Abstract
A secure and efficient image steganography algorithm is proposed in this paper that uses block-wise indexing and LSB embedding. First, the cover image is divided into blocks of size 4 × 4. Blocks are classified as embedding blocks (E-Blocks) and index blocks (I-Blocks). Here, the 3-bit LSB substitution scheme is applied. The secret bits are matched with the least significant bits of the row pixels of the image, and the index values of those pixels are saved separately. In case of a mismatch, the secret bits are embedded in default pixels. The effectiveness of the proposed scheme is increased because the approach involves fewer changes to the cover image and does not use any deterministic extraction technique using indexing. The experimental results carried out by implementing the proposed scheme on various images of sizes ranging from 64 × 64 pixels to 512 × 512 pixels revealed that it produces high-quality images and efficient extraction. In the case of gray-scale images, the average PSNR, SSIM, and UIQI measures were found to be 55.64583 dB, 0.99869, and 0.99800, respectively, whereas for color images, their values turned out to be 49.19303 dB, 0.99209, and 0.99671. Overall, the presented technique provides an effective compromise between embedding capacity, invisibility, and robustness, thus being a good choice for secure image transmission applications.
References
- Das, Rig, and Themrichon Tuithung. "A Novel Steganography Method for Image Based on Huffman Encoding." In 2012 3rd national conference on emerging trends and applications in computer science, IEEE, 2012, 14-18.
- Por, Lip Yee, Delina Beh Yin, Tan Fong Ang, and Sim Ying Ong. "An Enhanced Mechanism for Image Steganography Using Sequential Colour Cycle Algorithm." Int. Arab J. Inf. Technol. 10, no. 1 (2013): 51-60.
- Khandelwal, Pulkit, and Neha Bisht. "Randomly Hiding Secret Data Using Dynamic Programming for Image Steganography." In 2015 International Conference on Computing and Network Communications (CoCoNet), IEEE, 2015, 777-783.
- Zhang, Ru, Shiqi Dong, and Jianyi Liu. "Invisible Steganography via Generative Adversarial Networks." Multimedia tools and applications 78, no. 7 (2019): 8559-8575.
- Ogras, Hidayet. "An Efficient Steganography Technique for Images Using Chaotic Bitstream." International Journal of Computer Network and Information Security 12, no. 2 (2019): 21.
- Mahana, Sumit Kumar, and Rajesh Kumar Aggarwal. "Image Steganography: Analysis & Evaluation of Secret Communication." In proceedings of international conference on sustainable computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India. 2019.
- Siddiqui, Ghazanfar Farooq, Muhammad Zafar Iqbal, Khalid Saleem, Zafar Saeed, Adeel Ahmed, Ibrahim A. Hameed, and Muhammad Fahad Khan. "A Dynamic Three-Bit Image Steganography Algorithm for Medical And E-Healthcare Systems." IEEE Access 8 (2020): 181893-181903.
- Eyssa, Asmaa Abdelmonem, Fathi Elsaid Abdelsamie, and Abdelaziz Elsaid Abdelnaiem. "An Efficient Image Steganography Approach Over Wireless Communication System." Wireless personal communications 110, no. 1 (2020): 321-337.
- Liu, Qiang, Xuyu Xiang, Jiaohua Qin, Yun Tan, and Yao Qiu. "Coverless Image Steganography Based on DenseNet Feature Mapping." EURASIP Journal on Image and Video Processing 2020, no. 1 (2020): 39.
- Li, Mingjie, Zichi Wang, Haoxian Song, and Yong Liu. "Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network." Security and Communication Networks 2021, no. 1 (2021): 2356284.
- Sivaramakrishnan, Upasana, Namrata Panga, and G. K. Rajini. "Image Steganography based on Fractional Random Wavelet Transform and Arnold Transform with Cryptanalysis." In 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), IEEE, 2021, 618-623.
- Kamil, Samar, Siti Norul Huda Sheikh Abdullah, Mohammad Kamrul Hasan, and Farah Aqilah Bohani. "Enhanced Flipping Technique to Reduce Variability in Image Steganography." IEEE Access 9 (2021): 168981-168998.
- Sravani, S., and R. Raniith. "Image Steganography for Confidential Data Communication." In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, 2021, 01-05.
- Shunnar, Majd, Amaal Othman, and Ahmed Awad. "A Study to Improve Image Steganography Using Linear Feedback Shift Register." In 2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM), IEEE, 2022, 344-348.
- Ahmad, Mostafa A., Mourad Elloumi, Ahmed H. Samak, Ali M. Al-Sharafi, Ali Alqazzaz, Monir Abdullah Kaid, and Costas Iliopoulos. "Hiding Patients’ Medical Reports Using an Enhanced Wavelet Steganography Algorithm in DICOM Images." Alexandria Engineering Journal 61, no. 12 (2022): 10577-10592.
- Meng, Yanger, and Jingtao Li. "Image Steganography of Convolutional Neural Network Based on Neural Architecture Search." (2022).
- Patel, Anilkumar, and Daxa Vekariya. "Randomly Hiding Secret Data Using I-Blocks and E-Blocks for Image Steganography." In Futuristic Trends in Networks and Computing Technologies: Select Proceedings of Fourth International Conference on FTNCT 2021, Singapore: Springer Nature Singapore, 2022, 375-390.
- Ye, Hanmin, Keqin Su, Xiaohui Cheng, and Shiming Huang. "Research on Reversible Image Steganography of Encrypted Image Based on Image Interpolation and Difference Histogram Shift." IET Image Processing 16, no. 7 (2022): 1959-1972.
- Patel, Anil Kumar, and Daxa Vekariya. "A Literature Review on Image Quality and Embedding Payload for Image Steganography." In AIP Conference Proceedings, vol. 2855, no. 1, AIP Publishing LLC, 2023, 060018.
- Jebur, Sabah Abdulazeez, Abbas Khalifa Nawar, Lubna Emad Kadhim, and Mothefer Majeed Jahefer. "Hiding Information in Digital Images Using LSB Steganography Technique." International Journal of Interactive Mobile Technologies 17, no. 7 (2023).
- Alanzy, May, Razan Alomrani, Bashayer Alqarni, and Saad Almutairi. "Image Steganography Using LSB and Hybrid Encryption Algorithms." Applied Sciences 13, no. 21 (2023): 11771.
- Zheng, Ziqiang, Yuanmeng Hu, Yi Bin, Xing Xu, Yang Yang, and Heng Tao Shen. "Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision." IEEE Transactions on Neural Networks and Learning Systems 34, no. 11 (2022): 9451-9465.
- Yang, Jianhua, Fei Shang, Yi Liao, and Yifang Chen. "Toward High Capacity and Robust Jpeg Steganography Based on Adversarial Training." Security and Communication Networks 2023, no. 1 (2023): 3813977.
- Shmueli, Ron, Divya Mishra, Tal Shmueli, and Ofer Hadar. "A Novel Technique for Image Steganography Based on Maximum Energy Seam." Multimedia Tools and Applications 83, no. 28 (2024): 70907-70920.
- EL-Hady, Mohamed, Maha H. Abbas, Farooq A. Khanday, Lobna A. Said, and Ahmed G. Radwan. "DISH: Digital Image Steganography Using Stochastic-Computing with High-Capacity." Multimedia Tools and Applications 83, no. 25 (2024): 66033-66048.
- Li, Li, Xinpeng Zhang, Kejiang Chen, Guorui Feng, Deyang Wu, and Weiming Zhang. "Image Steganography and Style Transformation Based on Generative Adversarial Network." Mathematics 12, no. 4 (2024): 615.
- Yanuar, Muhammad Rafly, Suryadi MT, Catur Apriono, and Muhammad Firdaus Syawaludin. "Image-to-Image Steganography with Josephus Permutation and Least Significant Bit (LSB) 3-3-2 Embedding." Applied Sciences 14, no. 16 (2024): 7119.
- Jayapandiyan, Jagan Raj, C. Kavitha, and K. Sakthivel. "Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization." IEEE Access 8 (2020): 136537-136545.
- Wahab, Osama Fouad Abdel, Ashraf AM Khalaf, Aziza I. Hussein, and Hesham FA Hamed. "Hiding Data Using Efficient Combination of RSA Cryptography, And Compression Steganography Techniques." IEEE access 9 (2021): 31805-31815.
- Solak, Serdar. "High Embedding Capacity Data Hiding Technique Based on EMSD and LSB Substitution Algorithms." IEEE Access 8 (2020): 166513-166524.
- Chuang, Yun-Hsin, Bor-Shing Lin, Yan-Xiang Chen, and Hung-Jr Shiu. "Steganography in RGB Images Using Adjacent Mean." IEEE access 9 (2021): 164256-164274.
- Kanimozhi, R., and V. Padmavathi. "Robust and Secure Image Steganography with Recurrent Neural Network and Fuzzy Logic Integration." Scientific Reports 15, no. 1 (2025): 13122.
- Zhou, Yiqiao, Na Wang, Xiaolong Hong, Yanchun Peng, and Shuo Shao. "Deep Learning-Based Image Steganography with Latent Space Embedding and Smart Decoder Selection." Entropy 27, no. 12 (2025): 1223.
- Malik, Kaleem Razzaq, Muhammad Sajid, Ahmad Almogren, Tauqeer Safdar Malik, Ali Haider Khan, Ayman Altameem, Ateeq Ur Rehman, and Seada Hussen. "A Hybrid Steganography Framework Using DCT and GAN for Secure Data Communication in the Big Data Era." Scientific Reports 15, no. 1 (2025): 19630.
- Ambika, Virupakshappa, and Deepak S. Uplaonkar. "Deep Learning-Based Coverless Image Steganography on Medical Images Shared via Cloud." Engineering Proceedings 59, no. 1 (2024): 176.
- Rahman, Shahid, Jamal Uddin, Hameed Hussain, Sabir Shah, Abdu Salam, Farhan Amin, Isabel de la Torre Díez, Debora Libertad Ramirez Vargas, and Julio Cesar Martinez Espinosa. "A Novel and Efficient Digital Image Steganography Technique Using Least Significant Bit Substitution." Scientific Reports 15, no. 1 (2025): 107.
- https://www.kaggle.com/datasets
- Vasoya, Daxa L., Vipul M. Vekariya, and P. P. Kotak. "Novel Approach for Image Steganography Using Classification Algorithm." In 2018 2nd international conference on inventive systems and control (ICISC), IEEE, 2018, 1079-1082.
- Siddhpura, Akash, and V. Vekariya. "An Approach of Privacy Preserving Data Mining Using Perturbation & Cryptography Technique." International Journal on Future Revolution in Computer Science & Communication Engineering 4 (2018): 255-259.

Journal of Innovative Image Processing