A Novel and Efficient Digital Image
A Novel and Efficient Digital Image
com/scientificreports
Keywords Image steganography, LSB, Image quality assessment metrics, Histogram analysis, Image,
Capacity, Robustness
During communication through different channels, information is more vulnerable to attackers, especially
when transmission takes place over the internet1. Secure information sharing over communication channels
is vital such as any leakage of private information may lead to persistent difficulties. The increasing need for
protecting information as being transmitted over communication channels has led to the discovery of various
mechanisms2. However, no single method can perfectly secure communication over the Internet, as each has its
advantages and disadvantages. Steganography is a popular method that involves the embedding of secret data
within cover objects like images, videos, audio, and text. The information hidden in such objects is not easily
detectable to the naked eye because steganography is a procedure that conceals the secret information within the
cover medium so that nobody can know about its existence3,4. In the abovementioned cover objects, images have
remarkable performance in concealing information that’s why it’s the most widely used option for steganography.
However, the basic research challenge in image steganography is achieving reliable criteria including capacity,
computation, robustness, temper protection, and transparency, as shown in Fig. 1. It is worthwhile to define
some key concepts relevant to image steganography. The payload; means a cipher text to be embedded within
the cover object. Security; means how much the original and stego image is strong against some statistical attacks
1Department of Computer Science, University of Buner, Swari 19290, KP, Pakistan. 2Riphah School of Computing
& Innovation, Riphah International University Lahore, Lahore, Pakistan. 3Department of Computer Science,
Abdul Wali Khan University, Mardan 23200, Pakistan. 4School of Computer Science and Engineering, Yeungnam
University, Gyeongsan 38541, Republic of Korea. 5Department of Signal Theory and Communications, University of
Valladolid, Valladolid, Spain. 6Universidad Europea del Atlántico. Isabel Torres 21, Santander 39011, Spain. email:
[email protected]; [email protected]
such are cropping, tempering, scaling, etc. Perception; explains the nature of the cover picture after mounting
the mystery message. Temper protection; is a critical issue after securing the secret information within the cover
image because if someone tries to extract the message, temper protection; should be high enough to secure
the stego image against attackers. The computation shows the time taken by the extracting and embedding
process, and it should be minimized so the embedding and extracting process takes the least possible time5. The
evaluation of existing research works based on these criteria is important as it can lead us to identify the research
gap and suggest possible improvements. Most of the recent literature on image steganography is focused on one
criterion, but some have broken down the other and every stenographic method needs reliability between them6.
There is a tradeoff among different reliability criteria of steganography. Suppose we increase the limit of payload,
it will degrade the quality of the image and also affect the robustness7. The research challenge is two-fold: not to
decorate the quality of the cover object and to achieve reliable and best possible values for different parameters
of image steganography criteria8,9. Furthermore, appropriate object selection and optimum size of image pixels
and secret message size are vital.
These methods aim to hide a secret message within an image using a mysterious key. This ensures that the
collector cannot decipher the message without having the same key. The algorithm used LSB substitution and
value differencing concepts, resulting in a novel image steganography technique. The LSB technique is the most
widely used and popular technique for image steganography as shown in Fig. 2. For security, the algorithm uses
different concepts such as Magic Matrix and value differencing. Encrypting the message within the cover object
it reduces the error rate. The proposed method achieves reliability between the criteria up to acceptable limits6.
The outcomes show the significance and inspiration of the proposed calculation.
In LSB-based image steganography, the selected image is divided into corresponding channels shown in
Fig. 2. Each color intensity is then transformed into a corresponding binary representation. The secret message,
represented as ‘B’, is converted into ASCII values and further coded into dual values. The method uses the Red,
Green, Blue (RGB) color model because of its valuable properties. This model uses 24 depths per pixel, and each
color has 8 8-bit representations in the range of 0-25510. RGB is suitable for embedding more information because
having three colors and the combination of these colors can reproduce more possible colors11. Considering RGB,
we are working with a binary image having a range of 0-255 of eight bits’ representations where the left-most
bit is LSB and the rightmost bit is considered MSB. In addition, consider the range from 0 to 255, if we change
the MSB from 0, its impact is very high because it will change 99% intensity of the color. If we change LSB
from one to 1 or 0 to 1 then its impact will be very low say up to 2% change. Therefore, the proposed algorithm
used LSB concepts to embed the secret information, and according to the literature, up to 4 LSB bits, can be
embedded as secret information which is less susceptible to any naked human eye5,13. As mentioned earlier
state of art methods are not reliable because based on one or two parameters. So, this effort aims to develop a
novel reliable method that ensures reliability. The proposed method was critically analyzed based on distinct
perspectives and different formats to fulfill the basic criteria of image steganography. For the balance tradeoff,
we used different concepts or facets (i.e. magic matrix, MLEA, Key, LSB up to 4 bit, etc.) to cover all the criteria
of image steganography. Our proposed method ensures efficient Image format, dimension, and color that are
necessary for spatial, and frequency domains including Machine learning (ML) and Deep learning (DL) models.
The key contributions are given below.
• Herein, we design and propose a digital image steganography technique using the least significant bit substi-
tution.
• Our proposed technique incorporates reliable image steganography parameters and appropriate cover image
selection for achieving high security.
• Our proposed technique incorporates the random concepts for the selection of the cover image pixels by
inserting the message bits to outperform.
• The experimental results show that the proposed method is efficient as compared to the state-of-the-art meth-
ods.
The rest of the paper is partitioned into four divisions. Division II presents the connected exploration works,
Division III expounds on the proposed strategy, Division IV makes sense of the trial results and conversation
and Division V finishes up the research work.
Related work
Steganography using cover objects is a growing field of research that involves hiding secret information within
various objects. Recently, various methods of cover steganography have been developed, such as Most Significant
Bits and Least Significant Bits (LSB) (MSB-LSB), Pixel Value Differencing (PVD), etc. Respectively every
method has its pros and cons, subject to factors such as the implanting process of the hidden message, cover
medium, size of the secret data to stand encrypted, and other parameters7,8. However, despite ongoing efforts to
improve cover steganography, the error rates of these methods have not yet reached acceptable limits. Therefore,
evaluating existing research is crucial to making progress and improving the significance and effectiveness of
these methods. These limitations provide an opportunity for further advancement. This study focuses on LSB-
based cover steganography, which is a commonly used method for concealing confidential data within a cover
medium. Table 1 presents a security analysis of related works from the literature, Table 2 presents an acute
exploration of different image steganography approaches by assessing algorithms which are the basic criteria of
image steganography.
Tables 1 and 2 provide a detailed analysis of various research studies that focus on the security and quality
parameters of image steganography. The experimental results section of the studies discusses different concepts
for embedding secret messages within cover media using LSB-based methods. Additionally, the studies also
emphasize the quality of the stego images. Since there is a tradeoff among the steganography evaluation criteria,
some methods in the literature achieve good security but are unable to maintain good levels for other criteria
which are crucial for some efficient Stenographic methods. The effectiveness of image steganography depends
on the technique used to hide the secret message, as well as the choice of cover objects. Several different
approaches have been used to encrypt messages and hide them in cover mediums. In this context, two tables
have been created to critically analyze these methods based on quality assessment parameters and basic criteria.
The analysis aims to identify the advantages and disadvantages of each existing method. Comparatively, the
proposed algorithm has used a novel procedure of embedding the secret message and selecting the appropriate
object to tackle the aforementioned issues to improve image steganography.
Table 1. Summary of some previous research works for image steganography using QAM.
secret message SM and the red channel by CalDiff. We then use a Multi-Level Encryption Algorithm (MLEA),
based on CalDiff and a secret key, Skey, to obtain the cipher text, CText. Using this function, we encode the cover
information into the shuffled Blue blocks using the secret key. Finally, we combine the three channels - Red,
Green, and Blue - and the secret key to achieve the stego-image, SIm. We use MLEA to embed the secret message
into the four shuffled blocks of the Blue channel, making it difficult for attackers to extract the information. The
magic matrix also adds a layer of security by shuffling the blocks of the Blue channel. The complete process is
illustrated in Fig. 5.
Embedding algorithm
Algorithm 1, First, we select the cover image and then flip and transpose it respectively. After dividing the FT
image into RGB channels, the Blue channel is again divided into 4 equal blocks for encrypting messages. In
addition, a magic matrix is used for shuffling the blue channel for security purposes. While red channel and
secret message bits are used for calculating the differing values. Now to generate cipher text, MLEA is applied on
bits using a secret key. Finally, using LSB the cipher text will be inserted into Blue channel sub 4 blocks. However,
for shuffling the message bits we used magic matrix as a MATLAB function having some unique properties such
as rotation, reflection, etc., and having no repeated values as a result. The sum of this matrix row and column,
diagonal remains the same and this activity is placed for security purposes. For tamper and robustness, MLEA
and Key are utilized which are placed before the encrypted secret message to cover the image. MLEA has some
better operations which are usually applied before encoding secret messages into cover images. MLEA used
XOR operations for all bits at once which take 8 bits combination and replace 1st four bits with the last bits like
a flipping property. So the left circular shift operation is performed on every 8 bits and makes two equal blocks
array namely B1 and B2 in this way. IF B1 i = = 1, and XOR B2 by 1. Shown in Fig. 5.
Extraction algorithm
Decoded message is the opposite of encoded by taking the stego image as input flipped and transposed respectively.
For getting the respective red, Green, and Blue channels set flag 1; and check the condition for getting the secret
message pixels from equals sub 4 blocks BC1’, BC2’, BC3’, and BC4’of blue channel. The complete steps of the
extraction algorithm are presented in Algorithm 2.
Fig. 6. Dataset.
Dimensions and 256x 77.1 256x 79.1 256x 75.2 256x 77.2 256x 73.2 256x 82.1
Resulted PSNR 512x 78.3 512x 81.3 512x 77.3 512x 82.3 512x 75.3 512x 83.3
1024x 81.3 1024x 83.9 1024x 85.9 1024x 84.9 1024x 80.9 1024x 87.9
Average resulted PSNR on different dimension: D- dimensions
Average of 165 images
D-128 = 71.81, D-256 = 77.31, D-512 = 79.63, and D-1024 = 84.133
Performance
The proposed technique is assessed in light of distinct viewpoints with some color images to show the significance
and inspiration of this work. So, the basic assessment parameter for analyzing both cover and Stego images is
the Peak Signal Noise Ratio (PSNR). PSNR value determines both image quality. If PSNR is > 30dB, the image is
high-quality. Equation (9) finds PSNR value34. Different analysis perspectives are given in Fig. 7.
( )
Cmax 2
PSNR = 10log10 (9)
MSE
The algorithm underwent thorough analysis, and the results are in Tables 3, 4, 5 and 6 respectively.
The results obtained from different angles demonstrate the superior quality of the proposed algorithm
in comparison to existing strategies. A crucial aspect to consider is determining the optimal size of message
bits embedded in an image of a particular size to ensure efficient steganography. Hence, before embedding
the secret message into the image it is important to compute the message and image pixels to point out the
best dimension and format images for which size of the text. Consequently, the proposed strategy is assessed
Images
512 × 512 Baboon Peppers Lake House Splash Flowers
8KB 77.2 8KB 69.0 8KB 65.1 8KB 70.1 8KB 89.0 8KB 75.3
Different Size of Text and 10KB 79.1 10KB 72.1 10KB 69.2 10KB 73.2 10KB 85.2 10KB 81.3
Resulted PSNR 12KB 80.1 12KB 77.3 12KB 70.2 12KB 74.4 12KB 83.0 12KB 76.2
14KB 82.2 14KB 81.9 14KB 76.2 14KB 79.6 14KB 77.9 14KB 78.1
Average resulted PSNR on different size of text: ST (Size text)
Average of 120 images
ST-8 = 74.28, ST-10 = 76.68, ST-12 = 7686, and ST-14 = 79.81
Table 5. Persp-3: Resulted PSNR on 512 × 512 embedded 14, 10, 12, and 8 KB size of text.
PSNR values
Images Message Size PNG TIFF BMP JPG
Baboon 79.321 73.123 69.212 82.212
Girl 81.223 77.765 80.121 82.918
Peppers 86.189 71.554 68.876 82.887
Lake 14KB 83.098 79.986 75.097 82.643
House 80.854 79.654 87.001 80.087
Flowers 84.001 87.009 87.091 85.098
Splash 86.065 87.112 83.087 86.076
An average of 150 images 82.82 79.33 78.78 83.00
Table 6. Persp-4: Resulted PSNR on (PNG, BMP, JPG, D-512 × 512) using 14 KB text.
Inverted
70.91 88.00 71.98 79.99 79.00 80.00 82.07
LSB 23
LSB IMST 24 73.04 80.00 80.32 82.98 83.09 84.32 83.32
IMST 27 76.99 84.02 83.87 80.09 80.87 82.98 82.97
Robust ST 28 77.32 78.43 79.22 76.66 78.32 79.97 79.97
Proposed
79.34 87.98 85.01 84.01 83.89 84.98 88.12
method
utilizing different viewpoints. It is also important as a principle perspective to distinguish which cover object is
the most appropriate for encrypting the secret messages to pledge secure transmission over the web. To solve this
issue, that’s why the proposed work has tried to utilize different image formats, including PNG, JPG, and BMP,
dimensions, and viewpoints in light of PSNR values to show the method performance. Using various QAMs the
proposed work is comparatively analyzed for security purposes in the following section.
Performance analysis
This section provides a detailed explanation of the results obtained from the suggested algorithm. These results
are also compared with previous research studies based on metrics such as MSE, RMSE, NCC, SSIM, and PSNR.
Table 7; Fig. 8 present the experimental outcomes of the proposed technique based on these assessment metrics,
demonstrating the enhancements made by this method. Here are some important assessment metrics that
need to be elaborated for the experimental results of any steganographic method. So, to measure the difference
between both input and resulting images, Root Mean Square Error (RMSE) is usually used. One more significant
quality metric that is utilized to examine the connection between an input and results from media is Normalized
Cross Correlation (NCC). If the value of the NCC is equal to 1, then both cover and stego images are considered
identical. On the other hand, if this value becomes 0, it indicates that there is a complete difference between both
images. The Structural Similarity Index (SSIM) is a significant quality metric used to evaluate the quality of cover
and stego images. It consists of three parts followed by Luminance, Contrast, and Structural and it determines
the quality of the image. An image will be considered a quality image if the value of SSIM is 1 while 1 < presents
the difference between the cover and stego image. Equation 13 elaborates on the formulas for each segment. If
measuring the contrast between both cover and stego image Mean Squared Error (MSE) is usually used and
both images will be considered if the value of MSE is 0. To obtain quality and robust images MSE value should
be low35,36 Formulas of each are elaborated in Eqs. 10–13.
√( )
∑ 1
RMSE = x=1 (Cx
N
− Sx )2 (10)
N
√( )
∑ 1
RMSE = x=1 (Cx
N
− Sx )2 (11)
N
∑M ∑ N
y=1 (S (x, y) *C (x, y))
NCC = x=1
∑M ∑N 2
(12)
x=1 y=1 S (x, y)
( )
2µ x µ y + C1 (2σ xy + C2 )
SSIM (X, Y) = ( ) (13)
µ x 2 + µ y 2 + C1 (σ x 2 + σ y 2 + C2 )
This section elaborated on the results of the proposed method using some security measures and QAMs to
ensure the work’s importance and resistance. Before continuing to the outcomes, making sense of these concepts
is significant and explained below.
The Relationship Coefficient (CC) is utilized to track down the linearity (degree and heading) of two irregular
factors. It assumes an imperative part because of its estimation qualities37. If the CC value is equal to 1, the two
factors are supposed to be somewhat similar or firmly related. Equation 14 shows the formula for CC.
∑
(xi − xm ) (yi − ym )
I = ∑ √∑
i
√∑ (14)
i i (xi − xm )2 i (yi − ym )2
Image fidelity (IF) is also a more significant metric that tracks down the picture quality. Equation 15 shows the
formula for IF calculation where P and S address the Cover and Stego picture, and “I” and “j” address beginning
and finishing values.
∑
i,j (P (i, j) − S (i, j))2
IF = 1 − ∑ (15)
i,j (P (i, j) × S (i, j))
To measure the quality of stego images Quality Index is also used on different perspective. Equation 16 elaborates
the detailed formula that how to calculate the stego images. T and H represent both stego and cover images and
n shows the pixel quantity in an image while the value scope of QI is in the range of -1 to 1. Both input and
resulting images will be identical if the value is = 1, otherwise, the images will show the difference between the
images.
4σ HT H′ T ′
Q= ( )
σ 2H+ σ 2T (H ′ 2 + T ′ 2 )
Resulted Values
Image Correlation coefficient IF QI
Lake 0.999 0.999 1
Flowers 0.999 1 1
Peppers 1 1 0.999
Baboon 0.998 0.998 1
Splash 0.999 0.999 1
Tree 0.999 0.999 0.998
House 0.998 1 1
Table 9. Effect analysis of red, green, and blue channels while embedding message bits.
1 ∑ ( )2
σ 2H = N
Hi − H ′
N −1
i=1
1 ∑ 1 ∑
H′ = N
i=1 Hi −T = N
i=1 Ti
N N
1 ∑ ( )2
σ 2H = N
Ti − T ′ (16)
N −1
i=1
Contrast analysis is widely used to quantify the intensity dissimilarity between pixels and their neighbors
throughout the image. It also helps in the main texture area of the image and can be calculated as under in eq. 17.
4σ HT H′ T ′
Q= ( ) (17)
σ 2 2
H+ σ T (H ′ 2 + T ′ 2 )
To measure the security of any steganographic method Information Entropy (IE) is usually used. Suppose e1….
em, as m shows the measure of potential components and from P(e)… P(em) will be considered as a probability
for thesis components. The formula in eq. 18 elaborated on the calculation of Entropy. In view of the recurrence
of the image, the condition is the assessment of the typical number of pieces expected to implant a series of
pieces.
1 ∑ ( )2
σ 2H = N
Hi − H ′ (18)
N −1
i=1
For gray level diagonal and co-occurrences, Homogeneity (H) is widely used to find the closest level of element
distribution38,39. Eq.19 shows the whole calculation. So i,j show lists of line and segment numbers, and p (i, j)
represent pixel’s values ith column and jth section.
1 ∑ 1 ∑
H′ = N
i=1 Hi −T = i=1 Ti (19)
N
N N
The proposed calculation has been demonstrated critical in light of observational outcomes from QAMs.
The investigation depends on differentiation, homogeneity, and entropy to recognize the specific distinctions
between the embedded medium’s relating channels (red, green, blue) after embedding the cipher message shown
in Tables 8 and 9.
The results of our proposed method were better than those of the techniques described in27,29. According to
Table 10, our method has a relatively high hiding capacity compared to existing techniques, with a normal PSNR.
The average bpp value of our method for more than eight test images is 5.025.
Security analysis
The section expounded on the security of the proposed technique has been talked about concerning Pixel
Difference Histogram (PDH), and RS steganalysis. The PDH and RS analysis is the normal and powerful
measurable steganalysis to recognize the presence of the restricted data in the stego-picture for the LSB based
techniques40. The LSB replacement methods experience the ill effects of RS investigation and PVD methods
experience the ill effects of PDH investigation. The proposed method utilizes ideas like adjusted LSB replacement,
also value differencing, so both RS investigation and PDH should dissect it. Here, RS steganalysis is used to break
down the effectiveness of the extended procedure41. Consequently, the RS plot applied more than 500 implanted
pictures to check or hack the secret-covered picture. So, both RS and PDH considerations is proceeded according
to the structure talked about in42,43. RS analysis of two standard images Lena, baboon, Pepper, and house are
presented in Fig. 9a-c respectively. The x-axis and y-axis describe the ratio of the concealing capability and
ratio of the singular and regular groups. To plot four arcs/curves, four factors S-m, Sm, R-m, Rm as described
in41,44,45. RS analysis identifies the presence of implanted bits based on the condition if Rm-Sm < R-2m-S. While
the steganographic-based method is unnoticeable by RS analysis if Sm ≈ S− m < R m ≈ R− m.
Figure 10a, b indicate that the condition Sm ≈ S − m < Rm ≈ R − m holds because the curves of R − m and Rm
are positioned above the curves of R − m and Rm, while the curves of S − m and Sm are equal in length to each
other. Additionally, the curves of R − m and Rm are also of equal length. This leads to the conclusion that the
intended method is highly resistant in terms of RS analysis. To validate the effectiveness of the proposed method,
we need to use the concepts of LSB and value differencing to examine its success through PDH analysis and RS
analysis. To show the difference on both axis’s for frequency and pixel difference PDH graph is used. The PDH
analysis of some standard images namely Lena, pepper images presented in Fig. 10a,b respectively. The dotted
and solid lines indicate the PDH analysis of both stego and cover image respectively. It very well may be seen
that the step impact or crisscross presence is tiniest. While the arcs/curve show the smooth nature of the stego
image. Hence, it very well may be presumed that the proposed strategy is pitifully impervious to PDH check.
Fig. 10. PDH Plot of Two standard images namely Lena and Pepper.
HSI model, and acronoment method are also best for future work. Also, some machine learning techniques
such as different deep learning architecture or unsupervised learning may be utilized for obtaining efficient
steganography for secure communication between the sender and the receiver. Now GAN GAN-based models
are also can be used for better and secure communication.
Data availability
Data is provided within the manuscript or supplementary information files.
References
1. Subramanian, N., Elharrouss, O., Al-Maadeed, S. & Bouridane, A. Image steganography: A review of the recent advances. IEEE
access. 9, 23409–23423 (2023).
2. Hemeida, F., Alexan, W. & Mamdouh, S. A comparative study of audio steganography schemes. Int. J. Comput. Digit. Syst. 10,
555–562 (2021).
3. Lakshmi Sirisha, B. & Chandra Mohan, B. Review on spatial domain image steganography techniques. J. Discrete Math. Sci. Crypt.
24 (6), 1873–1883 (2021).
4. Singh, K. U. A survey on image steganography techniques. Int. J. Comput. Appl., 97(18). (2014).
5. Menon, N. A survey on image steganography. In 2017 International Conference on Technological Advancements in Power and
Energy (TAP Energy) (pp. 1–5). IEEE. (2017), December.
6. Kaur, S., Singh, S., Kaur, M. & Lee, H. N. A Systematic Review of Computational Image Steganography Approaches. Arch. Comput.
Methods Eng., 1–23. (2022).
7. Ejidokun, T., Omitola, O. O., Nnamah, I. & Adeniji, K. Implementation and Comparative Analysis of Variants of LSB Stenographic
Method. In 2022 30th Southern African Universities Power Engineering Conference (SAUPEC) (pp. 1–4). IEEE. (2022), January.
8. Ansari, A. S., Mohammadi, M. S. & Parvez, M. T. A multiple-format steganography algorithm for color images. IEEE Access. 8,
83926–83939 (2020).
9. Bhavani, Y., Kamakshi, P., Kavya Sri, E. & Sindhu Sai, Y. A Survey on Image Steganography Techniques Using Least Significant Bit.
In Intelligent Data Communication Technologies and Internet of Things (281–290). Springer, Singapore. (2022).
10. Sahu, A. K. & Gutub, A. Improving grayscale steganography to protect personal information disclosure within hotel services.
Multimedia Tools Appl., 1–21. (2022).
11. Hussain, M. & Hussain, M. A survey of image steganography techniques. (2013).
12. Mohamed, M. M., Ghoniemy, S. & Ghali, N. I. A Survey on Image Data Hiding Techniques. Int. J. Intell. Comput. Inform. Sci., 1–25.
(2022).
13. Nabi, S. T., Kumar, M., Singh, P., Aggarwal, N. & Kumar, K. A comprehensive survey of image and video forgery techniques:
variants, challenges, and future directions. Multimedia Syst., 1–54. (2022).
14. Muhammad, K., Ahmad, J., Rehman, N. U., Jan, Z. & Qureshi, R. J. A secure cyclic Stenographic technique for color images using
randomization. arXiv preprint arXiv:1502.07808. (2015).
15. Alanzy, M., Alomrani, R., Alqarni, B. & Almutairi, S. Image steganography using LSB and hybrid encryption algorithms. Appl. Sci.
13 (21), 11771 (2023).
16. Karim, S. M., Rahman, M. S. & Hossain, M. I. A new approach for LSB based image steganography using secret key. In 14th
international conference on computer and information technology (ICCIT 2011) (pp. 286–291). IEEE. (2011), December.
17. Baby, D., Thomas, J., Augustine, G., George, E. & Michael, N. R. A novel DWT based image securing method using steganography.
Procedia Comput. Sci. 46, 612–618 (2015).
18. Rachmawanto, E. H. & Sari, C. A. Secure image steganography algorithm based on dct with otp encryption. J. Appl. Intell. Syst. 2
(1), 1–11 (2017).
19. Naima, S. et al. Secure and imperceptible frequency-based watermarking for medical images. Circuits, Systems, and Signal
Processing, 1–22. (2024).
20. Çataltaş, Ö. & Tütüncü, K. Comparison of LSB image steganography technique in different color spaces. In 2017 international
artificial intelligence and data processing symposium (IDAP) (pp. 1–6). IEEE. (2017), September.
21. Huang, R., Lian, C., Dai, Z., Li, Z. & Ma, Z. A novel hybrid image synthesis-mapping framework for steganography without
embedding. IEEE Access. (2023).
22. Dhar, S. & Sahu, A. K. Digital to quantum watermarking: A journey from past to present and into the future. Comput. Sci. Rev. 54,
100679 (2024).
23. Dhar, P. K., Kaium, A. & Shimamura, T. Image steganography based on modified lsb substitution method and data mapping. Int.
J. Comput. Sci. Netw. Secur. 18 (3), 155–160 (2018).
24. Gutub, A. A. A. Pixel indicator technique for RGB image steganography. J. Emerg. Technol. web Intell. 2 (1), 56–64 (2010).
25. Ray, A. M., Pramanik, S., Das, B. & Khanna, A. Hybrid cryptography and steganography method to provide safe data transmission
in IoT. In International Conference on Data Analytics & Management (pp. 513–524). Singapore: Springer Nature Singapore., June.
(2023).
26. Sahu, A. K. & Sahu, M. Digital image steganography and steganalysis: A journey of the past three decades. Open. Comput. Sci. 10
(1), 296–342 (2020).
27. Sharma, D. & Prabha, C. Hybrid security of EMI using edge-based steganography and three-layered cryptography. In Appl, Data
Sci. Smart Syst. (pp. 278–290 ). CRC.
28. Venkata Krishna, G. P. C. & Vivekananda Reddy, D. Machine learning-enhanced hybrid cryptography and image steganography
algorithm for securing cloud data. J. Intell. Fuzzy Syst., (Preprint), 1–11. (2024).
29. Almazaydeh, L. Secure RGB image steganography based on modified LSB substitution. Int. J. Embed. Syst. 12 (4), 453–457 (2020).
30. Rustad, S., Syukur, A. & Andono, P. N. Inverted LSB image steganography using adaptive pattern to improve imperceptibility.
Journal of King Saud University-Computer and Information Sciences. (2021).
31. Kamil, S., Abdullah, S. N. H. S., Hasan, M. K. & Bohani, F. A. Enhanced flipping technique to reduce variability in image
steganography. IEEE Access. 9, 168981–168998 (2021).
32. ALabaichi, A., Al-Dabbas, M. A., A. A., K. & Salih, A. Image steganography using least significant bit and secret map techniques.
International journal of electrical & computer engineering (2088–8708), 10(1). (2020).
33. Liu, X. et al. Robust coverless steganography using limited mapping images. J. King Saud University-Computer and Information Sci..
(2022).
34. Naz, M. T. S. A. & Zade, S. A new approach for image steganography using (Inter Pixel Value Difference and Quantized Range Table
Method, 2022).
35. Xu, Y., Mou, C., Hu, Y., Xie, J. & Zhang, J. Robust invertible image steganography. In Proceedings of the IEEE/CVF Conference on
Computer Vision and Pattern Recognition (pp. 7875–7884). (2022).
36. https://sipi.usc.edu/database
37. https://www.imageprocessingplace.com/root_fi les_V3/image_databases.htm
38. Alatiyyat, B. F. & Narmatha, C. Survey on image steganography techniques. In 2022 2nd International Conference on Computing
and Information Technology (ICCIT) (pp. 57–64). IEEE, January. (2022).
39. Nabi, S. T., Kumar, M., Singh, P., Aggarwal, N. & Kumar, K. A comprehensive survey of image and video forgery techniques:
variants, challenges, and future directions. Multimedia Syst. 1, 54 (2022).
40. Wang, Z., Zhou, M., Liu, B. & Li, T. Deep image steganography using transformer and recursive permutation. Entropy 24 (7), 878
(2022).
41. Sharif, A., Mollaeefar, M. & Nazari, M. A novel method for digital image steganography based on a new three dimensional chaotic
map. Multimedia Tools Appl. 76, 7849–7867 (2017).
42. Zhang, W. et al. Continual learning for blind image quality assessment. IEEE Trans. Pattern Anal. Mach. Intell. (2022).
43. Swain, G. Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with
modulus function. Optik 180, 807–823 (2019).
44. Pradhan, A., Sahu, A. K., Swain, G. & Sekhar, K. R. Performance evaluation parameters of image steganography techniques. In
2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS) (pp. 1–8). IEEE. (2016), May.
45. Sahu, M., Padhy, N., Gantayat, S. S. & Sahu, A. K. Performance analysis of various image steganography techniques. In 2022 Second
International Conference on Computer Science, Engineering and Applications (ICCSEA) (pp. 1–6). IEEE. (2022), September.
46. Mileva, A., Velinov, A., Dimitrova, V., Caviglione, L. & Wendzel, S. Information hiding in the DICOM message service and upper
layer service with entropy-based detection. Entropy 24 (2), 176 (2022).
Acknowledgements
This research is funded by the European University of Atlantic.
Author contributions
“Shahid Rahman.Jamal uddin. and Farhan Amin.Hameed Hussain. wrote the main manuscript text and Sabir
Shah.Abdu Salam. Isabel de la Torre Díez. Debora Libertad Ramírez Vargas and Julio César Martínez Espinosa
prepared Figs. 1-3. All authors reviewed the manuscript.”
Declarations
Competing interests
The authors declare no competing interests.
Additional information
Correspondence and requests for materials should be addressed to F.A. or I.T.D.
Reprints and permissions information is available at www.nature.com/reprints.
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.