Optimizing Data Security with Hybrid Scheme Based on LSB and DWT

Main Article Content

Sarah Faeq Abdullah
https://orcid.org/0009-0001-0032-9151
Shahir Fleyeh Nawaf
https://orcid.org/0000-0002-8639-7357

Abstract

One of the most popular techniques in image steganography is the Least Significant Bit (LSB) operation, which involves inserting secret data into the cover image's pixels' least significant bit. However, the amount of secret data that can be concealed in the cover image depends on the number of bits used for embedding. In this paper, a novel hybrid steganographic system based on Discrete Wavelet Transform (DWT) and Least Significant Bit (LSB) for image steganography is proposed. The proposed scheme aims to optimize data security by utilizing LSB and DWT techniques to embed secret data into an image robustly and efficiently. The present paper focuses on evaluating the algorithm performance by comparing the encrypted image quality using metrics such as PSNR, RMSE, and SSIM. The experimental results showed that the suggested method outperforms the existing LSB-based in terms of security performance. These results indicated that the proposed method consistently outperforms the conventional LSB-based method across all bit depths tested, with an overall improvement of 14.12% in PSNR, 41.87% in RMSE, and 4.02% in SSIM over the traditional LSB. The proposed method enhanced the PSNR values, reduced the RMSE values, and increased the SSIM values for all bit depths tested, indicating higher image fidelity, less distortion, and better preservation of structural similarity of the original image.

Metrics

Metrics Loading ...

Article Details

Section
Articles

Plaudit

References

Gulati S, Bashir A, Mir AH. Comparative Study of LSB and DWT Based Steganography Combined with Arnold Transformation for Image Security. Journal of Information System Security 2022;18(1):63-80.

Kadhim IJ, Premaratne P, Vial PJ, Halloran B. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. Neurocomputing 2019; 335 :299-326. DOI: https://doi.org/10.1016/j.neucom.2018.06.075

Douglas M, Bailey K, Leeney M, Curran K. An Overview of Steganography Techniques Applied to the Protection of Biometric Data. Multimedia Tools and Applications 2018; 77(13):17333-17373. DOI: https://doi.org/10.1007/s11042-017-5308-3

Rajendran S, Doraipandian M. Chaotic Map Based Random Image Steganography Using LSB Technique. International Journal of Network Security 2017;19(4):593-598.

Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H. Image Steganography in Spatial Domain: A Survey. Signal Processing: Image Communication 2018; 65:46-66. DOI: https://doi.org/10.1016/j.image.2018.03.012

Hameed AS. High Capacity Audio Steganography Based on Contourlet Transform. Tikrit Journal of Engineering Sciences 2018;25(1):1-7. DOI: https://doi.org/10.25130/tjes.25.1.01

Kini NG, Kini VG, Gautam. A Secured Steganography Algorithm for Hiding an Image in an Image. Integrated Intelligent Computing, Communication and Security 2019; 771 :539-546. DOI: https://doi.org/10.1007/978-981-10-8797-4_54

Gutub A, Al-Shaarani F. Efficient Implementation of Multi-Image Secret Hiding Based on LSB and DWT Steganography Comparisons. Arabian Journal for Science and Engineering 2020;45(4):2631-2644. DOI: https://doi.org/10.1007/s13369-020-04413-w

Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A. Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination. Journal of Information Security and Cybercrimes Research 2019;2(1):73-82. DOI: https://doi.org/10.26735/16587790.2019.001

Astuti YP, Rachmawanto EH, Sari CA. Simple and Secure Image Steganography Using LSB and Triple XOR Operation on MSB. 2018 International Conference on Information and Communications Technology (ICOIACT): IEEE; 2018. pp. 191-195. DOI: https://doi.org/10.1109/ICOIACT.2018.8350661

Islam MR, Tanni T, Parvin S, Sultana M, Siddiqa A. A Modified LSB Image Steganography Method Using Filtering Algorithm and Stream of Password. Information Security Journal: A Global Perspective 2021; 30(6):359-370. DOI: https://doi.org/10.1080/19393555.2020.1854902

Salih AM, Mahmood AF. Design and Implementation of Gray Scale JPEG CODEC on Spartan-3E. Tikrit Journal of Engineering Sciences 2017;24(3):18-25. DOI: https://doi.org/10.25130/tjes.24.2017.27

Pujiono IP, Rachmawanto EH, Nugroho DA. The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images. Journal of Applied Intelligent System 2023;8(1):69-80. DOI: https://doi.org/10.33633/jais.v8i1.7324

Joseph H, Rajan BK. Image Security Enhancement Using DCT & DWT Watermarking Technique. 2020 International Conference on Communication and Signal Processing (ICCSP): IEEE; 2020. pp. 0940-0945. DOI: https://doi.org/10.1109/ICCSP48568.2020.9182052

Taha NA, Qasim Z, Al-Saffar A, Abdullatif AA. Steganography Using Dual Tree Complex Wavelet Transform with LSB Indicator Technique. Periodicals of Engineering and Natural Sciences 2021;9(2):1106-1114. DOI: https://doi.org/10.21533/pen.v9i2.2060

Wang J, Cheng M, Wu P, Chen B. A Survey on Digital Image Steganography. Journal of Information Hiding and Privacy Protection 2019; 1(2):87-93. DOI: https://doi.org/10.32604/jihpp.2019.07189

Singh A, Singh H. An Improved LSB Based Image Steganography Technique for RGB Images. 2015 IEEE International Conference on electrical, computer and communication technologies (ICECCT): IEEE; 2015. pp. 1-4. DOI: https://doi.org/10.1109/ICECCT.2015.7226122

Al-Shaarani F, Gutub A. Securing Matrix Counting-Based Secret-Sharing Involving Crypto Steganography. Journal of King Saud University-Computer and Information Sciences 2022;34(9):6909-6924. DOI: https://doi.org/10.1016/j.jksuci.2021.09.009

Mistry D, Banerjee A. Discrete Wavelet Transform Using Matlab. International Journal of Computer Engineering & Technology (IJCET) 2013;4(2):252-259.

Fadhil AF. Formulation of Detection Strategies in Images: Southern Illinois University at Carbondale; 2014.

Hashim MM, Rahim MSM, Johi FA, Taha MS, Hamad HS. Performance Evaluation Measurement of Image Steganography Techniques with Analysis of LSB Based on Variation Image Formats. International Journal of Engineering & Technology 2018; 7(4) :3505-3514.

Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing 2004;13(4):600-612. DOI: https://doi.org/10.1109/TIP.2003.819861

Hodson TO. Root-Mean-Square Error (RMSE) or Mean Absolute Error (MAE): When to Use Them or Not. Geoscientific Model Development 2022; 15(14):5481-5487. DOI: https://doi.org/10.5194/gmd-15-5481-2022

Dalal M, Juneja M. Evaluation of Orthogonal and Biorthogonal Wavelets for Video Steganography. Information Security Journal: A Global Perspective 2020;29(1):40-50. DOI: https://doi.org/10.1080/19393555.2020.1714822

Bakurov I, Buzzelli M, Schettini R, Castelli M, Vanneschi L. Structural Similarity Index (SSIM) Revisited: A Data-Driven Approach. Expert Systems with Applications 2022; 189:116087. DOI: https://doi.org/10.1016/j.eswa.2021.116087

Similar Articles

You may also start an advanced similarity search for this article.