Abstract
Cryptography and steganography are employed to secure digital data transfers. We introduced an efficient region-based steganography pipeline to enhance security by concealing confidential information within an image. Our approach involves isolating the blue channel from the cover image, partitioning it into blocks, identifying smooth blocks, and embedding the message in the Least Significant Bit (LSB). Smooth blocks were determined using the Pixel Value Differencing (PVD) method, which compares a specific pixel value to the block’s average pixel value (M) of the particular block. Concealed areas exhibit greater imperceptibility in smooth regions than in rough ones. We performed experiments on a carefully chosen image set and assessed the performance of the region-based steganography method using widely recognized metrics such as PSNR, MSE, and SSIM. These metrics were applied to a widely recognized benchmark dataset for comparison. Results indicate significantly improved PSNR and SSIM levels for selected images, confirming the suitability of smooth, edge-free regions for concealing hidden messages with greater imperceptibility. We compared our method with recently published steganography methods and observed a significant enhancement in its ability to conceal information effectively.











Similar content being viewed by others
Change history
14 March 2024
A Correction to this paper has been published: https://doi.org/10.1007/s11042-024-18873-x
Abbreviations
- LSB:
-
Least Significant Bit
- PVD:
-
Pixel Value Differencing
- M:
-
Average Pixel Value / Mean value
- PSNR:
-
Peak Signal-to-Noise Ratio
- MSE:
-
Mean Square Error
- SSIM:
-
Structural Similarity Index
- DE:
-
Difference Expansion
- MPV:
-
Mid Position Value
- RGB:
-
Red, Green, Blue
- XOR:
-
Exclusive disjunction
- RDH:
-
Reversible Data Hiding
- MPVD:
-
Modified Pixel Value Differencing
- n-RBR:
-
n-Rightmost Bit Replacement
- IoT:
-
Internet of Things
- cpc:
-
Count of critical pixels
- B:
-
Block / Selected Block
- q:
-
Number of blocks
- N:
-
Number of rows/columns
- cp:
-
Changed pixels
- len:
-
Length
- CBC:
-
Cover Blue Channel
- CRC:
-
Cover Red Channel
- CGC:
-
Cover Green Channel
- SBC:
-
Stego Blue Channel
- SB:
-
Stego Block
- CB:
-
Cover Block
- C:
-
Cover Image
- S:
-
Stego Image
- m:
-
Number of rows
- n:
-
Number of columns
- BPP:
-
Bit Per Pixel
- GS:
-
Gray Scale
References
Saleh ME, Aly AA, Omara FA (2016) Data security using cryptography and steganography techniques. Int J Adv Comput Sci Appl 7(6):390–397
Saxena AK, Sinha S, Shukla P (2018) Design and development of image security technique by using cryptography and steganography: a combine approach. Int J Image Graph Signal Process 10(4):13
Rachmawanto EH, Sari CA et al (2017) Secure image steganography algorithm based on dct with otp encryption. J Appl Intell Syst 2(1):1–11
Abel KD, Misra S, Agrawal A, Maskeliunas R, Damasevicius R (2022) Data security using cryptography and steganography technique on the cloud. In Computational Intelligence in Machine Learning: Select Proceedings of ICCIML 2021 (pp 475–481). Singapore, Springer Nature Singapore
Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognit 34(3):671–683
Jiang N, Zhao N, Wang L (2016) Lsb based quantum image steganography algorithm. Int J Theor Phys 55(1):107–123
Juneja M, Sandhu PS (2013) An improved lsb based steganography technique for rgb color images. Int J Comput Commun Eng 2(4):513
Zhang T, Ping X (2003) A new approach to reliable detection of lsb steganography in natural images. Signal Process 83(10):2085–2093
Sahu AK, Swain G (2018) Digital image steganography using pvd and modulo operation. Internetworking Indones J 10(2):3–13
Arham A, Riza OS (2020) Reversible data hiding using hybrid method of difference expansion on medical image. Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) 6(2):11–19
Mukherjee S, Roy S, Sanyal G (2018) Image steganography using mid position value technique. Procedia Comput Sci 132:461–468
AbdelRaouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimed Tools Appl 80(15):23393–23417
Dhaka V, Poonia RC, Singh YV (2013) A novel algorithm for image steganography based on effective channel selection technique. Int J Adv Res Comput Sci Softw Eng 3(8):428–433
Abbood EA, Neamah RM, Abdulkadhm S (2018) Text in image hiding using developed lsb and random method. Int J Electr Comput Eng (2088-8708) 8(4):2091–2097
Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66
Zhou H, Shen Y, Zhu X, Liu B, Fu Z, Fan N (2016) Digital image modification detection using color information and its histograms. Forensic Sci Int 266:379–388
Maniriho P, Ahmad T (2019) Information hiding scheme for digital images using difference expansion and modulus function. J King Saud Univ Comput Inf Sci 31(3):335–347
Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and lsb replacement methods. IEEE Proc-Vis Image Signal Process 152(5):611–615
Setiadi DRIM (2019) Payload enhancement on least significant bit image steganography using edge area dilation. Int J Electron Telecommun 65:287–292
Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An adaptive image steganography method based on histogram of oriented gradient and pvd-lsb techniques. IEEE Access 7:185189–185204
Ayub N, Selwal A (2020) An improved image steganography technique using edge based data hiding in dct domain. J Interdiscip Math 23(2):357–366
Ray B, Mukhopadhyay S, Hossain S, Ghosal SK, Sarkar R (2021) Image steganography using deep learning based edge detection. Multimedia Tools Appl 80(24):33475–33503
Bairagi AK, Mondal S, Debnath R (2014) A robust rgb channel based image steganography technique using a secret key. In: 16th Int’l Conf. Computer and Information Technology. IEEE, pp 81–87
Swain G, Lenka SK (2012) A novel approach to rgb channel based image steganography technique. Int Arab J Technol 2(4):181–186
Singh S, Kaur J (2015) Odd-even message bit sequence based image steganography. Int J Comput Sci Inf Technol 6(4):3930–3932
Bhuiyan T, Sarower AH, Karim R, Hassan M (2019) An image steganography algorithm using lsb replacement through xor substitution. In: 2019 International conference on information and communications technology (ICOIACT). IEEE, pp 44–49
Sahu AK, Swain G (2022) High fidelity based reversible data hiding using modified lsb matching and pixel difference. J King Saud Univ Comput Inf Sci 34(4):1395–1409
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626
Hossain M, Al Haque S, Sharmin F (2009) Variable rate steganography in gray scale digital images using neighborhood pixel information. In: 2009 12th international conference on computers and information technology. IEEE, pp 267–272
Min-Allah N, Nagy N, Aljabri M, Alkharraa M, Alqahtani M, Alghamdi D, Sabri R, Alshaikh R (2022) Quantum image steganography schemes for data hiding: a survey. Appl Sci 12(20):10294
Qu Z, Chen S, Wang X (2020) A secure controlled quantum image steganography algorithm. Quantum Inf Process 19:1–25
Abd-El-Atty B (2023) A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput Appl 35(1):773–785
Abd-El-Atty B, ElAffendi M, El-Latif AAA (2023) A novel image cryptosystem using gray code, quantum walks, and henon map for cloud applications. Complex Intell Syst 9(1):609–624
Arunkumar S, Vairavasundaram S, Ravichandran K, Ravi L (2019) Riwt and qr factorization based hybrid robust image steganography using block selection algorithm for iot devices. J Intell Fuzzy Syst 36(5):4265–4276
Namasudra S (2022) A secure cryptosystem using dna cryptography and dna steganography for the cloud-based iot infrastructure. Comput Electr Eng 104:108426
Zhou Z, Su Y, Zhang Y, Xia Z, Du S, Gupta BB, Qi L (2021) Coverless information hiding based on probability graph learning for secure communication in iot environment. IEEE Internet Things J 9(12):9332–9341
Wu P, Yang Y, Li X (2018) Stegnet: mega image steganography capacity with deep convolutional network. Future Internet 10(6):54. https://doi.org/10.3390/fi10060054
Sara U, Akter M, Uddin MS (2019) Image quality assessment through fsim, ssim, mse and psnr—a comparative study. J Comput Commun 7(3):8–18
Abdullah SM, Manaf AA (2010) Multiple layer reversible images watermarking using enhancement of difference expansion techniques. In: Networked digital technologies: second international conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I 2. Springer, pp 333–342
Siddiqui GF, Iqbal MZ, Saleem K, Saeed Z, Ahmed A, Hameed IA, Khan MF (2020) A dynamic three-bit image steganography algorithm for medical and e-healthcare systems. IEEE Access 8:181893–181903
Pandey J, Joshi K, Jangra M, Sain M (2019) Pixel indicator steganography technique with enhanced capacity for rgb images. In: 2019 International conference on intelligent computing and control systems (ICCS). IEEE, pp 738–743
Kusuma EJ, Indriani OR, Sari CA, Rachmawanto EH et al (2017) An imperceptible lsb image hiding on edge region using des encryption. In: 2017 International conference on innovative and creative information technology (ICITech). IEEE, pp 1–6
Nashat D, Mamdouh L (2023) A least significant bit steganographic method using hough transform technique. J Netw Netw Appl 3(2):73–80
Karawia A (2021) Medical image steganographic algorithm via modified lsb method and chaotic map. IET Image Process 15(11):2580–2590
Sahu AK, Swain G (2020) Reversible image steganography using dual-layer lsb matching. Sens Imaging 21:1–21
Nasution A, Efendi S, Suwilo S (2018) Image steganography in securing sound file using arithmetic coding algorithm, triple data encryption standard (3des) and modified least significant bit (mlsb). In: Journal of Physics: Conference Series, vol 1007. IOP Publishing, p 012010
Alexandre L, Neto A, Cerqueira E, Figueiredo S, Aguiar RL (2012) Supporting multimedia services in the future network with qos-routing. In: Mobile Networks and Management: Third International ICST Conference, MONAMI 2011, Aveiro, Portugal, September 21-23, 2011, Revised Selected Papers 3. Springer, pp 316–331
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
We have no conflicts of interest to disclose. Data sharing not applicable to this article as no any specific datasets were generated or analyzed during the current study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this article was revised: The original publication of this article contains discrepancies between the HML and PDF versions. The HTML version contains the following errors: In the affiliation of the first author, “Killinochchi” should be “Kilinochchi”. In the Abbreviations section, “BPP: Bit Per Rate” should be “BPP: Bit Per Pixel” In Algorithm 1, line 10, “cpc < 4” should be “cpc \(\le \) 4”. In table 6 note, “BPP - Bit Per Rate” should be “BPP - Bit Per Pixel”.
Appendices
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
George, R., Navanesan, L. & Thangathurai, K. Revisiting the steganography techniques with a novel region-based separation approach. Multimed Tools Appl 83, 71089–71114 (2024). https://doi.org/10.1007/s11042-023-17961-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17961-8