In: <source>2015 IEEE International Conference on Consumer Electronics – Taiwan</source>, pp. <fpage>21</fpage>–<lpage>22</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ICCE-TW.2015.7216859" xlink:type="simple">https://doi.org/10.1109/ICCE-TW.2015.7216859</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_010">
<mixed-citation publication-type="journal"><string-name><surname>Kaur</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Singh</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Kaur</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Lee</surname>, <given-names>H.-N.</given-names></string-name> (<year>2022</year>). <article-title>A systematic review of computational image steganography approaches</article-title>. <source>Archives of Computational Methods in Engineering</source>, <volume>29</volume>(<issue>7</issue>), <fpage>4775</fpage>–<lpage>4797</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11831-022-09749-0" xlink:type="simple">https://doi.org/10.1007/s11831-022-09749-0</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_011">
<mixed-citation publication-type="chapter"><string-name><surname>Khalind</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Aziz</surname>, <given-names>B.</given-names></string-name> (<year>2015</year>). <chapter-title>A better detection of 2LSB steganography via standard deviation of the extended pairs of values</chapter-title>. In: <string-name><surname>Agaian</surname>, <given-names>S.S.</given-names></string-name>, <string-name><surname>Jassim</surname>, <given-names>S.A.</given-names></string-name>, <string-name><surname>Du</surname>, <given-names>E.Y.</given-names></string-name> (Eds.), <source>Mobile Multimedia/Image Processing, Security, and Applications 2015</source>, Vol. <volume>9497</volume>, pp. <fpage>135</fpage>–<lpage>142</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1117/12.2184496" xlink:type="simple">https://doi.org/10.1117/12.2184496</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_012">
<mixed-citation publication-type="chapter"><string-name><surname>Kurak</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>McHugh</surname>, <given-names>J.</given-names></string-name> (<year>1992</year>). <chapter-title>A cautionary note on image downgrading</chapter-title>. In: <source>Proceedings Eighth Annual Computer Security Application Conference</source>, pp. <fpage>153</fpage>–<lpage>159</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/CSAC.1992.228224" xlink:type="simple">https://doi.org/10.1109/CSAC.1992.228224</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_013">
<mixed-citation publication-type="journal"><string-name><surname>Laimeche</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Meraoumia</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Bendjenna</surname>, <given-names>H.</given-names></string-name> (<year>2020</year>). <article-title>Enhancing LSB embedding schemes using chaotic maps systems</article-title>. <source>Neural Computing and Applications</source>, <volume>32</volume>, <fpage>16605</fpage>–<lpage>16623</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s00521-019-04523-z" xlink:type="simple">https://doi.org/10.1007/s00521-019-04523-z</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_014">
<mixed-citation publication-type="journal"><string-name><surname>Li</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Zhao</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Cho</surname>, <given-names>H.</given-names></string-name> (<year>2024</year>). <article-title>Dual-domain joint optimization for universal JPEG steganography</article-title>. <source>Journal of Visual Communication and Image Representation</source>, <volume>101</volume>, <fpage>104151</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jvcir.2024.104151" xlink:type="simple">https://doi.org/10.1016/j.jvcir.2024.104151</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_015">
<mixed-citation publication-type="journal"><string-name><surname>Liu</surname>, <given-names>F.-Q.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Yan</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Pan</surname>, <given-names>J.-S.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>H.-M.</given-names></string-name> (<year>2024</year>). <article-title>Non-iterative reversible information hiding in the secret sharing domain</article-title>. <source>Journal of Visual Communication and Image Representation</source>, <volume>100</volume>, <fpage>104096</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jvcir.2024.104096" xlink:type="simple">https://doi.org/10.1016/j.jvcir.2024.104096</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_016">
<mixed-citation publication-type="journal"><string-name><surname>Luo</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>He</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>S.</given-names></string-name> (<year>2023</year>). <article-title>Reversible adversarial steganography for security enhancement</article-title>. <source>Journal of Visual Communication and Image Representation</source>, <volume>97</volume>, <fpage>103935</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jvcir.2023.103935" xlink:type="simple">https://doi.org/10.1016/j.jvcir.2023.103935</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_017">
<mixed-citation publication-type="journal"><string-name><surname>Luo</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Huang</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Huang</surname>, <given-names>J.</given-names></string-name> (<year>2010</year>). <article-title>Edge adaptive image steganography based on LSB matching revisited</article-title>. <source>IEEE Transactions on Information Forensics and Security</source>, <volume>5</volume>(<issue>2</issue>), <fpage>201</fpage>–<lpage>214</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TIFS.2010.2041812" xlink:type="simple">https://doi.org/10.1109/TIFS.2010.2041812</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_018">
<mixed-citation publication-type="journal"><string-name><surname>Mukherjee</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Paul</surname>, <given-names>G.</given-names></string-name> (<year>2024</year>). <article-title>High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels</article-title>. <source>Multimedia Tools and Applications</source>, <volume>83</volume>, <fpage>5181</fpage>–<lpage>5206</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11042-023-15504-9" xlink:type="simple">https://doi.org/10.1007/s11042-023-15504-9</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_019">
<mixed-citation publication-type="chapter"><string-name><surname>Nguyen</surname>, <given-names>B.C.</given-names></string-name>, <string-name><surname>Yoon</surname>, <given-names>S.M.</given-names></string-name>, <string-name><surname>Lee</surname>, <given-names>H.-K.</given-names></string-name> (<year>2006</year>). <chapter-title>Multi bit plane image steganography</chapter-title>. In: <string-name><surname>Shi</surname>, <given-names>Y.Q.</given-names></string-name>, <string-name><surname>Jeon</surname>, <given-names>B.</given-names></string-name> (Eds.), <source>Digital Watermarking</source>. <publisher-name>Springer Berlin Heidelberg</publisher-name>, <publisher-loc>Berlin, Heidelberg</publisher-loc>, pp. <fpage>61</fpage>–<lpage>70</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/11922841_6" xlink:type="simple">https://doi.org/10.1007/11922841_6</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_020">
<mixed-citation publication-type="journal"><string-name><surname>Nipanikar</surname>, <given-names>S.I.</given-names></string-name>, <string-name><surname>Hima Deepthi</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Kulkarni</surname>, <given-names>N.</given-names></string-name> (<year>2018</year>). <article-title>A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform</article-title>. <source>Alexandria Engineering Journal</source>, <volume>57</volume>(<issue>4</issue>), <fpage>2343</fpage>–<lpage>2356</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.aej.2017.09.005" xlink:type="simple">https://doi.org/10.1016/j.aej.2017.09.005</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_021">
<mixed-citation publication-type="journal"><string-name><surname>Njoum</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Sulaiman</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Shukur</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Qamar</surname>, <given-names>F.</given-names></string-name> (<year>2024</year>). <article-title>High-secured image LSB steganography using AVL-tree with random RGB channel substitution</article-title>. <source>Computational Materials Science</source>, <volume>81</volume>, <fpage>183</fpage>–<lpage>211</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.32604/cmc.2024.050090" xlink:type="simple">https://doi.org/10.32604/cmc.2024.050090</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_022">
<mixed-citation publication-type="journal"><string-name><surname>Rahman</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Uddin</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Zakarya</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Hussain</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>A.A.</given-names></string-name>, <string-name><surname>Ahmed</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Haleem</surname>, <given-names>M.</given-names></string-name> (<year>2023</year>a). <article-title>A comprehensive study of digital image steganographic techniques</article-title>. <source>IEEE Access</source>, <volume>11</volume>, <fpage>6770</fpage>–<lpage>6791</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2023.3237393" xlink:type="simple">https://doi.org/10.1109/ACCESS.2023.3237393</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_023">
<mixed-citation publication-type="journal"><string-name><surname>Rahman</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Uddin</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hussain</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Ahmed</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>A.A.</given-names></string-name>, <string-name><surname>Zakarya</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Rahman</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Haleem</surname>, <given-names>M.</given-names></string-name> (<year>2023</year>b). <article-title>A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image</article-title>. <source>Scientific Reports</source>, <volume>13</volume>(<issue>1</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1038/s41598-023-41303-1" xlink:type="simple">https://doi.org/10.1038/s41598-023-41303-1</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_024">
<mixed-citation publication-type="journal"><string-name><surname>Rajabi-Ghaleh</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Olyaeefar</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Kheradmand</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Ahmadi-Kandjani</surname>, <given-names>S.</given-names></string-name> (<year>2024</year>). <article-title>Image security using steganography and cryptography with sweeping computational ghost imaging</article-title>. <source>Frontiers in Physics</source>, <volume>12</volume>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3389/fphy.2024.1336485" xlink:type="simple">https://doi.org/10.3389/fphy.2024.1336485</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_025">
<mixed-citation publication-type="chapter"><string-name><surname>Rashid</surname>, <given-names>R.D.</given-names></string-name>, <string-name><surname>Majeed</surname>, <given-names>T.F.</given-names></string-name> (<year>2019</year>). <chapter-title>Edge based image steganography: problems and solution</chapter-title>. In: <source>2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA)</source>, pp. <fpage>1</fpage>–<lpage>5</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ICCSPA.2019.8713712" xlink:type="simple">https://doi.org/10.1109/ICCSPA.2019.8713712</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_026">
<mixed-citation publication-type="journal"><string-name><surname>Sahu</surname>, <given-names>A.K.</given-names></string-name>, <string-name><surname>Sahu</surname>, <given-names>M.</given-names></string-name> (<year>2020</year>). <article-title>Digital image steganography and steganalysis: a journey of the past three decades</article-title>. <source>Open Computer Science</source>, <volume>10</volume>(<issue>1</issue>), <fpage>296</fpage>–<lpage>342</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1515/comp-2020-0136" xlink:type="simple">https://doi.org/10.1515/comp-2020-0136</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_027">
<mixed-citation publication-type="journal"><string-name><surname>Saunoriene</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Ragulskis</surname>, <given-names>M.</given-names></string-name> (<year>2023</year>). <article-title>A steganographic scheme based on the Wada index</article-title>. <source>Multimedia Tools and Applications</source>, <volume>82</volume>, <fpage>40503</fpage>–<lpage>40529</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11042-023-14888-y" xlink:type="simple">https://doi.org/10.1007/s11042-023-14888-y</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_028">
<mixed-citation publication-type="journal"><string-name><surname>Setiadi</surname>, <given-names>D.R.I.M.</given-names></string-name>, <string-name><surname>Rustad</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Andono</surname>, <given-names>P.N.</given-names></string-name>, <string-name><surname>Shidik</surname>, <given-names>G.F.</given-names></string-name> (<year>2023</year>). <article-title>Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)</article-title>. <source>Signal Process.</source>, <volume>206</volume>, <fpage>108908</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.sigpro.2022.108908" xlink:type="simple">https://doi.org/10.1016/j.sigpro.2022.108908</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_029">
<mixed-citation publication-type="journal"><string-name><surname>Setiadi</surname>, <given-names>D.R.I.M.</given-names></string-name>, <string-name><surname>Rustad</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Andono</surname>, <given-names>P.N.</given-names></string-name>, <string-name><surname>Shidik</surname>, <given-names>G.F.</given-names></string-name> (<year>2024</year>). <article-title>Graded fuzzy edge detection for imperceptibility optimization of image steganography</article-title>. <source>The Imaging Science Journal</source>, <volume>72</volume>(<issue>6</issue>), <fpage>693</fpage>–<lpage>705</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1080/13682199.2023.2219880" xlink:type="simple">https://doi.org/10.1080/13682199.2023.2219880</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_030">
<mixed-citation publication-type="chapter"><string-name><surname>Sreenidhi</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Shruti</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Divya</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Subhashini</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Muthulakshmi</surname>, <given-names>S.</given-names></string-name> (<year>2024</year>). <chapter-title>Highly secure LSB-based image steganography with four-factor security</chapter-title>. In: <string-name><surname>Bandyopadhyay</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Balas</surname>, <given-names>V.E.</given-names></string-name>, <string-name><surname>Biswas</surname>, <given-names>S.K.</given-names></string-name>, <string-name><surname>Saha</surname>, <given-names>A.K.</given-names></string-name>, <string-name><surname>Thounaojam</surname>, <given-names>D.M.</given-names></string-name> (Eds.), <source>Intelligent Computing Systems and Applications</source>. <publisher-name>Springer Nature Singapore</publisher-name>, <publisher-loc>Singapore</publisher-loc>, pp. <fpage>319</fpage>–<lpage>328</lpage>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_031">
<mixed-citation publication-type="chapter"><string-name><surname>Wayner</surname>, <given-names>P.</given-names></string-name> (<year>2009</year>). <chapter-title>Chapter 17 – Steganalysis</chapter-title>. In: <string-name><surname>Wayner</surname>, <given-names>P.</given-names></string-name> (Ed.), <source>Disappearing Cryptography</source> (<edition>3rd</edition> ed.). <series>The Morgan Kaufmann Series in Software Engineering and Programming</series>. <publisher-name>Morgan Kaufmann</publisher-name>, <publisher-loc>Boston</publisher-loc>, pp. <fpage>337</fpage>–<lpage>353</lpage>. <isbn>978-0-12-374479-1</isbn>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/B978-012374479-1.50022-8" xlink:type="simple">https://doi.org/10.1016/B978-012374479-1.50022-8</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_032">
<mixed-citation publication-type="journal"><string-name><surname>Wolpert</surname>, <given-names>D.H.</given-names></string-name>, <string-name><surname>Macready</surname>, <given-names>W.G.</given-names></string-name> (<year>1997</year>). <article-title>No free lunch theorems for optimization</article-title>. <source>IEEE Transactions on Evolutionary Computation</source>, <volume>1</volume>(<issue>1</issue>), <fpage>67</fpage>–<lpage>82</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/4235.585893" xlink:type="simple">https://doi.org/10.1109/4235.585893</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_033">
<mixed-citation publication-type="journal"><string-name><surname>Wolpert</surname>, <given-names>D.H.</given-names></string-name> (<year>2013</year>). <article-title>Ubiquity symposium: evolutionary computation and the processes of life: what the no free lunch theorems really mean: how to improve search algorithms</article-title>. <source>Ubiquity</source>, <volume>2013</volume>(<issue>December</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1145/2555235.2555237" xlink:type="simple">https://doi.org/10.1145/2555235.2555237</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_034">
<mixed-citation publication-type="journal"><string-name><surname>Xing</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Yan</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Yu</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Sun</surname>, <given-names>Y.</given-names></string-name> (<year>2022</year>). <article-title>Information hiding in the sharing domain</article-title>. <source>Journal of Visual Communication and Image Representation</source>, <volume>86</volume>, <fpage>103520</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jvcir.2022.103520" xlink:type="simple">https://doi.org/10.1016/j.jvcir.2022.103520</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor606_ref_035">
<mixed-citation publication-type="journal"><string-name><surname>Zhang</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Lu</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Yin</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Yeung</surname>, <given-names>Y.</given-names></string-name> (<year>2019</year>). <article-title>Binary image steganography based on joint distortion measurement</article-title>. <source>Journal of Visual Communication and Image Representation</source>, <volume>58</volume>, <fpage>600</fpage>–<lpage>605</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jvcir.2018.12.038" xlink:type="simple">https://doi.org/10.1016/j.jvcir.2018.12.038</ext-link>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>
