Skip to main content

Advertisement

Log in

A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Steganography is a technique of hiding information in digital media such as images, text, audio, etc. This digital media is used as the cover to make the private message invisible. Apparently, the attackers do not have any idea about the original message that is being hidden in the cover media. In this research, the proposed technique has focused on implementing the least significant bit (LSB) matching steganography algorithm. For ensuring better security, the advanced encryption standard (AES) technique is used before applying the steganography technique to ensure two-layer security of the private message. Another feature that is used in this research is using mosaic images as the cover media. Mosaic image is capable of hiding up to five LSB layers. Different survey papers show that the success rate of using mosaic images as the cover media is approximately 99% comparing with approximately 50% the success of normal image in case of data hiding. Our proposed approach overcomes the problem of stego image distortion using mosaic images. The improved LSB steganography algorithm also effectively handles mosaic images. Using a better version of LSB, Stego images were given more excellent peak signal-to-noise ratio (PSNR) value than other approaches when the hidden message was integrated into the mosaic image. Compared with different space domain strategies, the PSNR value of our proposed system is 85.65 dB for a maximum capacity of 32 bytes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Availability of data and material

Not applicable.

Code availability

Not applicable.

References

  1. Abdullah A. Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptogr Netw Secur. 2017;16:1–11.

    Google Scholar 

  2. Ahmed MA, Mat Kiah ML, Bahaa B, Zaidan A. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J Appl Sci. 2010. https://doi.org/10.3923/jas.2010.59.64.

    Article  Google Scholar 

  3. Al-Aidroos NM, Bahamish HA. Image steganography based on LSB matching and image enlargement. In: 2019 First International Conference of Intelligent Computing and Engineering (ICOICE); 2019. p. 1–6 . https://doi.org/10.1109/ICOICE48418.2019.9035172.

  4. Alam GM, Mat Kiah ML, Bahaa B, Zaidan A, Alanazi H. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study. Sci Res Essays. 2010;5:3254–60.

    Google Scholar 

  5. Anwar F, Rachmawanto EH, Atika Sari C, Ignatius Moses Setiadi DR. Stegocrypt scheme using LSB-AES base64. In: 2019 International Conference on Information and Communications Technology (ICOIACT); 2019. p. 85–90 . https://doi.org/10.1109/ICOIACT46704.2019.8938567.

  6. Arora R, Parashar A, Transforming CCI. Secure user data in cloud computing using encryption algorithms. Int J Eng Res Appl. 2013;3(4):1922–6.

    Google Scholar 

  7. Bahaa B, Zaidan A, Taqa A, Alam GM, Mat Kiah ML, Jalab A. Stegomos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int J Phys Sci. 2010;5:1796–806.

    Google Scholar 

  8. Chikouche SL, Chikouche N. An improved approach for LSB-based image steganography using AES algorithm. In: 2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE-B); 2017. p. 1–6 . https://doi.org/10.1109/ICEE-B.2017.8192077.

  9. Daemen J, Rijmen V. The block cipher rijndael. In: Quisquater JJ, Schneier B, editors. Smart card research and applications. Berlin: Springer; 2000. p. 277–84.

    Chapter  Google Scholar 

  10. Fathy A, Tarrad IF, Hamed HFA, Awad AI. Advanced encryption standard algorithm: issues and implementation aspects. In: Hassanien AE, Salem ABM, Ramadan R, Kim TH, editors. Advanced machine learning technologies and applications. Berlin: Springer; 2012. p. 516–23.

    Chapter  Google Scholar 

  11. Haque MM, Sheikh J, Rashid MJA. An improved steganographic technique based on diamond encoding method. In: 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE); 2017. p. 583–588 . https://doi.org/10.1109/ECACE.2017.7912972.

  12. Hemalatha S, Renuka A, Acharya UD, Kamath PR. A secure image steganography technique using integer wavelet transform. In: 2012 World Congress on Information and Communication Technologies. IEEE; 2012. p. 755–758.

  13. Hmood A, Bahaa B, Zaidan A, Jalab H. An overview on hiding information technique in images. J Appl Sci. 2010. https://doi.org/10.3923/jas.2010.2094.2100.

    Article  Google Scholar 

  14. Hmood A, Jalab H, Mk Z, Bahaa B, Zaidan A. On the capacity and security of steganography approaches: an overview. J Appl Sci. 2010. https://doi.org/10.3923/jas.2010.1825.1833.

    Article  Google Scholar 

  15. Jiaohua Q, Xuyu X, Wang M. A review on detection of LSB matching steganography. Inf Technol J. 2010. https://doi.org/10.3923/itj.2010.1725.1738.

    Article  Google Scholar 

  16. Joshi K, Yadav R, Allwadhi S. PSNR and MSE based investigation of LSB. In: 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT); 2016. p. 280–285.

  17. Juneja M, Sandhu P. Improved LSB based steganography techniques for color images in spatial domain. Int J Netw Secur. 2014;16:452–62.

    Google Scholar 

  18. Jung KH, Kee-Young Y. Steganographic method based on interpolation and LSB substitution of digital images. Multimed Tools Appl. 2014. https://doi.org/10.1007/s11042-013-1832-y.

    Article  Google Scholar 

  19. Kadhim IJ, Premaratne P, Vial PJ, Halloran B. Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing. 2019;335:299–326.

    Article  Google Scholar 

  20. Kaur J. A new steganography technique based on layers of image and sensitivity vectors acquiring HVS. 2011.

  21. Kekre HB, Mishra D, Khanna R, Khanna S, Hussaini A. Comparison between the basic LSB replacement technique and increased capacity of information hiding in LSB’s method for images. Int J Comput Appl. 2012;45(1):33–8 (Full text available).

    Google Scholar 

  22. Khodaei M, Sadeghi Bigham B, Faez K. Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybern Syst. 2016;47(8):617–28.

    Article  Google Scholar 

  23. Liao X, Wen QY, Zhang J. A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent. 2011;22(1):1–8.

    Article  Google Scholar 

  24. Majeed A, Mat Kiah ML, Madhloom HT, Zaidan B, Zaidan A. Novel approach for high secure and high rate data hidden in the image using image texture analysis. Int J Eng Technol. 2009;1(2):63–9.

    Google Scholar 

  25. Mielikainen J. LSB matching revisited. IEEE Signal Process Lett. 2006;13(5):285–7. https://doi.org/10.1109/LSP.2006.870357.

    Article  Google Scholar 

  26. Morkel T, Eloff JH, Olivier MS. An overview of image steganography, vol. 1. In: ISSA; 2005. p. 1–11.

  27. Moussa Y, Alexan W. Message security through AES and LSB embedding in edge detected pixels of 3D images. In: 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES); 2020. p. 224–229. https://doi.org/10.1109/NILES50944.2020.9257937.

  28. Naji AW, Hameed SA, Zaidan BB, Al-Khateeb WF, Khalifa OO, Zaidan AA, Gunawan TS. Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques. 2009. http://arxiv.org/abs/0908.0216.

  29. Nurhayati, Ahmad SS. Steganography for inserting message on digital image using least significant bit and AES cryptographic algorithm. In: 2016 4th International Conference on Cyber and IT Service Management; 2016. p. 1–6. https://doi.org/10.1109/CITSM.2016.7577468.

  30. Pascaline AH, Christopher LCF, Khan MHM, Pudaruth S. Using photomosaic and steganographic techniques for hiding information inside image mosaics. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI); 2015. p. 1893–1897. https://doi.org/10.1109/ICACCI.2015.7275894.

  31. Patil P, Narayankar P, Narayan DG, Meena SM. A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Procedia Comput Sci. 2016;78:617–24. https://doi.org/10.1016/j.procs.2016.02.108. In: 1st International Conference on Information Security and Privacy, 2015.

  32. Por LY, Lai WK, Alireza Z, Ang TF, Su MT, Delina B. Stegcure: a comprehensive steganographic tool using enhanced LSB scheme. WSEAS Trans Comput. 2008;7:1309–18.

    Google Scholar 

  33. Prasad G, Varadarajan D, Jilani SA, Kodandaramaiah D. Image steganography based on optimal LSB pixel adjustment method. Int J Comput Technol. 2006;5:1–6. https://doi.org/10.24297/ijct.v5i1.4380.

    Article  Google Scholar 

  34. Rachmawanto EH, Amin RS, Setiadi DRIM, Sari CA. A performance analysis stegocrypt algorithm based on LSB-AES 128 bit in various image size. In: 2017 International Seminar on Application for Technology of Information and Communication (iSemantic); 2017. p. 16–21. https://doi.org/10.1109/ISEMANTIC.2017.8251836.

  35. Saračević M, Adamović S, Miškovic V, Maček N, Šarac M. A novel approach to steganography based on the properties of Catalan numbers and Dyck words. Future Gener Comput Syst. 2019;100:186–97. https://doi.org/10.1016/j.future.2019.05.010.

    Article  Google Scholar 

  36. Selimovic F, Stanimirovic P, Saračević M, Selim A, Krtolica P. Authentication based on the image encryption using Delaunay triangulation and Catalan objects. Acta Polytechnica Hungarica. 2020;17:207–24. https://doi.org/10.12700/APH.17.6.2020.6.12.

    Article  Google Scholar 

  37. Serpa-Andrade L, Garcia-Velez R, Pinos-Velez E, Flores-Urgilez C. Analysis of the application of steganography applied in the field of cybersecurity. In: International Conference on Applied Human Factors and Ergonomics. Springer; 2021. p. 366–371.

  38. Sheth U, Saxena S. Image steganography using AES encryption and least significant nibble. In: 2016 International Conference on Communication and Signal Processing (ICCSP); 2016. p. 0876–0879. https://doi.org/10.1109/ICCSP.2016.7754272.

  39. Taqa A, Zaidan A, Bahaa B. New framework for high secure data hidden in the mpeg using AES encryption algorithm. Int J Comput Electr Eng. 2009. https://doi.org/10.7763/IJCEE.2009.V1.87.

    Article  Google Scholar 

  40. Tiwari K, Gangurde SJ. LSB steganography using pixel locator sequence with AES. In: 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC); 2021. p. 302–307. https://doi.org/10.1109/ICSCCC51823.2021.9478162.

  41. Yang H, Sun X, Sun G. A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering. 2009;18(4):509–16.

    Google Scholar 

  42. Zaidan A, Bahaa B, Taqa A, Sami K, Alam GM, Jalab A. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Int J Phys Sci. 2010;5:1776–86.

    Google Scholar 

  43. Zaidan B, Zaidan A, Taqa A, Othman F. Stego-image vs stego-analysis system. Int J Comput Electr Eng. 2009;1(5):572.

    Article  Google Scholar 

  44. Zakaria AA, Hussain M, Wahab AWA, Idris MYI, Abdullah NA, Jung KH. High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Appl Sci. 2018;8(11). https://doi.org/10.3390/app8112199. https://www.mdpi.com/2076-3417/8/11/2199.

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

These authors contributed equally to this work.

Corresponding author

Correspondence to Md. Moinul Islam.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Cyber Security and Privacy in Communication Networks” guest edited by Rajiv Misra, R K Shyamsunder, Alexiei Dingli, Natalie Denk, Omer Rana, Alexander Pfeiffer, Ashok Patel and Nishtha Kesswani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Roy, S., Islam, M.M. A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security. SN COMPUT. SCI. 3, 153 (2022). https://doi.org/10.1007/s42979-022-01046-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-022-01046-8

Keywords