Informatica logo


Login Register

  1. Home
  2. To appear
  3. A Steganographic Scheme Based on Perfect ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • More
    Article info Full article Related articles

A Steganographic Scheme Based on Perfect Coverings of Dichotomous Shares with Sparse Observation Windows
Loreta Saunoriene   Jurate Ragulskiene   Marius Saunoris   Minvydas Ragulskis  

Authors

 
Placeholder
https://doi.org/10.15388/25-INFOR606
Pub. online: 27 October 2025      Type: Research Article      Open accessOpen Access

Received
1 April 2025
Accepted
1 October 2025
Published
27 October 2025

Abstract

A steganographic scheme based on perfect coverings of dichotomous shares with sparse observation windows is presented in this paper. The manipulations with pixels are based on the number of different colours in the sparse cells of the current observation window. The conditions for the existence of perfect coverings for different architectures of sparse observation windows are derived. The number and distribution of active cells in the current observation window contribute to the additional security of the proposed scheme. This paper also provides performance measures, statistical features, and demonstrates the robustness of the proposed steganographic scheme.

References

 
Abdulla, A.A., Jassim, S.A., Sellahewa, H. (2013). Secure steganography technique based on bitplane indexes. In: 2013 IEEE International Symposium on Multimedia, pp. 287–291. https://doi.org/10.1109/ISM.2013.55.
 
Aini, D., Setiadi, D.R.I.M., Putro, S., Rachmawanto, E., Sari, A. (2019). Survey of methods in the spatial domain image steganography based imperceptibility and payload capacity. In: 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 434–439. https://doi.org/10.1109/ISEMANTIC.2019.8884333.
 
Al-Faydi, S.N.M., Ahmed, S.K., Al-Talb, H.N.Y. (2023). Improved LSB image steganography with high imperceptibility based on cover-stego matching. IET Image Processing, 17(7), 2072–2082. https://doi.org/10.1049/ipr2.12773.
 
Aziz, M., Tayarani-N, M.H., Afsar, M. (2015). A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dynamics, 80, 1271–1290. https://doi.org/10.1007/s11071-015-1943-2.
 
EL-Hady, M., Abbas, M.H., Khanday, F.A., Said, L.A., Radwan, A.G. (2024). DISH: digital image steganography using stochastic-computing with high-capacity. Multimedia Tools and Applications, 83, 66033–66048. https://doi.org/10.1007/s11042-023-17998-9.
 
George, R., Navanesan, L., Thangathurai, K. (2024). Revisiting the steganography techniques with a novel region-based separation approach. Multimedia Tools and Applications, 83, 71089–71114. https://doi.org/10.1007/s11042-023-17961-8.
 
Ghoul, S., Sulaiman, R., Shukur, Z. (2023). A review on security techniques in image steganography. International Journal of Advanced Computer Science and Applications, 14(6). https://doi.org/10.14569/IJACSA.2023.0140640.
 
Haverkamp, I., Sarmah, D.K. (2024). Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis. International Journal of Information Security, 23, 2607–2635. https://doi.org/10.1007/s10207-024-00853-9.
 
Hussain, M., Wahab, A.W.A., Anuar, N.B., Salleh, R., Noor, R.M. (2015). Pixel value differencing steganography techniques: analysis and open challenge. In: 2015 IEEE International Conference on Consumer Electronics – Taiwan, pp. 21–22. https://doi.org/10.1109/ICCE-TW.2015.7216859.
 
Kaur, S., Singh, S., Kaur, M., Lee, H.-N. (2022). A systematic review of computational image steganography approaches. Archives of Computational Methods in Engineering, 29(7), 4775–4797. https://doi.org/10.1007/s11831-022-09749-0.
 
Khalind, O., Aziz, B. (2015). A better detection of 2LSB steganography via standard deviation of the extended pairs of values. In: Agaian, S.S., Jassim, S.A., Du, E.Y. (Eds.), Mobile Multimedia/Image Processing, Security, and Applications 2015, Vol. 9497, pp. 135–142. https://doi.org/10.1117/12.2184496.
 
Kurak, C., McHugh, J. (1992). A cautionary note on image downgrading. In: Proceedings Eighth Annual Computer Security Application Conference, pp. 153–159. https://doi.org/10.1109/CSAC.1992.228224.
 
Laimeche, L., Meraoumia, A., Bendjenna, H. (2020). Enhancing LSB embedding schemes using chaotic maps systems. Neural Computing and Applications, 32, 16605–16623. https://doi.org/10.1007/s00521-019-04523-z.
 
Li, X., Li, X., Zhao, Y., Cho, H. (2024). Dual-domain joint optimization for universal JPEG steganography. Journal of Visual Communication and Image Representation, 101, 104151. https://doi.org/10.1016/j.jvcir.2024.104151.
 
Liu, F.-Q., Liu, T., Yan, B., Pan, J.-S., Yang, H.-M. (2024). Non-iterative reversible information hiding in the secret sharing domain. Journal of Visual Communication and Image Representation, 100, 104096. https://doi.org/10.1016/j.jvcir.2024.104096.
 
Luo, J., He, P., Liu, J., Wang, H., Wu, C., Zhou, S. (2023). Reversible adversarial steganography for security enhancement. Journal of Visual Communication and Image Representation, 97, 103935. https://doi.org/10.1016/j.jvcir.2023.103935.
 
Luo, W., Huang, F., Huang, J. (2010). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201–214. https://doi.org/10.1109/TIFS.2010.2041812.
 
Mukherjee, I., Paul, G. (2024). High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels. Multimedia Tools and Applications, 83, 5181–5206. https://doi.org/10.1007/s11042-023-15504-9.
 
Nguyen, B.C., Yoon, S.M., Lee, H.-K. (2006). Multi bit plane image steganography. In: Shi, Y.Q., Jeon, B. (Eds.), Digital Watermarking. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 61–70. https://doi.org/10.1007/11922841_6.
 
Nipanikar, S.I., Hima Deepthi, V., Kulkarni, N. (2018). A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform. Alexandria Engineering Journal, 57(4), 2343–2356. https://doi.org/10.1016/j.aej.2017.09.005.
 
Njoum, M., Sulaiman, R., Shukur, Z., Qamar, F. (2024). High-secured image LSB steganography using AVL-tree with random RGB channel substitution. Computational Materials Science, 81, 183–211. https://doi.org/10.32604/cmc.2024.050090.
 
Rahman, S., Uddin, J., Zakarya, M., Hussain, H., Khan, A.A., Ahmed, A., Haleem, M. (2023a). A comprehensive study of digital image steganographic techniques. IEEE Access, 11, 6770–6791. https://doi.org/10.1109/ACCESS.2023.3237393.
 
Rahman, S., Uddin, J., Hussain, H., Ahmed, A., Khan, A.A., Zakarya, M., Rahman, A., Haleem, M. (2023b). A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image. Scientific Reports, 13(1). https://doi.org/10.1038/s41598-023-41303-1.
 
Rajabi-Ghaleh, S., Olyaeefar, B., Kheradmand, R., Ahmadi-Kandjani, S. (2024). Image security using steganography and cryptography with sweeping computational ghost imaging. Frontiers in Physics, 12. https://doi.org/10.3389/fphy.2024.1336485.
 
Rashid, R.D., Majeed, T.F. (2019). Edge based image steganography: problems and solution. In: 2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), pp. 1–5. https://doi.org/10.1109/ICCSPA.2019.8713712.
 
Sahu, A.K., Sahu, M. (2020). Digital image steganography and steganalysis: a journey of the past three decades. Open Computer Science, 10(1), 296–342. https://doi.org/10.1515/comp-2020-0136.
 
Saunoriene, L., Ragulskis, M. (2023). A steganographic scheme based on the Wada index. Multimedia Tools and Applications, 82, 40503–40529. https://doi.org/10.1007/s11042-023-14888-y.
 
Setiadi, D.R.I.M., Rustad, S., Andono, P.N., Shidik, G.F. (2023). Digital image steganography survey and investigation (goal, assessment, method, development, and dataset). Signal Process., 206, 108908. https://doi.org/10.1016/j.sigpro.2022.108908.
 
Setiadi, D.R.I.M., Rustad, S., Andono, P.N., Shidik, G.F. (2024). Graded fuzzy edge detection for imperceptibility optimization of image steganography. The Imaging Science Journal, 72(6), 693–705. https://doi.org/10.1080/13682199.2023.2219880.
 
Sreenidhi, A., Shruti, B., Divya, A., Subhashini, N., Muthulakshmi, S. (2024). Highly secure LSB-based image steganography with four-factor security. In: Bandyopadhyay, S., Balas, V.E., Biswas, S.K., Saha, A.K., Thounaojam, D.M. (Eds.), Intelligent Computing Systems and Applications. Springer Nature Singapore, Singapore, pp. 319–328.
 
Wayner, P. (2009). Chapter 17 – Steganalysis. In: Wayner, P. (Ed.), Disappearing Cryptography (3rd ed.). The Morgan Kaufmann Series in Software Engineering and Programming. Morgan Kaufmann, Boston, pp. 337–353. 978-0-12-374479-1. https://doi.org/10.1016/B978-012374479-1.50022-8.
 
Wolpert, D.H., Macready, W.G. (1997). No free lunch theorems for optimization. IEEE Transactions on Evolutionary Computation, 1(1), 67–82. https://doi.org/10.1109/4235.585893.
 
Wolpert, D.H. (2013). Ubiquity symposium: evolutionary computation and the processes of life: what the no free lunch theorems really mean: how to improve search algorithms. Ubiquity, 2013(December). https://doi.org/10.1145/2555235.2555237.
 
Xing, F., Yan, X., Yu, L., Sun, Y. (2022). Information hiding in the sharing domain. Journal of Visual Communication and Image Representation, 86, 103520. https://doi.org/10.1016/j.jvcir.2022.103520.
 
Zhang, J., Lu, W., Yin, X., Liu, W., Yeung, Y. (2019). Binary image steganography based on joint distortion measurement. Journal of Visual Communication and Image Representation, 58, 600–605. https://doi.org/10.1016/j.jvcir.2018.12.038.

Biographies

Saunoriene Loreta
loreta.saunoriene@ktu.lt

L. Saunoriene received the PhD degree from Kaunas University of Technology in 2007. Since 2011, she has been an associate professor at the Department of Mathematical Modelling at Kaunas University of Technology. Her research interests focus on the analysis and modelling of nonlinear systems.

Ragulskiene Jurate
jurate.ragulskiene@ktu.lt

J. Ragulskiene received the PhD degree from Lithuanian University of Agricultural Sciences and since 2010 she has been an associate professor at the Department of Mathematical Modelling at Kaunas University of Technology. Her research interests are focused on numerical algorithms and simulations.

Saunoris Marius
marius.saunoris@ktu.lt

M. Saunoris received the PhD degree from Kaunas University of Technology in 2007. Since 2009, he has been an associate professor at the Department of Electronics Engineering at Kaunas University of Technology. His research interests include computer simulation and signal processing techniques.

Ragulskis Minvydas
minvydas.ragulskis@ktu.lt

M. Ragulskis received the PhD degree from Kaunas University of Technology and since 2005 he has been a full professor at the Department of Mathematical Modelling at Kaunas University of Technology. His research interests are focused on nonlinear and complex systems.


Full article Related articles PDF XML
Full article Related articles PDF XML

Copyright
© 2025 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
steganography perfect covering sparse observation window

Metrics
since January 2020
133

Article info
views

33

Full article
views

20

PDF
downloads

22

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy