SECURE IMAGE STEGANOGRAPHY USING GHM: HIDING TEXT IN PLAIN SIGHT

  • SARAH FAEQ ABDULLAH College of Engineering, University of Tikrit- Iraq
  • and SHAHIR FLEYEH NAWAF College of Engineering, University of Tikrit- Iraq
Keywords: Discrete wavelet transforms; Hiding Information; Least Significant Bit; GHM (Geronimo, Hardian,and Massopust ) multiwavelet; Peak signal-to-noise ratio.

Abstract

Steganography is a method for concealing confidential information in digital images in a way that is imperceptible to humans. However, existing steganographic techniques are frequently vulnerable to assaults such as steganalysis, which can detect the presence of hidden data. The purpose of this work is to develop a method for securely embedding text data within images while minimizing the visual impact on the carrier image. This research paper introduces an efficient method for image steganography by leveraging the GHM GHM(Geronimo-Hardin-Massopust) multiwavelet transform and n-bit Least Significant Bit (LSB) techniques. The proposed algorithm consists of three stages and for six different cases according to the altering of n- bits of the Least Significant Bit (LSB) embedding algorithm. Quality and safety of the stego-images were evaluated by   experimental evaluations using metrics like Peak signal-to-noise ratio(PSNR), Root Mean Square Error (RMSE), and Structural Similarity Index Measure(SSIM). The results consistently demonstrated advantages of the suggested algorithm in terms of Peak signal-to-noise ratio(PSNR) about 24% improvement over the Least Significant Bit (LSB) techniques and 17% improvement over the the DWT (Discrete Wavelet Transform),also in terms of the Root Mean Square Error (RMSE), about 78% improvement over the Least Significant Bit (LSB) techniques and 67% improvement over the the DWT (Discrete Wavelet Transform) in average. The proposed approach significantly enhanced image quality while maintaining a high level of resemblance to the original image, showcasing its efficacy in preserving the underlying structure of the cover image.

 

 

 

Downloads

Download data is not yet available.

References

Abuali, M. S., Rashidi, C., Salih, M. H., Raof, R., & Hussein, S. S. (2019). Digital Image Steganography in Spatial Domain a Comprehensive Review. Journal of Theoretical and Applied Information Technology, 97(19).
Agreste, S., & Vocaturo, A. (2009). Wavelet and multichannel wavelet based watermarking algorithms for digital color images. Communications to SIMAI Congress,
Al-Aidroos, N. M., & Bahamish, H. A. (2019). Image steganography based on LSB matching and image enlargement. 2019 First International Conference of Intelligent Computing and Engineering (ICOICE),
Alwan, I. M. (2014). Image steganography by using multiwavelet transform. Baghdad Sci J, 11(2), 275-283.
Awadh, W. A., Alasady, A. S., & Hamoud, A. K. (2022). Hybrid information security system via combination of compression, cryptography, and image steganography. International Journal of Electrical and Computer Engineering, 12(6), 6574.
Çataltaş, Ö., & Tütüncü, K. (2017). Comparison of LSB image steganography technique in different color spaces. 2017 international artificial intelligence and data processing symposium (IDAP),
Deivalakshmi, S., Palanisamy, P., & Gao, X. (2019). Balanced GHM Mutiwavelet Transform Based Contrast Enhancement Technique for Dark Images Using Dynamic Stochastic Resonance. Intelligent Automation & Soft Computing, 25(3).
Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333-17373.
Geronimo, J. S., Hardin, D. P., & Massopust, P. R. (1994). Fractal functions and wavelet expansions based on several scaling functions. Journal of approximation theory, 78(3), 373-401.
Gulati, S., Bashir, A., & Mir, A. H. (2022). COMPARATIVE STUDY OF LSB AND DWT BASED STEGANOGRAPHY COMBINED WITH ARNOLD TRANSFORMATION FOR IMAGE SECURITY. Journal of Information System Security, 18(1).
Gutub, A., & Al-Shaarani, F. (2020). Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arabian Journal for Science and Engineering, 45(4), 2631-2644.
Hussein, M. K., & Alhijaj, A. A. (2023). Protection of images by combination of vernam stream cipher, AES, and LSB steganography in a video clip. Bulletin of Electrical Engineering and Informatics, 12(3), 1578-1585.
Joseph, H., & Rajan, B. K. (2020). Image security enhancement using DCT & DWT watermarking technique. 2020 International Conference on Communication and Signal Processing (ICCSP),
Kunhoth, J., Subramanian, N., Al-Maadeed, S., & Bouridane, A. (2023). Video steganography: recent advances and challenges. Multimedia Tools and Applications, 1-43.
Li, M., Ke, L., Wang, L., Deng, S., & Yu, X. (2023). A novel hybrid gene selection for tumor identification by combining multifilter integration and a recursive flower pollination search algorithm. Knowledge-Based Systems, 262, 110250.
Maurya, S., Nandu, N., Patel, T., Reddy, V. D., Tiwari, S., & Morampudi, M. K. (2023). A discrete cosine transform-based intelligent image steganography scheme using quantum substitution box. Quantum Information Processing, 22(5), 206.
Mohamed, M. H., Mofaddel, M. A., El-Naser, A., & Tarek, Y. (2023). Comparison Study Between Simple LSB and Optimal LSB Image Steganography. Sohag Journal of Sciences, 8(1), 29-33.
Rajendran, S., & Doraipandian, M. (2017). Chaotic map based random image steganography using lsb technique. Int. J. Netw. Secur., 19(4), 593-598.
Rathika, S., & Gayathri, R. (2023). An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1-18.
Ren, S., Feng, Q., & Wang, M. (2022). Multi-Carrier Information Hiding Algorithm Based on GHM Multiwavelet Transform and Singular Value Decomposition. Proceedings of the 6th International Conference on Advances in Image Processing,
Ren, S., Zhang, T., Wang, M., & Shahzad, K. (2020). Identifiable tampering multi-carrier image information hiding algorithm based on compressed sensing. IEEE Access, 8, 214992-215009.
Rustad, S., Syukur, A., & Andono, P. N. (2022). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University-Computer and Information Sciences, 34(6), 3559-3568.
Strela, V. (1996). Multiwavelets--theory and applications Massachusetts Institute of Technology].
Sun, H., He, Z., Zi, Y., Yuan, J., Wang, X., Chen, J., & He, S. (2014). Multiwavelet transform and its applications in mechanical fault diagnosis–a review. Mechanical Systems and Signal Processing, 43(1-2), 1-24.
Zebari, R., Abdulazeez, A., Zeebaree, D., Zebari, D., & Saeed, J. (2020). A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction. Journal of Applied Science and Technology Trends, 1(2), 56-70.
Published
2023-12-24
How to Cite
ABDULLAH , S. F., & NAWAF , and S. F. (2023). SECURE IMAGE STEGANOGRAPHY USING GHM: HIDING TEXT IN PLAIN SIGHT. Journal of Duhok University, 26(2), 565 - 577. https://doi.org/10.26682/csjuod.2023.26.2.51