Research Paper
Research Paper
Research Paper
Abstract—In the 21st century, the challenge of securely Image steganography serves as a protective measure for
transmitting information over digital mediums persists due to the sensitive information by concealing it within images, thereby
looming threat of interception by unauthorized entities. evading detection by the human sense of vision. Its
Steganography emerges as a pivotal solution, enabling the applications span diverse fields including communications,
concealment of sensitive data within seemingly innocuous files,
mobile computing, online voting systems, surveillance, and
thereby bolstering security during communication. This research
paper presents an investigation into the efficacy of various least medical applications for securing medical records [9]-[10].
significant bit (LSB) variants within steganographic techniques. A Over the years, numerous image steganography techniques
comparative analysis is conducted across three prevalent image have been developed and implemented to enhance data
formats—PNG, Bitmap, and GIF—assessing performance through security. Among these techniques, the Least Significant Bit
metrics such as mean square error (MSE) and peak signal-to-noise (LSB) method stands out as one of the simplest methods
ratio (PSNR). The results reveal that PNG and Bitmap formats falling under the spatial domain category. This method
exhibit superior performance in concealing data while upholding involves encoding confidential information into the least
image quality compared to GIF. These findings offer valuable significant bits of each pixel within an image. By doing so, the
insights for practitioners and researchers seeking to optimize
LSB technique provides a certain level of confidentiality when
steganographic methods for secure information transmission.
transmitting information over the internet. One of the key
Keywords— Stegobit, Steganography, Stego-image, LSB, PSNR, advantages of the LSB method lies in its ability to achieve low
MSR values of Mean Square Error (MSE) and high values of Peak
Signal-to-Noise Ratio (PSNR). These characteristics make it
I. INTRODUCTION challenging for the human eye to discern any alterations made
to the image, thereby ensuring a level of stealthiness in the
Recent advancements in multimedia technologies have concealment process. Due to these advantages, the LSB
significantly enhanced the efficiency and speed of information method is widely utilized in the development of image
exchange over networks. The global proliferation of the internet, steganography applications, offering a reliable means of
driven by digitalization, has further facilitated data sharing and securing sensitive information during transmission.
utilization through cloud-based infrastructures [1]-[4]. However,
safeguarding information from unauthorized access poses a A K-LSB-based method was implemented for concealing one
formidable challenge in modern societies. To address this image within another image by utilizing the K-least significant
concern, cryptography and steganography techniques have bits in [11]. In [12], An enhanced LSB substitution technique
emerged as pivotal mechanisms for ensuring data security [5]- for image-based steganography was implemented, leveraging a
[6]. local entropy filter for identifying the bit containing the
concealed image. This approach represents a significant
Cryptographic techniques play a crucial role in securing advancement in the field, as it allows for the concealment of
information by encrypting it, thereby rearranging it in a images with minimal distortion and loss of information. The
manner that makes it difficult for intruders to detect and technique employed in this study aimed to bolster security
intercept. Basic authentication methods encompass hashing, measures by incorporating a two-step process. Initially, the
digital signatures, and establishing threshold values for message intended for embedding was encrypted, thereby
embedding secret bits. However, cryptography alone may not adding an extra layer of security. Subsequently, the encrypted
always provide sufficient assurance that confidential message was converted into a stego-image using the
information is entirely protected. Thus, there has been a implemented method. This approach not only enhances data
growing recognition of the need to complement cryptography security but also results in a notable increase in embedding
with steganography [7]-[8]. Indeed, experts commonly capacity while maintaining a high Peak Signal-to-Noise Ratio
advocates for the integration of both steganography and (PSNR).
cryptograhy as multiple layers of security. This multilayered
approach enhances the robustness of data protection In [13], an automated method for securing a secret message was
measures, offering added resilience against unauthorized developed, incorporating a dual level of security. Initially, the
access and inception. secret message underwent encryption using a Java-based
encryption method known as Character Bit Shuffler (CBS),
constituting the first level of security. Subsequently, the
encrypted secret message bits were embedded within an
image utilizing the least significant bit (LSB) technique,
thereby establishing the second level of security. The adopted
method was chosen for its simplicity and its capacity to
preserve the quality of the image. In [14], an enhanced LSB
Steganography approach was introduced, leveraging the
modulus function for embedding data concealment
information. In [15], a method was devised for concealing
secret message bits within the pixels of an RGB true-color
image, utilizing a secret key for enhanced security. Moreover,
the transmission capacity of the image was augmented by
compressing the secret data, originally consisting of seven
bits in ASCII format, into five-bit streams.
II. METHODOLOGY
{x ij | 0 ≤ i ≤ PI gray, 0 ≤ i ≤ QI gray, x ij ∈ {0,1,2,…,255} } (1)
{ { }}
extraction process is completed successfully, the concealed
message is revealed in its original text format. This final step S ' = s ' i|0 ≤ i ≤ n ' , si ∈ 0,1, .. , 2 k −1 (4)
allows the recipient to access and interpret the hidden
information, ensuring the secure and accurate transmission of '
the intended message. Where n = PI gray× QI gray and n = PI color× QI color
Furthermore, a mapping between the original secret message III. RESULTS AND DISCUSSION
(S) and the embedded message (S ′) is established, yielding
equation 5 as follows: A. Computation of peak signal to noise ratio (PSNR)
k=1
Figure 2 illustrates a bar graph representing the computed
s '
i = si ×
∑ k + j×2 k1 j (5) average PSNR for the considered variants (Stego 1, 2, 3, and 4),
j=0 tested with PNG, BMP, and GIF images. The graph demonstrates
that as the number of stego bits used to embed the secret message
Therefore, the embedding process is completed for each pixel, increases, the average PSNR value decreases. This observation
with k (where, k=1,2,3,4) bits of the rearranged message S ′ indicates that as more stego bits are replaced by the message bits,
stored in each pixel. Thus, each pixel stores the k-bit message the stego-image becomes more distorted, posing a potential
for a stego-pixel, which is formulated by equation 6 as follows: security threat to the concealed message.
Xi' = xi mod2k + si (6) Furthermore, the graph reveals that the PSNR for PNG images is
relatively higher for stego 1-3 bits compared to GIF images. The
Lastly, the embedded image is extracted from the PSNR for GIF images is relatively low compared to other image
stego-image using equation 7. formats, suggesting that GIF images may experience more
distortion when used for steganographic embedding. These
findings underscore the importance of selecting appropriate stego
s'= xi mod 2k (7) parameters and image formats to ensure optimal security and
image quality in steganographic applications.
Mean Square Error (MSE) provides an estimate of the B. Analysis for Mean Square Error (MSE) and Stego Bits
resultant error in the cover image due to the embedded
data. It can be computed mathematically using Equa- The line plot in Fig. 3 depicts the computed average MSE values
tion 8 as follows: across the considered image formats for stego 1-4 bits. It was
observed that the error for the three image formats was very
minimal at stego 1 bit. However, as the number of replacing
N stego bits increases, the errors become more significant. It was
MSE = ∑ (Ci - C ′)2 (8) noted that the errors in GIF images become very significant
i=1
compared to other image formats (PNG and Bitmap) as the
number of stego bits increases. This observation suggests that
Where Ci denotes the size of the stego-image, CiI is the size of GIF images may be more susceptible to distortion when used for
thecover image and N is the size of the original image. PSNR, steganographic embedding, especially with higher levels of data
or Peak Signal-to-Noise Ratio, is indeed utilized to quantify concealment. These findings emphasize the importance of
the degree of distortion introduced by the embedded data. The considering both the stego parameters and the characteristics of
mathematical formula for calculating PSNR is given by the image format when implementing steganographic techniques
equation 9 as follows: to ensure minimal distortion and optimal security.
[13] A., AlWatyan, W., Mater, O., Almutairi, M., Almutairi, & A. Al-
Noori, Security approach for LSB steganography based FPGA
implementation. In 2017 7th International Conference on Modeling,
Simulation, and Applied Optimization (ICMSAO), pp. 1-5, 2017
[15] A., AlWatyan, W., Mater, O., Almutairi, M., Almutairi, & A. Al-
Noori. Security approach for LSB steganography based FPGA
implementation. In 2017 7th International Conference on Modeling,
Simulation, and Applied Optimization (ICMSAO) (pp. 1-5), 2017.