Processing Adaptive Data Insertion in Steganography
Abdelkader Boudaoud
Laboratory of coding and security of information, Department of Mathematics and Computer Science, University of Sciences and Technology of Oran Mohamed Boudiaf USTO-MB B.P. 1505, El Mnaouar – Bir el Djir, Oran, Algeria.
Laboratory of coding and security of information, Department of Mathematics and Computer Science, University of Sciences and Technology of Oran Mohamed Boudiaf USTO-MB B.P. 1505, El Mnaouar – Bir el Djir, Oran, Algeria.
Quartz Laboratory, École Catholique d’Arts et Métiers-École d'Électricité, de Production et desMéthodes Industrielles (ECAM-EPMI), 95092 Cergy Pontoise, France.
In an era of rapidly evolving communication methods, the exchange of sensitive information— such as personal data, financial records, and proprietary business knowledge—has become increasingly vulnerable to interception and misuse. As a result, organizations must adopt robust security measures and encryption technologies to safeguard their communications and maintain trust with their stakeholders. Whether it's military, financial, medical, personal, etc.—sharing information over the Internet and social networks has become an urgent necessity that cannot be ignored. This is where the importance of steganography technology, which is concerned with maintaining the confidentiality of information by camouflaging it, comes into play. This technology, which is a unique process, allows us to hide a secret message inside another file, often an image known as a camouflaged image. After entering the secret information into that image, the resulting image is called a "stego image." The goal of this process is to not reveal the secret information contained in the original file, making it difficult or even impossible to distinguish between the original copy and the document containing the secret message. There are many ways to achieve this, the most prominent of which is the LSB technique, which relies on the least significant bit. However, despite its effectiveness, this method suffers from a major limitation, which is the small size of the stored. information. Therefore, in this research, we decided to adopt a method that combines secret information processing and LSB technology with the aim of increasing the size of the stored information while maintaining image quality and confidentiality. This pursuit of excellence truly demonstrates how important innovation is to protecting our privacy in today's connected world.
Keywords
Data Security, Steganography, Steganalysis, RGB, LSB, Pixel, Bit.
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010, doi: 10.1016/j.sigpro.2009.08.010.
A. Gutub, A. Al-Qahtani, and A. Tabakh, “Triple-A: Secure RGB image steganography based on randomization,” 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 400–403, 2009, doi: 10.1109/aiccsa.2009.5069356.
Amanpreet, K., Renu, D., Geeta, S.: A new Image Steganography Based on First Component Alteration Technique. Int. Comput. Sci. Inf. Secur. 6(3) (2009)
Bhattacharyya, D., Roy, A., Roy, P., Kim, T.-h.: Receiver compatible data hiding in color image. Int. J. Adv. Sci. Technol.6(1), 15–24 (2009)
Majeed, M. A., Sulaiman, R.: An improved lsb image steganography technique using bit-inverse in 24-bit colour image. J. Theoret. Appl. Inf. Technol. 80(2) (2015)
N. Akhtar, S. Khan, and P. Johri, “An improved inverted LSB image steganography,” 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 749–755, Feb. 2014, doi: 10.1109/icicict.2014.6781374.
S. Jaafar, A. A. Manaf, and A. M. Zeki, “Steganography technique using modulus arithmetic,” 2007 9th International Symposium on Signal Processing and Its Applications, pp. 1–4, Feb. 2007, doi: 10.1109/isspa.2007.4555443.
A. Fernandes and W. Jeberson, “Covert Communication Using Arithmetic Division Operation,” Procedia Computer Science, vol. 45, pp. 354–360, 2015, doi: 10.1016/j.procs.2015.03.160.
C.-H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” Pattern Recognition, vol. 41, no. 8, pp. 2674–2683, Aug. 2008, doi: 10.1016/j.patcog.2008.01.019.
Al-Farraji, O. I. I.: Steganography by use binary operations. Int. J. Engineer. Res. Gen. Sci. 4, 179–187 (2016)
M. H. Mohamed and L. M. Mohamed, “High-Capacity Image Steganography Technique based on LSB Substitution Method,” Applied Mathematics & Information Sciences, vol. 10, no. 1, pp. 259–266, Jan. 2016, doi: 10.18576/amis/100126.
M. Khodaei and K. Faez, “New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing,” IET Image Processing, vol. 6, no. 6, pp. 677–686, Aug. 2012, doi: 10.1049/iet-ipr.2011.0059.
V. Sabeti, S. Samavi, and S. Shirani, “An adaptive LSB matching steganography based on octonary complexity measure,” Multimedia Tools and Applications, vol. 64, no. 3, pp. 777–793, Jan. 2012, doi: 10.1007/s11042-011-0975-y.
Fendi, A. Wibisurya, and Faisal, “Distributed Steganography Using Five Pixel Pair Differencing and Modulus Function,” Procedia Computer Science, vol. 116, pp. 334–341, 2017, doi: 10.1016/j.procs.2017.10.085.
K. Joshi and R. Yadav, “New approach toward data hiding using XOR for image steganography,” 2016 Ninth International Conference on Contemporary Computing (IC3), pp. 1–6, Aug. 2016, doi: 10.1109/ic3.2016.7880204.
D. Grībermans, A. Jeršovs, and P. Rusakovs, “Development of Requirements Specification for Steganographic Systems,” Applied Computer Systems, vol. 20, no. 1, pp. 40–48, Dec. 2016, doi: 10.1515/acss-2016-0014.
C.-C. Thien and J.-C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition, vol. 36, no. 12, pp. 2875–2881, Dec. 2003, doi: 10.1016/s0031-3203(03)00221-8.
R.-Z. Wang, C.-F. Lin, and J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp. 671–683, Mar. 2001, doi: 10.1016/s0031-3203(00)00015-7.
S.-J. Wang, “Steganography of capacity required using modulo operator for embedding secret image,” Applied Mathematics and Computation, vol. 164, no. 1, pp. 99–116, May 2005, doi: 10.1016/j.amc.2004.04.059.
C.-K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469–474, Mar. 2004, doi: 10.1016/j.patcog.2003.08.007.
X. Wu, C.-H. Chu, Y. Wang, F. Liu, and D. Yue, “Privacy Preserving Data Mining Research: Current Status and Key Issues,” Computational Science – ICCS 2007, pp. 762–772, 2007, doi: 10.1007/978-3-540-72588-6_125.
C.-C. Chang, Y.-C. Chou, and T. D. Kieu, “Information Hiding in Dual Images with Reversibility,” 2009 Third International Conference on Multimedia and Ubiquitous Engineering, pp. 145–152, Jun. 2009, doi: 10.1109/mue.2009.35.
Kamau, G. M.: An enhanced least significant bit steganographic method for information hiding. PhD thesis (2014)
K.-H. Thung and P. Raveendran, “A survey of image quality measures,” 2009 International Conference for Technical Postgraduates (TECHPOS), pp. 1–4, Dec. 2009, doi: 10.1109/techpos.2009.5412098.
Jiansheng, M., Sukang, L., Xiaomei, T.: A digital watermarking algorithm based on dct and dwt. In: Proceedings. The 2009 International Symposium on Web Information Systems and Applications (WISA 2009), p. 104. Academy Publisher, (2009)
Al-Ataby, A., Al-Naima, F.: A modified high-capacity image steganography technique based on wavelet transform. Int. Arab J. Inf. Technol. 7(4), 358–364 (2010)
M. Zeeshan, “A Review Study on Unique Way of Information Hiding: Steganography,” International Journal on Data Science and Technology, vol. 3, no. 5, p. 45, 2017, doi: 10.11648/j.ijdst.20170305.11.
R. Munir, “Chaos-based modified ‘EzStego’ algorithm for improving security of message hiding in GIF image,” 2015 International Conference on Computer, Control, Informatics and its Applications (IC3INA), pp. 80–84, Oct. 2015, doi: 10.1109/ic3ina.2015.7377750.
K. Tutuncu and B. Demirci, “Adaptive LSB Steganography Based on Chaos Theory and Random Distortion,” Advances in Electrical and Computer Engineering, vol. 18, no. 3, pp. 15–22, 2018, doi: 10.4316/aece.2018.03003.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Abdelkader boudaoud, Naima hadj said and Hana Ali-Pacha;
Methodology: Naima hadj said and Hana Ali-Pacha;
Software: Abdelkader boudaoud, Naima hadj said;
Data Curation: Abdelkader boudaoud, Naima hadj said;
Writing- Original Draft Preparation: Abdelkader boudaoud, Naima hadj said and Hana Ali-Pacha;
Supervision: Abdelkader boudaoud, Naima hadj said;
Validation: Naima hadj said and Hana Ali-Pacha;
Writing- Reviewing and Editing: Abdelkader boudaoud, Naima hadj said and Hana Ali-Pacha;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
The authors would like to thank to the reviewers for nice comments on the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Abdelkader Boudaoud
Laboratory of coding and security of information, Department of Mathematics and Computer Science, University of Sciences and Technology of Oran Mohamed Boudiaf USTO-MB B.P. 1505, El Mnaouar – Bir el Djir, Oran, Algeria.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Abdelkader Boudaoud, Naima Hadj Said and Hana Ali-Pacha, “Processing Adaptive Data Insertion in Steganography”, Journal of Machine and Computing, pp. 984-993, April 2025, doi: 10.53759/7669/jmc202505078.