Adaptive Steganographic Technique For Digital Images Based On The Least Significant Bit Substitution
DOI:
https://doi.org/10.26740/vubeta.v2i3.40143Keywords:
Information hiding, Image steganography , Histogram analysis , Image quality assessment metrics, Least Significant BitAbstract
It has become natural to retain most of the information electronically, due to developments and improvements in information and communication technology. Thus, information security has become a major problem. Aside from cryptography, two strategies could be utilized to share information in a secure manner. Cryptography and steganography are two of these mechanisms. Using an encryption key known to both the receiver and the sender, the message is encrypted. Without the encryption key, no one will be able to read the message. Consequently, we offer a method that is efficient and based on the Least Significant Bit (LSB) to address this problem. Improved dependability is attained by employing the LSB substitution approach, which reduces the embedding error rate. Utilizing LSB substitution in conjunction with MLEA, Secret Key (SK), transposition, and flipping, we present an algorithm for image-based steganography. Our suggested method is effective and produces efficient outcomes, as demonstrated by multiple experiments. We used a number of Quality Assessment Metrics (QAMs) to evaluate 125 unique RGB images with varying degrees of hidden information, including things like PSNR, Contrast, and Image Histogram (IH). In addition to security analysis, we compared our results to those of other approaches that were already in use and found that ours were superior. The result shows a considerable improvement over the advanced techniques currently available.
References
[1] A. OluwakemiC., A. Kayo S., and O. Ayotunde J., “Efficient Data Hiding System using Cryptography and Steganography,” International Journal of Applied Information Systems, vol. 4, no. 11, pp. 6–11, 2012. https://doi.org/10.5120/ijais12-450763
[2] J. Kaur and S. Sharma, “Enhanced Image Steganography Technique Using Cryptography for Data Hiding,” New Approaches for Multidimensional Signal Processing, pp. 175–185, 2021.https://doi.org/10.1007/978-981-33-4676-5_13
[3] E. Ghaleb Abdulkadhim, S. Hammad Dhahi, and M. Salman Al-Shemarry, “Review on Various Image Protection Methods,” Journal of Al-Qadisiyah for Computer Science and Mathematics, vol. 15, no. 4, pp. 41–47, 2023. https://doi.org/10.29304/jqcsm.2023.15.41364
[4] M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin, and M. Z. I. Shamsuddin, “Information Hiding using Steganography,” National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings, pp. 21–25, 2003. https://doi.org/10.1109/NCTT.2003.1188294
[5] R. Ibrahim and T. S. Kuan, “Steganography Algorithm to Hide Secret Message inside an Image,” vol. 2, pp. 102–108, 2011.
[6] M. A. Hayder and E. G. Abdulkadhim, “Enhance a Cloud-Based Distance Learning Computing Management System (LCMS),” Intelligent Systems and Networks, pp. 686–693, 2021. https://doi.org/10.1007/978-981-16-2094-2_78
[7] S. R. Kim, J. N. Kim, S. T. Kim, S. Shin, and J. H. Yi, “Anti-reversible Dynamic Tamper Detection Scheme Using Distributed Image Steganography for IoT Applications,” The Journal of Supercomputing, vol. 74, pp. 4261–4280, 2018. https://doi.org/10.1007/s11227-016-1848-y
[8] O. Evsutin, A. Melman, and A. A. Abd El-Latif, “Overview of Information Hiding Algorithms for Ensuring Security in IoT based Cyber-Physical Systems,” Security and Privacy Preserving for IoT and 5G Networks, pp. 81–115, 2022. https://doi.org/10.1007/978-3-030-85428-7_5
[9] M. Douglas, K. Bailey, M. Leeney, and K. Curran, “An Overview of Steganography Techniques Applied to the Protection Of Biometric Data,” Multimedia Tools and Applications, vol. 77, no. 13, pp. 17333–17373, 2018. https://doi.org/10.1007/s11042-017-5308-3
[10] I. Banerjee, “Text Steganography using Article Mapping Technique (AMT) and SSCE,” International Journal of Computer Network and Information Security (IJCNIS), vol. 2, no. 4, 2011. https://doi.org/10.5815/ijcnis.2012.12.08
[11] V. Lakshmi and B. V. Raju, “FPGA Implementation of Lifting DWT Based LSB Steganography Using Micro Blaze Processor,” Int. J. Comput. trends Technol., vol. 6, no. 1, 2013.
[12] A. Kamilaris and A. Pitsillides, “Mobile Phone Computing and the Internet of Things: A Survey,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 885–898, 2016. https://doi.org/10.1109/JIOT.2016.2600569
[13] T. Qiu, R. Qiao, and D. O. Wu, “EABS: An Event-Aware Backpressure Scheduling Scheme for Emergency Internet of Things,” IEEE Transactions on Mobile Computing, vol. 17, no. 1, pp. 72–84, 2017. https://doi.org/10.1109/JIOT.2016.2600569
[14] E. Ghaleb, “Design and Optimization of Tourism Information Management System Based on Artificial Intelligence,” Wasit Journal for Pure Sciences, vol. 3, no. 3, pp. 101–111, 2024. https://doi.org/10.31185/wjps.508
[15] E. G. Abdulkadhim, M. S. Al-Shemarry, and E. M. T. A. Alsaadi, “An Efficient Algorithm for Covert Contacting in IoT,” AIP Conference Proceedings, vol. 3097, no. 1, 2024. https://doi.org/10.1063/5.0209934
[16] S. Pramanik, “A New Method for Locating Data Hiding in Image Steganography,” Multimedia Tools and Applications, vol. 83, no. 12, pp. 34323–34349, 2024. https://doi.org/10.1007/s11042-023-16762-3
[17] Y. Yao, J. Wang, Q. Chang, Y. Ren, and W. Meng, “High Invisibility Image Steganography with Wavelet Transform and Generative Adversarial Network,” Expert Systems with Applications, vol. 249, p. 123540, 2024. https://doi.org/10.1016/j.eswa.2024.123540
[18] H. H. Nguyen, S. Marcel, J. Yamagishi, and I. Echizen, “Master Face Attacks on Face Recognition Systems,” IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 4, no. 3, pp. 398–411, 2022. https://doi.org/10.1109/TBIOM.2022.3166206
[19] L. Ambardi, S. Hong, and I. K. Park, “Segtex: A Large Scale Synthetic Face Dataset for Face Recognition,” IEEE Access, vol. 11, pp. 131939–131949, 2023. https://doi.org/10.1109/ACCESS.2023.3336405
[20] M. Alanzy, R. Alomrani, B. Alqarni, and S. Almutairi, “Image Steganography using LSB and Hybrid Encryption Algorithms,” Applied Sciences, vol. 13, no. 21, p. 11771, 2023. https://doi.org/10.3390/app132111771
[21] C. A. Sari, “Secure Image Steganography Algorithm Based on Dct with OTP Encryption,” Journal of Applied Intelligent System, vol. 2, no. 1, pp. 1–11, 2017. https://doi.org/10.33633/jais.v2i1.1330
[22] M. M. Mohamed, S. Ghoniemy, and N. I. Ghali, “A Survey on Image Data Hiding Techniques,” International Journal of Intelligent Computing and Information Sciences, vol. 22, no. 3, pp. 14–38, 2022.
[23] Y. Bhavani, P. Kamakshi, E. Kavya Sri, and Y. Sindhu Sai, “A Survey on Image Steganography Techniques Using Least Significant Bit,” Intelligent Data Communication Technologies and Internet of Things: Proceedings of ICICI 2021, Springer, pp. 281–290, 2022. https://doi.org/10.1007/978-981-16-7610-9_20
[24] N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021. https://doi.org/10.1109/ACCESS.2021.3053998
[25] B. Lakshmi Sirisha and B. Chandra Mohan, “Review on Spatial Domain Image Steganography Techniques,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 24, no. 6, pp. 1873–1883, 2021. https://doi.org/10.1080/09720529.2021.1962025
[26] S. Kaur, S. Singh, M. Kaur, and H.-N. Lee, “A Systematic Review of Computational Image Steganography Approaches,” Archives of Computational Methods in Engineering, vol. 29, no. 7, pp. 4775–4797, 2022. https://doi.org/10.1007/s11831-022-09749-0
[27] A. M. Adeshina, S. F. A. Razak, S. Yogarayan, and M. S. Sayeed, “Hardware-Accelerated Least Significant Bit Framework: A Low Cost Approach to Securing Clinical Data,” Informatica, vol. 48, no. 22, 2024. https://doi.org/10.31449/inf.v48i22.5583
[28] A. Hutabarat and R. Sawitri, “Text Data Embedding into Images Using Chaotic Least Significant Bit Encod-ing Steganography,” Jurnal Pepadun, vol. 5, no. 3, pp. 286–298, 2024. https://doi.org/10.23960/pepadun.v5i3.246
[29] A. Hildayanti and M. S. Machrizzandi, “Image Optimization Technique using Local Binary Pattern and Multilayer Perceptron Classification to Identify Potassium Deficiency in Cacao Plants Through Leaf Images,” Vokasi Unesa Bulletin Of Engineering, Technology and Applied Science, vol. 2, no. 1, pp. 77–87, 2025. https://doi.org/10.26740/vubeta.v2i1.34587
[30] S. Arivazhagan, W. S. L. Jebarani, S. T. Veena, and E. Amrutha, “Extraction of Secrets from LSB Stego Images Using Various Denoising Methods,” International Journal of Information Technology, vol. 15, no. 4, pp. 2107–2121, 2023. https://doi.org/10.1007/s41870-023-01265-z
[31] F. N. Hakim and M. Sholikhan, “Enhancing Data Security through Digital Image Steganography: An Implementation of the Two Least Significant Bits (2LSB) Method,” International Journal of Graphic Design, vol. 2, no. 2, pp. 222–235, 2024. https://doi.org/10.51903/ijgd.v2i2.2124
[32] M. A. Majeed, R. Sulaiman, Z. Shukur, and M. K. Hasan, “A Review on Text Steganography Techniques,” Mathematics, vol. 9, no. 21, p. 2829, 2021. https://doi.org/10.3390/math9212829
[33] I. Q. Abduljaleel, Z. A. Abduljabbar, M. A. Al Sibahee, M. J. J. Ghrabat, J. Ma, and V. O. Nyangaresi, “A Lightweight Hybrid Scheme For Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques,” Journal of Sensor and Actuator Networks, vol. 11, no. 4, p. 66, 2022. https://doi.org/10.3390/jsan11040066
[34] K. K. Jabbar, B. T. Munthir, and S. A. Thajeel, “Digital Watermarking by Utilizing the Properties of Self-Organization Map Based on Least Significant Bit and Most Significant Bit,” International Journal of Electrical and Computer Engineering, vol. 12, no. 6, pp. 6545–6558, 2022. https://doi.org/10.11591/ijece.v12i6.pp6545-6558
[35] Q. Zhang, Z. Xu, Z. Yang, Z. Ren, S. Yuan, and J. Cheng, “Enhancing Visual Place Recognition using Discrete Cosine Transform and Difference-Based Descriptors,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 71, no. 7, pp. 3368–3372, 2024. https://doi.org/10.1109/TCSII.2024.3358982
[36] A. O. Modupe, A. E. Adedoyin, A. O. Titilayo, and F. O. Deborah, “A Comparative Analysis of LSB, MSB and PVD Based Image Steganography,” International Journal of Research and Review, vol. 8, no. 9, pp. 373–377, 2021. https://doi.org/10.52403/ijrr.20210948
[37] E. M. Jamel, “Image Steganography Based on Wavelet Transform and Histogram Modification,” Ibn AL-Haitham Journal for Pure and Applied Sciences, vol. 33, no. 1, pp. 173–186, 2020. https://doi.org/10.30526/33.1.2365
[38] W. Alexan, M. El Beheiry, and O. Gamal–Eldin, “A Comparative Study Among Different Mathematical Sequences In 3d Image Steganography,” International Journal of Computing and Digital Systems, vol. 9, no. 4, pp. 545–552, 2020. https://doi.org/10.12785/ijcds/090403
[39] R. Huang, C. Lian, Z. Dai, Z. Li, and Z. Ma, “A Novel Hybrid Image Synthesis-Mapping Framework for Steganography without Embedding,” IEEE Access, vol. 11, pp. 113176–113188, 2023. https://doi.org/10.12785/ijcds/090403
[40] S. Dhar and A. K. Sahu, “Digital to Quantum Watermarking: A Journey from Past to Present and Into the Future,” Computer Science Review, vol. 54, p. 100679, 2024. https://doi.org/10.1016/j.cosrev.2024.100679
[41] P. K. Dhar, A. Kaium, and T. Shimamura, “Image steganography based on Modified Lsb Substitution Method and Data Mapping,” International Journal of Computer Science and Network Security, vol. 18, no. 3, pp. 155–160, 2018.
[42] A. A.-A. Gutub, “Pixel Indicator Technique for RGB Image Steganography,” Journal of Emerging Technologies in Web Intelligence, vol. 2, no. 1, pp. 56–64, 2010. https://doi.org/10.4304/jetwi.2.1.56-64
[43] D. Sharma and C. Prabha, “Hybrid security of EMI using edge-based steganography and three-layered cryptography,” Applied Data Science and Smart Systems, CRC Press, pp. 278–290, 2024. https://doi.org/10.1201/9781003471059-37
[44] G. P. C. Venkata Krishna and D. Vivekananda Reddy, “RETRACTED: Machine Learning-Enhanced Hybrid Cryptography and Image Steganography Algorithm for Securing Cloud Data,” Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, vol. 46, no. 2, pp. 4657–4667, 2024. https://doi.org/10.3233/JIFS-236229
[45] Z. Wang, M. Zhou, B. Liu, and T. Li, “Deep Image Steganography Using Transformer and Recursive Permutation,” Entropy, vol. 24, no. 7, p. 878, 2022. https://doi.org/10.3390/e24070878
[46] A. Sharif, M. Mollaeefar, and M. Nazari, “A novel Method For Digital Image Steganography Based on a New Three-Dimensional Chaotic Map,” Multimedia Tools and Applications, vol. 76, pp. 7849–7867, 2017. https://doi.org/10.1007/s11042-016-3398-y
[47] W. Zhang, D. Li, C. Ma, G. Zhai, X. Yang, and K. Ma, “Continual Learning For Blind Image Quality Assessment,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 3, pp. 2864–2878, 2022. https://doi.org/10.1109/TPAMI.2022.3178874
[48] G. Swain, “Two New Steganography Techniques Based on Quotient Value Differencing with Addition-Subtraction Logic and PVD with Modulus Function,” Optik (Stuttg)., vol. 180, pp. 807–823, 2019. https://doi.org/10.1016/j.ijleo.2018.11.015
[49] A. Pradhan, A. K. Sahu, G. Swain, and K. R. Sekhar, “Performance Evaluation Parameters of Image Steganography Techniques,” International Conference on Research Advances in Integrated Navigation Systems (RAINS), pp. 1–8, 2016. https://doi.org/10.1109/RAINS.2016.7764399
[50] M. Sahu, N. Padhy, S. S. Gantayat, and A. K. Sahu, “Performance Analysis of various image Steganography Techniques,” Second International Conference on Computer Science, Engineering and Applications (ICCSEA), pp. 1–6, 2022. https://doi.org/10.1109/ICCSEA54677.2022.9936446
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ekhlas Ghaleb Abdulkadhim Ghlai, Zaman Mahdi Abbas, Nibras Talib Mohammed

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Abstract views: 75
,
PDF Downloads: 54








