Skip to main content
Log in

Revisiting the steganography techniques with a novel region-based separation approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Correction to this article was published on 14 March 2024

This article has been updated

Abstract

Cryptography and steganography are employed to secure digital data transfers. We introduced an efficient region-based steganography pipeline to enhance security by concealing confidential information within an image. Our approach involves isolating the blue channel from the cover image, partitioning it into blocks, identifying smooth blocks, and embedding the message in the Least Significant Bit (LSB). Smooth blocks were determined using the Pixel Value Differencing (PVD) method, which compares a specific pixel value to the block’s average pixel value (M) of the particular block. Concealed areas exhibit greater imperceptibility in smooth regions than in rough ones. We performed experiments on a carefully chosen image set and assessed the performance of the region-based steganography method using widely recognized metrics such as PSNR, MSE, and SSIM. These metrics were applied to a widely recognized benchmark dataset for comparison. Results indicate significantly improved PSNR and SSIM levels for selected images, confirming the suitability of smooth, edge-free regions for concealing hidden messages with greater imperceptibility. We compared our method with recently published steganography methods and observed a significant enhancement in its ability to conceal information effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Change history

Notes

  1. https://github.com/Lojenaa/Region-based-separation-in-Steganography.git

Abbreviations

LSB:

Least Significant Bit

PVD:

Pixel Value Differencing

M:

Average Pixel Value / Mean value

PSNR:

Peak Signal-to-Noise Ratio

MSE:

Mean Square Error

SSIM:

Structural Similarity Index

DE:

Difference Expansion

MPV:

Mid Position Value

RGB:

Red, Green, Blue

XOR:

Exclusive disjunction

RDH:

Reversible Data Hiding

MPVD:

Modified Pixel Value Differencing

n-RBR:

n-Rightmost Bit Replacement

IoT:

Internet of Things

cpc:

Count of critical pixels

B:

Block / Selected Block

q:

Number of blocks

N:

Number of rows/columns

cp:

Changed pixels

len:

Length

CBC:

Cover Blue Channel

CRC:

Cover Red Channel

CGC:

Cover Green Channel

SBC:

Stego Blue Channel

SB:

Stego Block

CB:

Cover Block

C:

Cover Image

S:

Stego Image

m:

Number of rows

n:

Number of columns

BPP:

Bit Per Pixel

GS:

Gray Scale

References

  1. Saleh ME, Aly AA, Omara FA (2016) Data security using cryptography and steganography techniques. Int J Adv Comput Sci Appl 7(6):390–397

  2. Saxena AK, Sinha S, Shukla P (2018) Design and development of image security technique by using cryptography and steganography: a combine approach. Int J Image Graph Signal Process 10(4):13

    Article  Google Scholar 

  3. Rachmawanto EH, Sari CA et al (2017) Secure image steganography algorithm based on dct with otp encryption. J Appl Intell Syst 2(1):1–11

    Article  Google Scholar 

  4. Abel KD, Misra S, Agrawal A, Maskeliunas R, Damasevicius R (2022) Data security using cryptography and steganography technique on the cloud. In Computational Intelligence in Machine Learning: Select Proceedings of ICCIML 2021 (pp 475–481). Singapore, Springer Nature Singapore

  5. Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognit 34(3):671–683

    Article  Google Scholar 

  6. Jiang N, Zhao N, Wang L (2016) Lsb based quantum image steganography algorithm. Int J Theor Phys 55(1):107–123

    Article  Google Scholar 

  7. Juneja M, Sandhu PS (2013) An improved lsb based steganography technique for rgb color images. Int J Comput Commun Eng 2(4):513

    Article  Google Scholar 

  8. Zhang T, Ping X (2003) A new approach to reliable detection of lsb steganography in natural images. Signal Process 83(10):2085–2093

    Article  Google Scholar 

  9. Sahu AK, Swain G (2018) Digital image steganography using pvd and modulo operation. Internetworking Indones J 10(2):3–13

    Google Scholar 

  10. Arham A, Riza OS (2020) Reversible data hiding using hybrid method of difference expansion on medical image. Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) 6(2):11–19

    Article  Google Scholar 

  11. Mukherjee S, Roy S, Sanyal G (2018) Image steganography using mid position value technique. Procedia Comput Sci 132:461–468

    Article  Google Scholar 

  12. AbdelRaouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimed Tools Appl 80(15):23393–23417

    Article  Google Scholar 

  13. Dhaka V, Poonia RC, Singh YV (2013) A novel algorithm for image steganography based on effective channel selection technique. Int J Adv Res Comput Sci Softw Eng 3(8):428–433

  14. Abbood EA, Neamah RM, Abdulkadhm S (2018) Text in image hiding using developed lsb and random method. Int J Electr Comput Eng (2088-8708) 8(4):2091–2097

  15. Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66

    Article  Google Scholar 

  16. Zhou H, Shen Y, Zhu X, Liu B, Fu Z, Fan N (2016) Digital image modification detection using color information and its histograms. Forensic Sci Int 266:379–388

    Article  Google Scholar 

  17. Maniriho P, Ahmad T (2019) Information hiding scheme for digital images using difference expansion and modulus function. J King Saud Univ Comput Inf Sci 31(3):335–347

    Google Scholar 

  18. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and lsb replacement methods. IEEE Proc-Vis Image Signal Process 152(5):611–615

    Article  Google Scholar 

  19. Setiadi DRIM (2019) Payload enhancement on least significant bit image steganography using edge area dilation. Int J Electron Telecommun 65:287–292

  20. Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An adaptive image steganography method based on histogram of oriented gradient and pvd-lsb techniques. IEEE Access 7:185189–185204

    Article  Google Scholar 

  21. Ayub N, Selwal A (2020) An improved image steganography technique using edge based data hiding in dct domain. J Interdiscip Math 23(2):357–366

    Article  Google Scholar 

  22. Ray B, Mukhopadhyay S, Hossain S, Ghosal SK, Sarkar R (2021) Image steganography using deep learning based edge detection. Multimedia Tools Appl 80(24):33475–33503

    Article  Google Scholar 

  23. Bairagi AK, Mondal S, Debnath R (2014) A robust rgb channel based image steganography technique using a secret key. In: 16th Int’l Conf. Computer and Information Technology. IEEE, pp 81–87

  24. Swain G, Lenka SK (2012) A novel approach to rgb channel based image steganography technique. Int Arab J Technol 2(4):181–186

    Google Scholar 

  25. Singh S, Kaur J (2015) Odd-even message bit sequence based image steganography. Int J Comput Sci Inf Technol 6(4):3930–3932

    Google Scholar 

  26. Bhuiyan T, Sarower AH, Karim R, Hassan M (2019) An image steganography algorithm using lsb replacement through xor substitution. In: 2019 International conference on information and communications technology (ICOIACT). IEEE, pp 44–49

  27. Sahu AK, Swain G (2022) High fidelity based reversible data hiding using modified lsb matching and pixel difference. J King Saud Univ Comput Inf Sci 34(4):1395–1409

    Google Scholar 

  28. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626

    Article  Google Scholar 

  29. Hossain M, Al Haque S, Sharmin F (2009) Variable rate steganography in gray scale digital images using neighborhood pixel information. In: 2009 12th international conference on computers and information technology. IEEE, pp 267–272

  30. Min-Allah N, Nagy N, Aljabri M, Alkharraa M, Alqahtani M, Alghamdi D, Sabri R, Alshaikh R (2022) Quantum image steganography schemes for data hiding: a survey. Appl Sci 12(20):10294

    Article  Google Scholar 

  31. Qu Z, Chen S, Wang X (2020) A secure controlled quantum image steganography algorithm. Quantum Inf Process 19:1–25

    Article  MathSciNet  Google Scholar 

  32. Abd-El-Atty B (2023) A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput Appl 35(1):773–785

    Article  Google Scholar 

  33. Abd-El-Atty B, ElAffendi M, El-Latif AAA (2023) A novel image cryptosystem using gray code, quantum walks, and henon map for cloud applications. Complex Intell Syst 9(1):609–624

    Article  Google Scholar 

  34. Arunkumar S, Vairavasundaram S, Ravichandran K, Ravi L (2019) Riwt and qr factorization based hybrid robust image steganography using block selection algorithm for iot devices. J Intell Fuzzy Syst 36(5):4265–4276

    Article  Google Scholar 

  35. Namasudra S (2022) A secure cryptosystem using dna cryptography and dna steganography for the cloud-based iot infrastructure. Comput Electr Eng 104:108426

    Article  Google Scholar 

  36. Zhou Z, Su Y, Zhang Y, Xia Z, Du S, Gupta BB, Qi L (2021) Coverless information hiding based on probability graph learning for secure communication in iot environment. IEEE Internet Things J 9(12):9332–9341

    Article  Google Scholar 

  37. Wu P, Yang Y, Li X (2018) Stegnet: mega image steganography capacity with deep convolutional network. Future Internet 10(6):54. https://doi.org/10.3390/fi10060054

    Article  Google Scholar 

  38. Sara U, Akter M, Uddin MS (2019) Image quality assessment through fsim, ssim, mse and psnr—a comparative study. J Comput Commun 7(3):8–18

    Article  Google Scholar 

  39. Abdullah SM, Manaf AA (2010) Multiple layer reversible images watermarking using enhancement of difference expansion techniques. In: Networked digital technologies: second international conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I 2. Springer, pp 333–342

  40. Siddiqui GF, Iqbal MZ, Saleem K, Saeed Z, Ahmed A, Hameed IA, Khan MF (2020) A dynamic three-bit image steganography algorithm for medical and e-healthcare systems. IEEE Access 8:181893–181903

    Article  Google Scholar 

  41. Pandey J, Joshi K, Jangra M, Sain M (2019) Pixel indicator steganography technique with enhanced capacity for rgb images. In: 2019 International conference on intelligent computing and control systems (ICCS). IEEE, pp 738–743

  42. Kusuma EJ, Indriani OR, Sari CA, Rachmawanto EH et al (2017) An imperceptible lsb image hiding on edge region using des encryption. In: 2017 International conference on innovative and creative information technology (ICITech). IEEE, pp 1–6

  43. Nashat D, Mamdouh L (2023) A least significant bit steganographic method using hough transform technique. J Netw Netw Appl 3(2):73–80

    Google Scholar 

  44. Karawia A (2021) Medical image steganographic algorithm via modified lsb method and chaotic map. IET Image Process 15(11):2580–2590

    Article  Google Scholar 

  45. Sahu AK, Swain G (2020) Reversible image steganography using dual-layer lsb matching. Sens Imaging 21:1–21

    Article  Google Scholar 

  46. Nasution A, Efendi S, Suwilo S (2018) Image steganography in securing sound file using arithmetic coding algorithm, triple data encryption standard (3des) and modified least significant bit (mlsb). In: Journal of Physics: Conference Series, vol 1007. IOP Publishing, p 012010

  47. Alexandre L, Neto A, Cerqueira E, Figueiredo S, Aguiar RL (2012) Supporting multimedia services in the future network with qos-routing. In: Mobile Networks and Management: Third International ICST Conference, MONAMI 2011, Aveiro, Portugal, September 21-23, 2011, Revised Selected Papers 3. Springer, pp 316–331

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kartheeswaran Thangathurai.

Ethics declarations

Conflicts of interest

We have no conflicts of interest to disclose. Data sharing not applicable to this article as no any specific datasets were generated or analyzed during the current study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: The original publication of this article contains discrepancies between the HML and PDF versions. The HTML version contains the following errors: In the affiliation of the first author, “Killinochchi” should be “Kilinochchi”. In the Abbreviations section, “BPP: Bit Per Rate” should be “BPP: Bit Per Pixel” In Algorithm 1, line 10, “cpc < 4” should be “cpc \(\le \) 4”. In table 6 note, “BPP - Bit Per Rate” should be “BPP - Bit Per Pixel”.

Appendices

Appendix A: Dataset

Table 9 Sample experimental images in five categories

Appendix B: Comprehensive Embedding Mechanism

Fig. 10
figure 10

Demonstration of the embedding process of the proposed method

Appendix C: Comprehensive Extraction Mechanism

Fig. 11
figure 11

Flowchart of the recovering process of concealed message

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

George, R., Navanesan, L. & Thangathurai, K. Revisiting the steganography techniques with a novel region-based separation approach. Multimed Tools Appl 83, 71089–71114 (2024). https://doi.org/10.1007/s11042-023-17961-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17961-8

Keywords