Optimizing Data Security with Hybrid Scheme Based on LSB and DWT

Main Article Content

Sarah Faeq Abdullah
https://orcid.org/0009-0001-0032-9151
Shahir Fleyeh Nawaf
https://orcid.org/0000-0002-8639-7357

Abstract

One of the most popular techniques in image steganography is the Least Significant Bit (LSB) operation, which involves inserting secret data into the cover image's pixels' least significant bit. However, the amount of secret data that can be concealed in the cover image depends on the number of bits used for embedding. In this paper, a novel hybrid steganographic system based on Discrete Wavelet Transform (DWT) and Least Significant Bit (LSB) for image steganography is proposed. The proposed scheme aims to optimize data security by utilizing LSB and DWT techniques to embed secret data into an image robustly and efficiently. The present paper focuses on evaluating the algorithm performance by comparing the encrypted image quality using metrics such as PSNR, RMSE, and SSIM. The experimental results showed that the suggested method outperforms the existing LSB-based in terms of security performance. These results indicated that the proposed method consistently outperforms the conventional LSB-based method across all bit depths tested, with an overall improvement of 14.12% in PSNR, 41.87% in RMSE, and 4.02% in SSIM over the traditional LSB. The proposed method enhanced the PSNR values, reduced the RMSE values, and increased the SSIM values for all bit depths tested, indicating higher image fidelity, less distortion, and better preservation of structural similarity of the original image.

Article Details

Section

Articles

References

Gulati S, Bashir A, Mir AH. Comparative Study of LSB and DWT Based Steganography Combined with Arnold Transformation for Image Security. Journal of Information System Security 2022;18(1):63-80.

Kadhim IJ, Premaratne P, Vial PJ, Halloran B. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. Neurocomputing 2019; 335 :299-326.

Douglas M, Bailey K, Leeney M, Curran K. An Overview of Steganography Techniques Applied to the Protection of Biometric Data. Multimedia Tools and Applications 2018; 77(13):17333-17373.

Rajendran S, Doraipandian M. Chaotic Map Based Random Image Steganography Using LSB Technique. International Journal of Network Security 2017;19(4):593-598.

Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H. Image Steganography in Spatial Domain: A Survey. Signal Processing: Image Communication 2018; 65:46-66.

Hameed AS. High Capacity Audio Steganography Based on Contourlet Transform. Tikrit Journal of Engineering Sciences 2018;25(1):1-7.

Kini NG, Kini VG, Gautam. A Secured Steganography Algorithm for Hiding an Image in an Image. Integrated Intelligent Computing, Communication and Security 2019; 771 :539-546.

Gutub A, Al-Shaarani F. Efficient Implementation of Multi-Image Secret Hiding Based on LSB and DWT Steganography Comparisons. Arabian Journal for Science and Engineering 2020;45(4):2631-2644.

Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A. Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination. Journal of Information Security and Cybercrimes Research 2019;2(1):73-82.

Astuti YP, Rachmawanto EH, Sari CA. Simple and Secure Image Steganography Using LSB and Triple XOR Operation on MSB. 2018 International Conference on Information and Communications Technology (ICOIACT): IEEE; 2018. pp. 191-195.

Islam MR, Tanni T, Parvin S, Sultana M, Siddiqa A. A Modified LSB Image Steganography Method Using Filtering Algorithm and Stream of Password. Information Security Journal: A Global Perspective 2021; 30(6):359-370.

Salih AM, Mahmood AF. Design and Implementation of Gray Scale JPEG CODEC on Spartan-3E. Tikrit Journal of Engineering Sciences 2017;24(3):18-25.

Pujiono IP, Rachmawanto EH, Nugroho DA. The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images. Journal of Applied Intelligent System 2023;8(1):69-80.

Joseph H, Rajan BK. Image Security Enhancement Using DCT & DWT Watermarking Technique. 2020 International Conference on Communication and Signal Processing (ICCSP): IEEE; 2020. pp. 0940-0945.

Taha NA, Qasim Z, Al-Saffar A, Abdullatif AA. Steganography Using Dual Tree Complex Wavelet Transform with LSB Indicator Technique. Periodicals of Engineering and Natural Sciences 2021;9(2):1106-1114.

Wang J, Cheng M, Wu P, Chen B. A Survey on Digital Image Steganography. Journal of Information Hiding and Privacy Protection 2019; 1(2):87-93.

Singh A, Singh H. An Improved LSB Based Image Steganography Technique for RGB Images. 2015 IEEE International Conference on electrical, computer and communication technologies (ICECCT): IEEE; 2015. pp. 1-4.

Al-Shaarani F, Gutub A. Securing Matrix Counting-Based Secret-Sharing Involving Crypto Steganography. Journal of King Saud University-Computer and Information Sciences 2022;34(9):6909-6924.

Mistry D, Banerjee A. Discrete Wavelet Transform Using Matlab. International Journal of Computer Engineering & Technology (IJCET) 2013;4(2):252-259.

Fadhil AF. Formulation of Detection Strategies in Images: Southern Illinois University at Carbondale; 2014.

Hashim MM, Rahim MSM, Johi FA, Taha MS, Hamad HS. Performance Evaluation Measurement of Image Steganography Techniques with Analysis of LSB Based on Variation Image Formats. International Journal of Engineering & Technology 2018; 7(4) :3505-3514.

Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing 2004;13(4):600-612.

Hodson TO. Root-Mean-Square Error (RMSE) or Mean Absolute Error (MAE): When to Use Them or Not. Geoscientific Model Development 2022; 15(14):5481-5487.

Dalal M, Juneja M. Evaluation of Orthogonal and Biorthogonal Wavelets for Video Steganography. Information Security Journal: A Global Perspective 2020;29(1):40-50.

Bakurov I, Buzzelli M, Schettini R, Castelli M, Vanneschi L. Structural Similarity Index (SSIM) Revisited: A Data-Driven Approach. Expert Systems with Applications 2022; 189:116087.

Similar Articles

You may also start an advanced similarity search for this article.