Image Steganography:

Comparative Analysis of their Techniques, Complexity and Enhancements

Authors

  • Ahmad Zulfakar Abd Aziz Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia
  • Muhammad Fitri Mohd Sultan Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia
  • Nurul Liyana Mohamad Zulkufli Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia

DOI:

https://doi.org/10.31436/ijpcc.v10i1.449

Keywords:

Steganography, Steganalysis, Spatial domain, Edge-based Data Embedding

Abstract

Steganography is the practice of hiding secret information within other media, such as images, audio, video, and text. It has become increasingly important in today's society as a way to enable private and secure communication. This research project focuses on image steganography techniques that are used to evade detection of the secret message through statistical steganalysis techniques. The aim of this research is to compare and evaluate different image steganography methods, study their implementation complexity, and propose a framework to improve current approaches. The research will provide a comparison of the efficiency of different steganography techniques in avoiding detection by steganalysis and may lead to the development of better steganography techniques in the future. This paper focuses on the three steganography methods in the spatial domain: Least Significant Bit (LSB), Pixel-Value Difference (PVD) and Edge-based Data Embedding (EBE) methods. A simple experiment has been conducted to encrypt several images using these three methods, and the distortion measure for LSB using mean square error (MSE) and peak-to-noise ratio (PSNR) has been investigated. Although the distortion measure result is considered acceptable for LSB method in the experiment, all methods resulted in significant difference in the file capacity. This shows that further enhancement in the security of the encryption is necessary so that the secret message will not be easily discovered. Thus, in this paper, we propose a conceptualized enhancement in the security using Morse Code, Base 64, SHA-245, and Advanced Encryption Standard (AES) before encrypting using PVD.

References

Macit, Hüseyin & Koyun, Arif & Güngör, Orhan. (2018). A REVIEW AND COMPARISON OF STEGANOGRAPHY TECHNIQUES. https://www.researchgate.net/publication/330162221_A_REVIEW_AND_COMPARISON_OF_STEGANOGRAPHY_TECHNIQUES

Kanzariya, N. and Nimavat. (2013). Comparison of Various Images Steganography Techniques. https://www.academia.edu/10634704/Comparison_of_Various_Images_Steganography_Techniques

Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2018). Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing, 335, 299–326. https://doi.org/10.1016/j.neucom.2018.06.075

Bhattacharyya, S., Kshitij, A. P., & Sanyal, G. (2010). A novel approach

to develop a secure image based steganographic model using integer wavelet transform. 2010 International Conference on Recent Trends in Information, Telecommunication and Computing. https://doi.org/10.1109/itc.2010.68

Jiajia, Z., Jing, L., & Cheng, D. (2009). A steganographic method based on SOM and wavelet contrast. 2009 International Conference on Artificial Intelligence and Computational Intelligence. https://doi.org/10.1109/aici.2009.492

Islam, A. U., Khalid, F., Shah, M., Khan, Z., Mahmood, T., Khan, A., Ali, U., & Naeem, M. (2016). An improved image steganography technique based on MSB using bit differencing. 2016 Sixth International Conference on Innovative Computing Technology (INTECH). https://doi.org/10.1109/intech.2016.7845020

Cheddad, A. (2008, January 1). Enhancing steganography in digital images. 2008 Canadian Conference on Computer and Robot Vision. Retrieved June 25, 2022, from https://www.academia.edu/es/277018/Enhancing_Steganography_In_Digital_Image

Nosrati, M., Hanani, A., & Karimi, R. (2015). Steganography in image segments using genetic algorithm. 2015 Fifth International Conference on Advanced Computing & Communication Technologies. https://doi.org/10.1109/acct.2015.57

Ali, T.S., & Doegar, A. (2015). A Novel Approach of LSB Based Steganography Using Parity Checker.

Rawat, D., & Bhandari, V. (2013). A steganography technique for hiding an image in an image using LSB method for 24 bit color image. International Journal of Computer Applications, 64(20), 15–19. https://doi.org/10.5120/10749-5625

ElSayed, A., Elleithy, A., Thunga, P., & Wu, Z. (2015). Highly secure image steganography algorithm using curvelet transform and DCT encryption. 2015 Long Island Systems, Applications and Technology. https://doi.org/10.1109/lisat.2015.7160204

Senthooran, V., & Ranathunga, L. (2014). DCT coefficient dependent quantization table modification steganographic algorithm. 2014 First International Conference on Networks & Soft Computing (ICNSC2014). https://doi.org/10.1109/cnsc.2014.6906644

Gaba, J., & Kumar, M. (2013). Implementation of steganography using CES technique. 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013). https://doi.org/10.1109/iciip.2013.6707622

Nofriansyah, D., Defit, S., Nurcahyo, G. W., Ganefri, G., Ridwan, R., Ahmar, A. S., & Rahim, R. (2018). A new image encryption technique combining Hill cipher method, Morse code and least significant bit algorithm. Journal of Physics: Conference Series, 954, 012003. https://doi.org/10.1088/1742-6596/954/1/012003

Sridevi, D. R., Paruchuri,, V. L., & Rao, K. S. S. S. (2013). Image steganography combined with cryptography. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 9(1), 976–984. https://doi.org/10.24297/ijct.v9i1.4160

Narayana, S., & Prasad, G. (2010). Two new approaches for secured image steganography using cryptographic techniques and type conversions. Signal Image Processing : An International Journal, 1(2), 60–73. https://doi.org/10.5121/sipij.2010.1206

Kumar, Shiva & K B, Raja & Chhotaray, R & Pattnaik, Sabyasachi. (2011). Performance Comparison of Robust Steganography Based on Multiple Transformation Techniques. International Journal of Computer Technology and Applications. 02.

AbdelWahab, O. F., Hussein, A. I., Hamed, H. F., Kelash, H. M., Khalaf, A. A., & Ali, H. M. (2019). Hiding data in images using steganography techniques with compression algorithms. TELKOMNIKA (Telecommunication Computing Electronics and Control), 17(3), 1168. https://doi.org/10.12928/telkomnika.v17i3.12230

Mahjabin, T., Hossain, S. M., & Haque, M. S. (2012). A block based data hiding method in images using pixel value differencing and LSB substitution method. 2012 15th International Conference on Computer and Information Technology (ICCIT). https://doi.org/10.1109/iccitechn.2012.6509770

A.J. Umbarkar, R. Kamble, P., & V. Thakre, A. (2016). Comparative study of edge based LSB matching steganography for color images. ICTACT Journal on Image and Video Processing, 06(03), 1185–1191. https://doi.org/10.21917/ijivp.2016.0173

Lin, W.-B., Lai, T.-H., & Chang, K.-C. (2021). Statistical feature–based steganalysis for pixel-value differencing steganography. https://doi.org/10.21203/rs.3.rs-512243/v1

Brundick, F. S., & Marvel, L. M. (2001). Implementation of spread Spectrum Image Steganography. https://doi.org/10.21236/ada392155

Abboud, G., Marean, J., & Yampolskiy, R. V. (2010). Steganography and visual Cryptography in Computer Forensics. 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering. https://doi.org/10.1109/sadfe.2010.14

Doshi, R., Jain, P., Gupta, L. (2012). Steganography and Its Applications in Security, International Journal of Modern Engineering Research (IJMER), (2)6, 4634-4638, ISSN: 2249-6645

Kaur, H., Rani, J. (2016). A Survey on Different Techniques of Steganography, MATEC Web of Conferences 57, 1-6, DOI: 10.1051/matecconf/20165702003

Downloads

Published

2024-01-28

How to Cite

Abd Aziz, A. Z., Mohd Sultan, M. F., & Mohamad Zulkufli , N. L. (2024). Image Steganography: : Comparative Analysis of their Techniques, Complexity and Enhancements. International Journal on Perceptive and Cognitive Computing, 10(1), 59–70. https://doi.org/10.31436/ijpcc.v10i1.449