A Multimodal Approach to Digital Security: Combining Steganography, ‎Watermarking, and Image Enhancement

  • Authors

    • Gogineni Krishna Chaitanya Department of Computer Science and Engineering,‎ Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh, India
    • Sasidhar Reddy Gaddam Staff IT Software Engineer, Palo Alto Networks, Huntersville, North Carolina, USA
    • Khadri Syed Faizz Ahmad Department of Computer Science and Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, India
    • Balaji Vicharapu Department of Computer Science and Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, India
    • Uppuluri Lakshmi Soundharya Department of Computer Science and Engineering,‎ Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh, India
    • Uppuluri Naga Lakshmi Madhuri Department of Computer Science and Engineering NRI Institute of Technology, Pothavarappadu, Andhra Pradesh, India
    https://doi.org/10.14419/3r5r6r74

    Received date: May 19, 2025

    Accepted date: June 20, 2025

    Published date: July 5, 2025

  • CLAHE; Steganography; Watermarking; Image Enhancement
  • Abstract

    This study addresses the limitations of traditional Least ‎Significant Bit (LSB) techniques in digital forensics by ‎proposing an intelligent watermarking framework enhanced ‎with Contrast-Limited Adaptive Histogram Equalization ‎‎(CLAHE) and Spread Spectrum Watermarking. We propose a ‎robust hybrid approach combining Discrete Cosine Transform ‎‎(DCT)-based frequency domain watermarking with spread ‎spectrum techniques to improve imperceptibility, security, and ‎resilience against unauthorized tampering. The proposed ‎model embeds robust watermarks with minimal impact on ‎perceptual image quality, validated through quantitative ‎metrics such as Mean Squared Error (MSE) and perceptual ‎analysis. Comparative experiments demonstrate superior ‎performance over conventional LSB methods, particularly in ‎resisting compression and noise-based attacks. Additionally, ‎we integrate cryptographic hashing (SHA-256) for ‎authentication, ensuring tamper-proof verification. The results ‎highlight the framework’s efficacy in digital forensics, ‎copyright protection, and secure multimedia communication. ‎Future work explores adaptive watermarking with machine ‎learning and blockchain integration for enhanced traceability‎.

  • References

    1. Manaswini, Deevi, et al. "A Survey of Forensic Applications using Digital Image Processing: Image Improvement Case Study." 2023 7th International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2023.N. B. Amor, S. Benferhat, and Z. Elouedi, ‘‘Naive Bayes vs decision trees inintrusiondetectionsystems,’’inProc.ACMSymp.Appl.Comput.(SAC), 2004, pp. 420–424. https://doi.org/10.1109/ICCMC56507.2023.10084079.
    2. Subramanian, Nandhini, et al. "Image steganography: A review of the recent advances." IEEE access 9 (2021): 23409-23423.
    3. Bhattacharya, Sharbani. "Survey on Digital Watermarking–A Digital Forensics & Security Application." International Journal of Advanced Research in Computer Science and Software Engineering 4.11 (2014). https://doi.org/10.1109/ACCESS.2021.3053998.
    4. Nasereddin, Hebah HO. "Digital watermarking a technology overview." International Journal of Research and Reviews in Applied Sciences 6.1 (2011): 89-93.
    5. Mandal, Pratap Chandra, et al. "Digital image steganography: A literature survey." Information sciences (2022). https://doi.org/10.1016/j.ins.2022.07.120.
    6. Sonar, Reshma, and Gandharba Swain. "Steganography based on quotient value differencing and pixel value correlation." CAAI Transactions on Intelligence Technology 6.4 (2021): 504-519. https://doi.org/10.1049/cit2.12050.
    7. Evsutin, Oleg, Anna Melman, and Roman Meshcheryakov. "Digital steganography and watermarking for digital images: A review of current research directions." IEEE Access 8 (2020): 166589-166611. https://doi.org/10.1109/ACCESS.2020.3022779.
    8. Hussain, Mehdi, et al. "Image steganography in spatial domain: A survey." Signal Processing: Image Communication 65 (2018): 46-66. https://doi.org/10.1016/j.image.2018.03.012.
    9. Fridrich, Jessica, Miroslav Goljan, and Rui Du. "Detecting LSB steganography in color, and gray-scale images." IEEE multimedia 8.4 (2001): 22-28. https://doi.org/10.1109/93.959097.
    10. Evsutin, Oleg, Anna Melman, and Roman Meshcheryakov. "Digital steganography and watermarking for digital images: A review of current research directions." IEEE Access 8 (2020): 166589-166611 https://doi.org/10.1109/ACCESS.2020.3022779.
    11. Abusham, Eimad Abdu, et al. "Fusion of Watermarking and Steganography for Protecting Image Ownership." Applied computing Journal (2021): 152-164. https://doi.org/10.52098/acj.202145.
    12. Desai, Hardikkumar V. "Steganography, cryptography, watermarking: A comparitive study." Journal of Global Research in Computer Science 3.12 (2012): 33-35.
    13. GIRARE, SEEMA S., and MALVIKA U. SARAF. "Literature Review on Different Watermarking & Steganography." (2016).
    14. Tao, Hai, et al. "Robust image watermarking theories and techniques: A review." Journal of applied research and technology 12.1 (2014): 122-138. https://doi.org/10.1016/S1665-6423(14)71612-8.
    15. Mandal, Pratap Chandra, et al. "Digital image steganography: A literature survey." Information sciences (2022). https://doi.org/10.1016/j.ins.2022.07.120.
    16. Nissar, Arooj, and Ajaz Hussain Mir. "Classification of steganalysis techniques: A study." Digital Signal Processing 20.6 (2010): 1758-1770. https://doi.org/10.1016/j.dsp.2010.02.003.
    17. Christiana Abikoye, Oluwakemi, et al. "Analytical study on LSB-based image steganography approach." Computational Intelligence in Machine Learning: Select Proceedings of ICCIML 2021. Singapore: Springer Nature Singapore, 2022. 451-457. https://doi.org/10.1007/978-981-16-8484-5_43.
    18. Chan, Chi-Kwong, and Lee-Ming Cheng. "Hiding data in images by simple LSB substitution." Pattern recognition 37.3 (2004): 469-474. https://doi.org/10.1016/j.patcog.2003.08.007.
    19. RAHMAN, SHAHID, et al. "A Huffman Code LSB based Image Steganography Technique Using Multi-Level Encryption and Achromatic Component of an image." (2023). https://doi.org/10.21203/rs.3.rs-2579014/v1.
    20. Cox, Ingemar J., et al. "Secure spread spectrum watermarking for multimedia." IEEE transactions on image processing 6.12 (1997): 1673-168 https://doi.org/10.1109/83.650120.
    21. Sumanth., et al. "Scalable watermarking for identifying large language model outputs." Nature 634, pages818–823 (2024) : 1673-168 https://doi.org/10.1038/s41586-024-08025-4.
    22. Hamidi, M., El Haziti, M., Cherifi, H., & El Hassouni, M. (2021). A Hybrid Robust Image Watermarking Method Based on DWT‑DCT and SIFT for Copyright Protection. Journal of Imaging, 7(10), 218. https://doi.org/10.3390/jimaging7100218.
  • Downloads

  • How to Cite

    Chaitanya , G. K. ., Gaddam, S. R. . ., Ahmad , K. S. F. ., Vicharapu, B. ., Soundharya, U. L. . ., & Madhuri , U. N. L. . (2025). A Multimodal Approach to Digital Security: Combining Steganography, ‎Watermarking, and Image Enhancement. International Journal of Basic and Applied Sciences, 14(2), 611-619. https://doi.org/10.14419/3r5r6r74