Effectiveness of the Spatial Domain Techniques in Digital Image Steganography

Authors

  • Rosshini Selvamani Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia;
  • Yusliza Yusoff Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia;

DOI:

https://doi.org/10.48161/qaj.v4n1a456

Abstract

Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. Since its inception in the 1990s till the present, digital steganography has a lengthy history. Early steganography focused primarily on imperceptibility, security and embedding capacity. In addition to using statistics as a foundation, convolution neural networks (CNN), generative adversarial networks (GAN), coverless approaches, and machine learning are all used to construct steganographic methods. Robustness is becoming a crucial component of many innovative techniques. Spatial, Transform, and Adaptive domains serve as the understructure of those novel methods. This broadens the range of steganographic technique development and often concentrates the implementation of adaptive techniques. As a result, this study helps to analyze the fundamentals of image steganography, a comparative review on the spatial domain algorithms. As using evaluation tools is strongly tied to the effectiveness of steganography, this study also goes into great detail about its application. The purpose of this research is to determine the best and most effective algorithm among the three competitive spatial domain algorithms, which are Least Significant Bit (LSB), Optimum Pixel Adjustment Procedure (OPAP), and Pixel Value Differencing (PVD) which in regard demonstrated the efficacy of spatial domain algorithms.

Downloads

Download data is not yet available.

References

Abdulazeez, A. M., Hajy, D. M., Zeebaree, D. Q., & Zebari, D. A. (2021). Robust watermarking scheme based LWT and SVD using artificial bee colony optimization. Indonesian Journal of Electrical Engineering and Computer Science, 21(2), 1218-1229.

Alsandi, N. S. A., Zebari, D. A., Al-Zebari, A., Ahmed, F. Y., Mohammed, M. A., Albahar, M., & Albahr, A. A. (2023). A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption. Computer Systems Science & Engineering, 47(2).

Majeed, M. A., Sulaiman, R., Shukur, Z., & Hasan, M. K. (2021). A review on text steganography techniques. Mathematics, 9(21), 2829.

Zebari, D. A., Haron, H., Zeebaree, S. R., & Zeebaree, D. Q. (2018, October). Multi-level of DNA encryption technique based on DNA arithmetic and biological operations. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 312-317). IEEE.

Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing, 335, 299-326.

Hosmer, C. (2006). Discovering hidden evidence. Journal of Digital Forensic Practice, 1(1), 47-56.

Hernandez-Castro, J. C., Blasco-Lopez, I., Estevez-Tapiador, J. M., & Ribagorda-Garnacho, A. (2006). Steganography in games: A general methodology and its application to the game of Go. computers & security, 25(1), 64-71.

Zebari, D. A., Haron, H., Zeebaree, D. Q., & Zain, A. M. (2019, August). A simultaneous approach for compression and encryption techniques using deoxyribonucleic acid. In 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1-6). IEEE.

Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333-17373.

Chakkaravarthy, S. S., Sangeetha, D., & Vaidehi, V. (2019). A survey on malware analysis and mitigation techniques. Computer Science Review, 32, 1-23.

Zebari, N. A., Zebari, D. A., Zeebaree, D. Q., & Saeed, J. N. (2021). Significant features for steganography techniques using deoxyribonucleic acid: a review. Indonesian Journal of Electrical Engineering and Computer Science, 21(1), 338-347.

Zebari, D. A., Zeebaree, D. Q., Saeed, J. N., Zebari, N. A., & Adel, A. Z. (2020). Image steganography based on swarm intelligence algorithms: A survey. people, 7(8), 9.

Gutub, A., & Al-Ghamdi, M. (2019). Image based steganography to facilitate improving counting-based secret sharing. 3D Research, 10(1), 6.

Neeta, D., Snehal, K., & Jacobs, D. (2006, December). Implementation of LSB steganography and its evaluation for various bits. In 2006 1st international conference on digital information management (pp. 173-178). IEEE.

Kurak Jr, C. W., & McHugh, J. (1992, December). A cautionary note on image downgrading. In ACSAC (pp. 153-159).

Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46-66.

Turitsyna, E. G., & Webb, S. (2005). Simple design of FBG-based VSB filters for ultra-dense WDM transmission. Electronics letters, 41(2), 1.

Darabkh, K. A., Al-Dhamari, A. K., & Jafar, I. F. (2017). A new steganographic algorithm based on multi directional PVD and modified LSB. Information Technology and Control, 46(1), 16-36.

Wu, D. C., & Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. Pattern recognition letters, 24(9-10), 1613-1626.

Amirtharajan, R., Adharsh, D., Vignesh, V., & Balaguru, R. J. B. (2010). PVD blend with pixel indicator-OPAP composite for high fidelity steganography. International Journal of Computer Applications, 7(9), 31-37.

Pradhan, A., Sekhar, K. R., & Swain, G. (2017). Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks. Security and Communication Networks, 2017.

Zebari, D., Haron, H., & Zeebaree, S. (2017). Security issues in DNA based on data Hiding: A review. International Journal of Applied Engineering Research, 12(24), 0973-4562.

Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2019). Hybrid Robust Image Steganography approach for the secure transmission of biomedical images in Cloud. EAI Endorsed Transactions on Pervasive Health and Technology, 5(18), e1-e1.

Zeebaree, D. Q., Abdulazeez, A. M., Hassan, O. M. S., Zebari, D. A., & Saeed, J. N. (2020). Hiding image by using contourlet transform. vol, 83, 16979-16990.

Maji, G., & Mandal, S. (2019). Secure and robust image steganography using a reference image as key. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN, 2278-3075.

Published

2024-03-31

How to Cite

Selvamani, R., & Yusoff, Y. . (2024). Effectiveness of the Spatial Domain Techniques in Digital Image Steganography . Qubahan Academic Journal, 4(1), 341–350. https://doi.org/10.48161/qaj.v4n1a456

Issue

Section

Articles