Research Article
Open access
Published on 25 October 2024
Download pdf
Ye,J. (2024). Advancements in Spatial Domain Image Steganography: Techniques, Applications, and Future Outlook. Applied and Computational Engineering,94,6-19.
Export citation

Advancements in Spatial Domain Image Steganography: Techniques, Applications, and Future Outlook

Jiajun Ye *,1,
  • 1 Aberdeen Institute of Data Science and Artificial Intelligence, South China Normal University, Guangzhou, China

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2755-2721/94/2024MELB0058

Abstract

Image steganography, a technique for transmitting secret information hidden within images over public networks undetected, serves as a discreet alternative to cryptography in the field of information security. This article explores new steganography techniques based on the Least Significant Bit (LSB) method, widely recognized for its simplicity in embedding secret data by altering the least significant bit of pixels in the spatial domain. The performance of these LSB-based methods is critically assessed using criteria such as Peak Signal-to-Noise Ratio (PSNR), embedding capacity, and histogram analysis. A comprehensive review of recent literature provides a foundation for this evaluation, highlighting advancements and identifying areas for future improvement. Additionally, the article discusses practical applications of LSB-based steganography in healthcare, government operations, and cloud storage, suggesting directions for further research and development in this subtly powerful area of data security.

Keywords

Data hiding, image steganography, LSB.

[1]. Doshi R, Jain P, Gupta L 2012 Steganography and its applications in security International Journal of Modern Engineering Research (IJMER) 2(6) 4634–4638

[2]. Nisha C D, Monoth T 2020 Analysis of spatial domain image steganography based on pixel-value differencing method Soft Computing for Problem Solving: SocProS 2018 Volume 2 ed Springer Singapore pp 385–397

[3]. Simmons G J 1984 The prisoners’ problem and the subliminal channel Advances in Cryptology: Proceedings of Crypto 83 ed Springer US pp 51–67

[4]. Alhomoud A M 2021 Image steganography in spatial domain: Current status, techniques, and trends Intelligent Automation & Soft Computing 27(1)

[5]. Ley M 2002 The DBLP computer science bibliography: Evolution, research issues, perspectives International symposium on string processing and information retrieval ed Springer Berlin Heidelberg pp 1–10

[6]. Maji G, Mandal S, Sen S, Debnath N C 2018 Dual image based LSB steganography 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom) ed IEEE pp 61–66

[7]. Zhu X, Huang Y, Wang X, Wang R 2023 Emotion recognition based on brain-like multimodal hierarchical perception Multimedia Tools and Applications 1-19

[8]. Singh A K, Singh J, Singh H V 2015 Steganography in images using LSB technique International Journal of Latest Trends in Engineering and Technology (IJLTET) 5(1) 426–430

[9]. Bandekar P P, Suguna G C 2018 LSB based text and image steganography using AES algorithm 2018 3rd International Conference on Communication and Electronics Systems (ICCES) ed IEEE pp 782–788

[10]. Bhuiyan T, Sarower A H, Karim R, Hassan M 2019 An image steganography algorithm using LSB replacement through XOR substitution 2019 International Conference on Information and Communications Technology (ICOIACT) ed IEEE pp 44–49

[11]. Zhu X, Guo C, Feng H, Huang Y, Feng Y, Wang X, Wang R 2024 A Review of Key Technologies for Emotion Analysis Using Multimodal Information Cognitive Computation 1-27

[12]. Ahmed A, Ahmed A 2020 A secure image steganography using LSB and double XOR operations International Journal of Computer Science and Network Security 20(5) 139–144

[13]. Prasad S, Pal A K 2019 Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018 Volume 3 ed Springer Singapore pp 203–214

[14]. Jung K H 2018 Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane Journal of Real-Time Image Processing 14 127–136

[15]. Singh S 2020 Adaptive PVD and LSB based high capacity data hiding scheme Multimedia Tools and Applications 79 18815–18837

[16]. Farrag S, Alexan W 2019 Secure 2d image steganography using recamán's sequence 2019 International Conference on Advanced Communication Technologies and Networking (CommNet) ed IEEE pp 1–6

[17]. Anwar F, Rachmawanto E H, Sari C A 2019 StegoCrypt scheme using LSB-AES base64 2019 International Conference on Information and Communications Technology (ICOIACT) ed IEEE pp 85–90

[18]. Ogundokun R O, Abikoye O C 2021 A safe and secured medical textual information using an improved LSB image steganography International Journal of Digital Multimedia Broadcasting 2021(1) 8827055

[19]. Halder T, Karforma S, Mandal R 2019 A block-based adaptive data hiding approach using pixel value difference and LSB substitution to secure e-governance documents Journal of Information Processing Systems 15(2) 261–270

[20]. Wang R, Zhu J, Wang S, Wang T, Huang J, Zhu X 2024 Multi-modal emotion recognition using tensor decomposition fusion and self-supervised multi-tasking International Journal of Multimedia Information Retrieval 13(4) 39

[21]. Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A 2021 Image steganography: A review of the recent advances IEEE Access 9 23409–23423

[22]. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik S W 2016 A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image Multimedia Tools and Applications 75 14867–14893

Cite this article

Ye,J. (2024). Advancements in Spatial Domain Image Steganography: Techniques, Applications, and Future Outlook. Applied and Computational Engineering,94,6-19.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of CONF-MLA 2024 Workshop: Securing the Future: Empowering Cyber Defense with Machine Learning and Deep Learning

Conference website: https://2024.confmla.org/
ISBN:978-1-83558-633-4(Print) / 978-1-83558-634-1(Online)
Conference date: 21 November 2024
Editor:Mustafa ISTANBULLU, Ansam Khraisat
Series: Applied and Computational Engineering
Volume number: Vol.94
ISSN:2755-2721(Print) / 2755-273X(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).