Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

  • Authors

    • Mohammed Mahdi Hashim
    • Mohd Shafry Mohd Rahim
    • Fadil Abass Johi
    • Mustafa Sabah Taha
    • Hassan Salman Hamad
    https://doi.org/10.14419/ijet.v7i4.21726

    Received date: November 26, 2018

    Accepted date: November 26, 2018

    Published date: April 16, 2026

  • Abstract

    Recently, Steganography is an outstanding research area which used for data protection from unauthorized access. Steganography is defined as the art and science of covert information in plain sight in various media sources such as text, images, audio, video, network channel etc. so, as to not stimulate any suspicion; while steganalysis is the science of attacking the steganographic system to reveal the secret message. This research clarifies the diverse showing the evaluation factors based on image steganographic algorithms. The effectiveness of a ste-ganographic is rated to three main parameters, payload capacity, image quality measure and security measure. This study is focused on im-age steganographic which is most popular in in steganographic branches. Generally, the Least significant bit is major efficient approach utilized to embed the secret message. In addition, this paper has more detail knowledge based on Least significant bit LSB within various Images formats. All metrics are illustrated in this study with arithmetical equations while some important trends are discussed also at the end of the paper.

  • References

    1. HASHIM, M., RAHIM, M., SHAFRY, M., & ALWAN, A. A. (2018). A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN. Journal of Theoretical & Applied Information Technolo-gy, 96(4).
    2. Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, Silman, J., “Steganography and Ste-ganalysis: An Overview”, SANS Institute, 2001 Jamil, T., “Ste-ganography: The art of hiding information is plain sight”, IEEE Po-tentials, 18:01, 1999
    3. MAHDI HASHIM, M. O. H. A. M. M. E. D., RAHIM, M., & SHAFRY, M. (2017). IMAGE STEGANOGRAPHY BASED ON ODD/EVEN PIXELS DISTRIBUTION SCHEME AND TWO PARAMETERS RANDOM FUNCTION. Journal of Theoretical & Applied Information Technology, 95(22).
    4. Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganog-raphy in color, and gray-scale images. IEEE multimedia, 8(4), 22-28. https://doi.org/10.1109/93.959097.
    5. Swain, G., & Lenka, S. K. (2015). A novel steganography technique by mapping words with LSB array. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 115-122. https://doi.org/10.1504/IJSISE.2015.067052.
    6. Swain, G., & Lenka, S. K. (2012). LSB array based image steganog-raphy technique by exploring the four least significant bits. In Global Trends in Information Systems and Software Applications (pp. 479-488). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_52.
    7. Swain, G., & Lenka, S. K. (2012). A technique for secret communi-cation using a new block cipher with dynamic steganography. Inter-national Journal of Security and Its Applications, 6(2), 1-12.
    8. Swain, G., & Lenka, S. K. (2012). A robust image steganography technique using dynamic embedding with two least significant bits. In Advanced Materials Research (Vol. 403, pp. 835-841). Trans Tech Publications.
    9. Subhedar, M. S., & Mankar, V. H. (2014). Status and key issues in image steganography: A survey. Computr science review, 13, 95-113. https://doi.org/10.1016/j.cosrev.2014.09.001.
    10. Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46-66. https://doi.org/10.1016/j.image.2018.03.012.
    11. ECE, C., & Mullana, M. M. U. (2011). Image quality assessment techniques pn spatial domain. IJCST, 2(3).
    12. Simmons, G. J. (1984). The prisoners’ problem and the subliminal channel. In Advances in Cryptology (pp. 51-67). Springer, Boston, MA. https://doi.org/10.1007/978-1-4684-4730-9_5.
    13. Knuth, D. E. (1985). Dynamic huffman coding. Journal of algo-rithms, 6(2), 163-180. https://doi.org/10.1016/0196-6774(85)90036-7.
    14. T. Sharp, Hide 2.1, 2001," http://www.sharpthoughts.org
    15. G. Pulcini, Stegotif,” http:// www.geocities.com/ SiliconValley /9210 /gfree.html
    16. Ulker, M., & Arslan, B. (2018, March). A novel secure model: Im-age steganography with logistic map and secret key. In Digital Fo-rensic and Security (ISDFS), 2018 6th International Symposium on (pp. 1-5). IEEE.
    17. Sarmah, D. K., & Kulkarni, A. J. (2018). JPEG based steganography methods using Cohort Intelligence with Cognitive Computing and modified Multi Random Start Local Search optimization algorithms. Information Sciences, 430, 378-396. https://doi.org/10.1016/j.ins.2017.11.027.
    18. Li, B., Li, Z., Zhou, S., Tan, S., & Zhang, X. (2018). New ste-ganalytic features for spatial image steganography based on deriva-tive filters and threshold LBP operator. IEEE Transactions on Infor-mation Forensics and Security, 13(5), 1242-1257. https://doi.org/10.1109/TIFS.2017.2780805.
    19. Zhang, Y., Qin, C., Zhang, W., Liu, F., & Luo, X. (2018). On the fault-tolerant performance for a class of robust image steganography. Signal Processing, 146, 99-111. https://doi.org/10.1016/j.sigpro.2018.01.011.
    20. Panghal, S., Kumar, S., & Kumar, N. (2016). Enhanced Security of Data using Image Steganography and AES Encryption Technique. International Journal of Computer Applications (0975–8887) Recent Trends in Future Prospective in Engineering & Management Tech-nology 2016.
    21. Debnath, B., Das, J. C., & De, D. (2017). Reversible logic-based image steganography using quantum dot cellular automata for secure nanocommunication. IET Circuits, Devices & Systems, 11(1), 58-67. https://doi.org/10.1049/iet-cds.2015.0245.
    22. AbdelQader, A., & AlTamimi, F. (2017). ANovel IMAGE STE-GANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON SUPPORT VECTOR MACHINE CLASSIFIER. The International Journal of Multimedia & Its Appli-cations. https://doi.org/10.5121/ijma.2017.9101.
    23. Kennedy, J. H., Khan, M. T. A., Ahmed, M. J., & Rasool, M. D. (2017). Image Steganography Based on AES Algorithm with Huff-man Coding for Compressionon Grey Images. International Journal of Engineering Science and Computing, [7].
    24. Das, R., & Chatterjee, P. (2017, March). Securing Data Transfer in IoT Employing an Integrated Approach of Cryptography & Ste-ganography. In Proceedings of the International Conference on High Performance Compilation, Computing and Communications (pp. 17-22). ACM.
    25. Tiwari, N., & Shandilya, D. M. (2010). Evaluation of various LSB based methods of image steganography on GIF file format. Interna-tional Journal of Computer Applications (0975–8887) Volume. https://doi.org/10.5120/1057-1378.
    26. Reddy, H. M., & Raja, K. B. (2011). Wavelet based non-LSB ste-ganography. International Journal of Advanced networking and ap-plications, 3(3), 1203.
    27. HASHIM, M., RAHIM, M., SHAFRY, M., & ALWAN, A. A. (2018). A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN. Journal of Theoretical & Applied Information Technolo-gy, 96(4).
    28. Swain, G. (2018). Very High Capacity Image Steganography Tech-nique Using Quotient Value Differencing and LSB Substitution. Arabian Journal for Science and Engineering, 1-10.
    29. Muhammad, K., Ahmad, J., Rehman, N. U., Jan, Z., & Sajjad, M. (2017). CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications, 76(6), 8597-8626. https://doi.org/10.1007/s11042-016-3383-5.
    30. Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganog-raphy in color, and gray-scale images. IEEE multimedia, 8(4), 22-28. https://doi.org/10.1109/93.959097.
    31. Joyce, J. M. (2011). Kullback-leibler divergence. In International encyclopedia of statistical science (pp. 720-722). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04898-2_327.
    32. Cachin, C. (1998, April). An information-theoretic model for ste-ganography. In International Workshop on Information Hiding (pp. 306-318). Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_21.
    33. Borgwardt, K. M., Gretton, A., Rasch, M. J., Kriegel, H. P., Schölk-opf, B., & Smola, A. J. (2006). Integrating structured biological data by kernel maximum mean discrepancy. Bioinformatics, 22(14), e49-e57. https://doi.org/10.1093/bioinformatics/btl242.
    34. Holub, V., & Fridrich, J. (2013, June). Digital image steganography using universal distortion. In Proceedings of the first ACM workshop on Information hiding and multimedia security (pp. 59-68). ACM. https://doi.org/10.1145/2482513.2482514 .
    35. Wang, Y., Chen, Q., & Zhang, B. (1999). Image enhancement based on equal area dualistic sub-image histogram equalization method. IEEE Transactions on Consumer Electronics, 45(1), 68-75. https://doi.org/10.1109/30.754419.
    36. Chen, J. (2014). A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Processing: Image Communication, 29(3), 375-384. https://doi.org/10.1016/j.image.2014.01.003.
    37. Ker, A. D. (2005). Steganalysis of LSB matching in grayscale imag-es. IEEE signal processing letters, 12(6), 441-444. https://doi.org/10.1109/LSP.2005.847889.
    38. Nguyen, B. C., Yoon, S. M., & Lee, H. K. (2006, November). Multi bit plane image steganography. In International Workshop on Digital Watermarking (pp. 61-70). Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_6.
    39. Swain, G., & Lenka, S. K. (2014). Classification of image steganog-raphy techniques in spatial domain: a study. International Journal of Computer Science & Engineering Technology, 5(3), 219-232.
    40. Wang, Z., & Bovik, A. C. (2002). A universal image quality index. IEEE signal processing letters, 9(3), 81-84. https://doi.org/10.1109/97.995823.
    41. Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, 13(4), 600-612. https://doi.org/10.1109/TIP.2003.819861.
    42. Kumar, R., & Rattan, M. (2012). Analysis of various quality metrics for medical image processing. International Journal of Advanced Re-search in Computer Science and Software Engineering, 2(11).
    43. Avcibas, I., Memon, N., & Sankur, B. (2003). Steganalysis using image quality metrics. IEEE transactions on Image Processing, 12(2), 221-229. https://doi.org/10.1109/TIP.2002.807363.
    44. Swain, G., & Lenka, S. K. (2014). Classification of spatial domain image steganography techniques: a study. International Journal of Computer Science & Engineering Technology, 5(3), 219-232.
    45. Al-Dmour, H., & Al-Ani, A. (2016). A steganography embedding method based on edge identification and XOR coding. Expert sys-tems with Applications, 46, 293-306. https://doi.org/10.1016/j.eswa.2015.10.024.
    46. Sau, K., Basak, R. K., & Chanda, A. (2013). Image compression based on block truncation coding using clifford algebra. Procedia Technology, 10, 699-706. https://doi.org/10.1016/j.protcy.2013.12.412.
    47. Krenn, R. (2004). Steganography and steganalysis.
    48. Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333-17373. https://doi.org/10.1007/s11042-017-5308-3.
    49. MAHMOOD, A. S., RAHIM, M., & SHAFRY, M. (2017). GEN-ERATING AND EXPANDING OF AN ENCRYPTION KEY BASED ON KNIGHT TOUR PROBLEM. Journal of Theoretical & Applied Information Technology, 95(7).
    50. Jassim F A (2013) A novel steganography algorithm for hiding text in image using five modulus methods. arXiv preprint arXiv:1307.0642.
    51. Muhammad K, Ahmad J, Rehman NU, Jan Z, Qereshi RJ (2014) A secure cyclic steganographic technique for color images using ran-domization. Tech J Univ Eng Technol Taxila Pakistan 19:57–64.
    52. Muhammad K, Ahmad J, Farman H, Zubair M (2014) A novel im-age steganographic approach for hiding text in color images using HSI color model. Middle-East J Sci Res 22:647–654.
    53. Karim M (2011) a new approach for LSB based image steganogra-phy using secret key. In: 14th International Conference on Computer and Information Technology (ICCIT 2011). pp 286–291 https://doi.org/10.1109/ICCITechn.2011.6164800.
    54. Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2016). A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Mul-timedia Tools and Applications, 75(22), 14867-14893. https://doi.org/10.1007/s11042-015-2671-9.
    55. Baby, D., Thomas, J., Augustine, G., George, E., & Michael, N. R. (2015). A novel DWT based image securing method using steganog-raphy. Procedia Computer Science, 46, 612-618. https://doi.org/10.1016/j.procs.2015.02.105.
    56. Rachmawanto, E. H., & Sari, C. A. (2017). Secure Image Steganog-raphy Algorithm Based on DCT with OTP Encryption. Journal of Applied Intelligent System, 2(1), 1-11.
    57. Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., & Dutta, P. (2014). A novel secure image steganography method based on Cha-os theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22. https://doi.org/10.5121/ijsptm.2014.3102.
    58. Çataltaş, Ö. & Tütüncü, K. (2017, September). Comparison of LSB image steganography technique in different color spaces. In Artificial Intelligence and Data Processing Symposium (IDAP), 2017 Interna-tional (pp. 1-6). IEEE.
    59. Wang, C. M., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2008). A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software, 81(1), 150-158. https://doi.org/10.1016/j.jss.2007.01.049.
    60. Dhar, P. K., Kaium, A., & Shimamura, T. (2018). Image Steganog-raphy Based on Modified LSB Substitution Method and Data Map-ping. INTERNATIONAL JOURNAL OF COMPUTER SCI-ENCE AND NETWORK SECURITY, 18(3), 155-160.
    61. Juneja, M., & Sandhu, P. S. (2013). A new approach for information security using an improved steganography technique. Journal of In-formation Processing Systems, 9(3), 405-424. https://doi.org/10.3745/JIPS.2013.9.3.405.
    62. Adnan Abdul-Aziz Gutub, "Pixel Indicator Technique for RGB Im-age Steganography," Journal of Emerging Technologies in Web In-telligence, Vol. 2, No. 1, pp. 56-64, February 2010. doi:10.4304/jetwi.2.1.56-64 https://doi.org/10.4304/jetwi.2.1.56-64.
    63. Jassim, F. A. (2013). A novel steganography algorithm for hiding text in image using five-modulus method. arXiv preprint arXiv:1307.0642.
    64. Karim, S. M., Rahman, M. S., & Hossain, M. I. (2011, December). A new approach for LSB based image steganography using secret key. In Computer and Information Technology (ICCIT), 2011 14th International Conference on (pp. 286-291). IEEE.
    65. Muhammad, K., Ahmad, J., Farman, H., Jan, Z., Sajjad, M., & Baik, S. W. (2015). A Secure Method for Color Image Steganography us-ing Gray-Level Modification and Multi-level Encryption. TIIS, 9(5), 1938-1962.
    66. Alam, S., Kumar, V., Siddiqui, W. A., & Ahmad, M. (2014, Febru-ary). Key dependent image steganography using edge detection. In Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on (pp. 85-88). IEEE.
    67. Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816. https://doi.org/10.1007/s11071-013-1105-3.
    68. Aziz, M., Tayarani-N, M. H., & Afsar, M. (2015). A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dynamics, 80(3), 1271-1290. https://doi.org/10.1007/s11071-015-1943-2.
    69. Ghebleh, M., & Kanso, A. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907. https://doi.org/10.1016/j.cnsns.2013.10.014.
    70. Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., & Dutta, P. (2014). A novel secure image steganography method based on Cha-os theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22. https://doi.org/10.5121/ijsptm.2014.3102.
    71. Sharif, A., Mollaeefar, M., & Nazari, M. (2017). A novel method for digital image steganography based on a new three-dimensional cha-otic map. Multimedia Tools and Applications, 76(6), 7849-7867. https://doi.org/10.1007/s11042-016-3398-y.
    72. Bailey, K., & Curran, K. (2006). An evaluation of image based ste-ganography methods. Multimedia Tools and Applications, 30(1), 55-88. https://doi.org/10.1007/s11042-006-0008-4.
    73. Yu, J. G., Yoon, E. J., Shin, S. H., & Yoo, K. Y. (2008, April). A new image steganography based on twok correction and edge-detection. In Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on (pp. 563-568). IEEE.
    74. Lie, W. N., & Chang, L. C. (1999). Data hiding in images with adaptive numbers of least significant bits based on the human visual system. In Image Processing, 1999. ICIP 99. Proceedings. 1999 In-ternational Conference on (Vol. 1, pp. 286-290). IEEE.
    75. Wu, D. C., & Tsai, W. H. (2003). A steganographic method for im-ages by pixel-value differencing. Pattern Recognition Letters, 24(9-10), 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6.
    76. Chandramouli, R., Kharrazi, M., & Memon, N. (2003, October). Im-age steganography and steganalysis: Concepts and practice. In Inter-national Workshop on Digital Watermarking (pp. 35-49). Springer, Berlin, Heidelberg.
    77. Dhaka, V., Poonia, R. C., & Singh, Y. V. (2013). A Novel Algo-rithm for Image Steganography Based on Effective Channel Selec-tion Technique. International Journal of Advanced Research in Computer Science and Software Engineering, 3(8).
    78. Singh, A., & Singh, H. (2015, March). An improved LSB based im-age steganography technique for RGB images. In Electrical, Com-puter and Communication Technologies (ICECCT), 2015 IEEE In-ternational Conference on (pp. 1-4). IEEE.
    79. Chauhan, S., Kumar, J., & Doegar, A. (2017, February). Multiple layer text security using variable block size cryptography and image steganography. In Computational Intelligence & Communication Technology (CICT), 2017 3rd International Conference on (pp. 1-7). IEEE.
    80. Khodaei, M., & Faez, K. (2010, June). Image hiding by using genet-ic algorithm and LSB substitution. In International Conference on Image and Signal Processing (pp. 404-411). Springer, Berlin, Hei-delberg. https://doi.org/10.1007/978-3-642-13681-8_47.
    81. Rajendran, S., & Doraipandian, M. (2017). Chaotic Map Based Random Image Steganography Using LSB Technique. IJ Network Security, 19(4), 593-598.
    82. Wu, H. C., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2005). Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings-Vision, Image and Signal Processing, 152(5), 611-615. https://doi.org/10.1049/ip-vis:20059022.
    83. Yang, C. H., Weng, C. Y., Wang, S. J., & Sun, H. M. (2010). Var-ied PVD+ LSB evading detection programs to spatial domain in data embedding systems. Journal of Systems and Software, 83(10), 1635-1643. https://doi.org/10.1016/j.jss.2010.03.081.
    84. Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differ-encing. IET Image processing, 6(6), 677-686. https://doi.org/10.1049/iet-ipr.2011.0059.
    85. Shen, S. Y., & Huang, L. H. (2015). A data hiding scheme using pixel value differencing and improving exploiting modification direc-tions. Computers & Security, 48, 131-141. https://doi.org/10.1016/j.cose.2014.07.008.
    86. Lusson, F., Bailey, K., Leeney, M., & Curran, K. (2013). A novel approach to digital watermarking, exploiting colour spaces. Signal Processing, 93(5), 1268-1294. https://doi.org/10.1016/j.sigpro.2012.10.018.
    87. Balasubramanian, C., Selvakumar, S., & Geetha, S. (2014). High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimedia tools and applications, 73(3), 2223-2245. https://doi.org/10.1007/s11042-013-1640-4.
    88. Li, B., Wang, M., Huang, J., & Li, X. (2014, October). A new cost function for spatial image steganography. In Image Processing (ICIP), 2014 IEEE International Conference on (pp. 4206-4210). IEEE.
  • Downloads

  • How to Cite

    Hashim, M. M., Rahim, M. S. M., Johi, F. A., Taha, M. S., & Hamad, H. S. (2026). Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats. International Journal of Engineering and Technology, 7(4), 3505-3514. https://doi.org/10.14419/ijet.v7i4.21726