Journal of Machine and Computing


Processing Adaptive Data Insertion in Steganography



Journal of Machine and Computing

Received On : 11 October 2024

Revised On : 26 January 2025

Accepted On : 02 March 2025

Published On : 05 April 2025

Volume 05, Issue 02

Pages : 984-993


Abstract


In an era of rapidly evolving communication methods, the exchange of sensitive information— such as personal data, financial records, and proprietary business knowledge—has become increasingly vulnerable to interception and misuse. As a result, organizations must adopt robust security measures and encryption technologies to safeguard their communications and maintain trust with their stakeholders. Whether it's military, financial, medical, personal, etc.—sharing information over the Internet and social networks has become an urgent necessity that cannot be ignored. This is where the importance of steganography technology, which is concerned with maintaining the confidentiality of information by camouflaging it, comes into play. This technology, which is a unique process, allows us to hide a secret message inside another file, often an image known as a camouflaged image. After entering the secret information into that image, the resulting image is called a "stego image." The goal of this process is to not reveal the secret information contained in the original file, making it difficult or even impossible to distinguish between the original copy and the document containing the secret message. There are many ways to achieve this, the most prominent of which is the LSB technique, which relies on the least significant bit. However, despite its effectiveness, this method suffers from a major limitation, which is the small size of the stored. information. Therefore, in this research, we decided to adopt a method that combines secret information processing and LSB technology with the aim of increasing the size of the stored information while maintaining image quality and confidentiality. This pursuit of excellence truly demonstrates how important innovation is to protecting our privacy in today's connected world.


Keywords


Data Security, Steganography, Steganalysis, RGB, LSB, Pixel, Bit.


  1. A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010, doi: 10.1016/j.sigpro.2009.08.010.
  2. A. Gutub, A. Al-Qahtani, and A. Tabakh, “Triple-A: Secure RGB image steganography based on randomization,” 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 400–403, 2009, doi: 10.1109/aiccsa.2009.5069356.
  3. Amanpreet, K., Renu, D., Geeta, S.: A new Image Steganography Based on First Component Alteration Technique. Int. Comput. Sci. Inf. Secur. 6(3) (2009)
  4. Bhattacharyya, D., Roy, A., Roy, P., Kim, T.-h.: Receiver compatible data hiding in color image. Int. J. Adv. Sci. Technol.6(1), 15–24 (2009)
  5. Majeed, M. A., Sulaiman, R.: An improved lsb image steganography technique using bit-inverse in 24-bit colour image. J. Theoret. Appl. Inf. Technol. 80(2) (2015)
  6. N. Akhtar, S. Khan, and P. Johri, “An improved inverted LSB image steganography,” 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 749–755, Feb. 2014, doi: 10.1109/icicict.2014.6781374.
  7. S. Jaafar, A. A. Manaf, and A. M. Zeki, “Steganography technique using modulus arithmetic,” 2007 9th International Symposium on Signal Processing and Its Applications, pp. 1–4, Feb. 2007, doi: 10.1109/isspa.2007.4555443.
  8. A. Fernandes and W. Jeberson, “Covert Communication Using Arithmetic Division Operation,” Procedia Computer Science, vol. 45, pp. 354–360, 2015, doi: 10.1016/j.procs.2015.03.160.
  9. C.-H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” Pattern Recognition, vol. 41, no. 8, pp. 2674–2683, Aug. 2008, doi: 10.1016/j.patcog.2008.01.019.
  10. Al-Farraji, O. I. I.: Steganography by use binary operations. Int. J. Engineer. Res. Gen. Sci. 4, 179–187 (2016)
  11. M. H. Mohamed and L. M. Mohamed, “High-Capacity Image Steganography Technique based on LSB Substitution Method,” Applied Mathematics & Information Sciences, vol. 10, no. 1, pp. 259–266, Jan. 2016, doi: 10.18576/amis/100126.
  12. M. Khodaei and K. Faez, “New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing,” IET Image Processing, vol. 6, no. 6, pp. 677–686, Aug. 2012, doi: 10.1049/iet-ipr.2011.0059.
  13. V. Sabeti, S. Samavi, and S. Shirani, “An adaptive LSB matching steganography based on octonary complexity measure,” Multimedia Tools and Applications, vol. 64, no. 3, pp. 777–793, Jan. 2012, doi: 10.1007/s11042-011-0975-y.
  14. Fendi, A. Wibisurya, and Faisal, “Distributed Steganography Using Five Pixel Pair Differencing and Modulus Function,” Procedia Computer Science, vol. 116, pp. 334–341, 2017, doi: 10.1016/j.procs.2017.10.085.
  15. K. Joshi and R. Yadav, “New approach toward data hiding using XOR for image steganography,” 2016 Ninth International Conference on Contemporary Computing (IC3), pp. 1–6, Aug. 2016, doi: 10.1109/ic3.2016.7880204.
  16. D. Grībermans, A. Jeršovs, and P. Rusakovs, “Development of Requirements Specification for Steganographic Systems,” Applied Computer Systems, vol. 20, no. 1, pp. 40–48, Dec. 2016, doi: 10.1515/acss-2016-0014.
  17. C.-C. Thien and J.-C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition, vol. 36, no. 12, pp. 2875–2881, Dec. 2003, doi: 10.1016/s0031-3203(03)00221-8.
  18. R.-Z. Wang, C.-F. Lin, and J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp. 671–683, Mar. 2001, doi: 10.1016/s0031-3203(00)00015-7.
  19. S.-J. Wang, “Steganography of capacity required using modulo operator for embedding secret image,” Applied Mathematics and Computation, vol. 164, no. 1, pp. 99–116, May 2005, doi: 10.1016/j.amc.2004.04.059.
  20. C.-K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469–474, Mar. 2004, doi: 10.1016/j.patcog.2003.08.007.
  21. X. Wu, C.-H. Chu, Y. Wang, F. Liu, and D. Yue, “Privacy Preserving Data Mining Research: Current Status and Key Issues,” Computational Science – ICCS 2007, pp. 762–772, 2007, doi: 10.1007/978-3-540-72588-6_125.
  22. C.-C. Chang, Y.-C. Chou, and T. D. Kieu, “Information Hiding in Dual Images with Reversibility,” 2009 Third International Conference on Multimedia and Ubiquitous Engineering, pp. 145–152, Jun. 2009, doi: 10.1109/mue.2009.35.
  23. Kamau, G. M.: An enhanced least significant bit steganographic method for information hiding. PhD thesis (2014)
  24. K.-H. Thung and P. Raveendran, “A survey of image quality measures,” 2009 International Conference for Technical Postgraduates (TECHPOS), pp. 1–4, Dec. 2009, doi: 10.1109/techpos.2009.5412098.
  25. Jiansheng, M., Sukang, L., Xiaomei, T.: A digital watermarking algorithm based on dct and dwt. In: Proceedings. The 2009 International Symposium on Web Information Systems and Applications (WISA 2009), p. 104. Academy Publisher, (2009)
  26. Al-Ataby, A., Al-Naima, F.: A modified high-capacity image steganography technique based on wavelet transform. Int. Arab J. Inf. Technol. 7(4), 358–364 (2010)
  27. M. Zeeshan, “A Review Study on Unique Way of Information Hiding: Steganography,” International Journal on Data Science and Technology, vol. 3, no. 5, p. 45, 2017, doi: 10.11648/j.ijdst.20170305.11.
  28. R. Munir, “Chaos-based modified ‘EzStego’ algorithm for improving security of message hiding in GIF image,” 2015 International Conference on Computer, Control, Informatics and its Applications (IC3INA), pp. 80–84, Oct. 2015, doi: 10.1109/ic3ina.2015.7377750.
  29. K. Tutuncu and B. Demirci, “Adaptive LSB Steganography Based on Chaos Theory and Random Distortion,” Advances in Electrical and Computer Engineering, vol. 18, no. 3, pp. 15–22, 2018, doi: 10.4316/aece.2018.03003.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Abdelkader boudaoud, Naima hadj said and Hana Ali-Pacha; Methodology: Naima hadj said and Hana Ali-Pacha; Software: Abdelkader boudaoud, Naima hadj said; Data Curation: Abdelkader boudaoud, Naima hadj said; Writing- Original Draft Preparation: Abdelkader boudaoud, Naima hadj said and Hana Ali-Pacha; Supervision: Abdelkader boudaoud, Naima hadj said; Validation: Naima hadj said and Hana Ali-Pacha; Writing- Reviewing and Editing: Abdelkader boudaoud, Naima hadj said and Hana Ali-Pacha; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


The authors would like to thank to the reviewers for nice comments on the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Abdelkader Boudaoud, Naima Hadj Said and Hana Ali-Pacha, “Processing Adaptive Data Insertion in Steganography”, Journal of Machine and Computing, pp. 984-993, April 2025, doi: 10.53759/7669/jmc202505078.


Copyright


© 2025 Abdelkader Boudaoud, Naima Hadj Said and Hana Ali-Pacha. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.