1 s2.0 S2772918424000353 Main
1 s2.0 S2772918424000353 Main
An effective steganographic technique for hiding the image data using the
LSB technique
Rasmita Panigrahi, Neelamadhab Padhy∗
School of Engineering and Technology, Dept. of Computer Science and Engineering, GIET University, Gunupur, Gobriguda, Odisha, India
a r t i c l e i n f o a b s t r a c t
Keywords:                                                  Steganography is the art and science of writing secret messages so that neither the sender nor the intended
Steganographic techniques                                  recipient knows there is a hidden message. Data hiding is the art of hiding data for various reasons, such as keeping
Encode, Decode                                             private data, secure, confidential data, etc. With increasing data exchange over a computer network, information
Least significant bits
                                                           security has become a significant issue. There are many methods used for data hiding, and steganography is a
Stego image watermarking
                                                           well-known technique. Steganography is the art of invisible contact and science. Steganography is the process
QR Code
Embedding                                                  through which the presence of a message can be kept secret. The objective of this paper is to hide data using
                                                           the LSB (Least Significant Bit) technique into images that can be detected only by the specified user. We have
                                                           developed a user-friendly GUI such that it can be used with the utmost ease. This paper is motivated to hide the
                                                           message stated by the user in the dialog box given within the picture. The secret text is converted to the ciphertext
                                                           to make it more stable. The sender selects the cover image, and it is used to generate the secured Stegno image,
                                                           which is identical to the cover image. With the support of a private or public communication network, on the
                                                           other hand, the stegno image can be saved and sent to the designated user, i.e., the recipient downloads the
                                                           stegno image and can retrieve the secret text concealed in the stegno image using that same application. As for
                                                           the watermarking, we have visible and invisible we have used the same LSB technique. In visible watermarking,
                                                           text or image is embedded in the cover image, which can be noticed easily. As for invisible watermarking, some
                                                           specific text is inserted into an image, and while retrieving it, it generates a QR code, which can be scanned to
                                                           get the watermarked text. We used the three different types of cover images i.e. Gray, and RGB also estimated
                                                           the performance metrics. SNR, MSE, and PSNR the three performance metrics are used, and found that PSNR
                                                           achieved good results i.e.,71.4733. The RGB image with the hidden text is achieved up to 77.6697
1. Introduction                                                                                 the listener cannot hear the masked quieter tone. The primary goal of
                                                                                                steganography is to facilitate secret communication in an organization
    The growth of electronics has led to the digitization of all documen-                       or between two users. An anonymous person cannot access the informa-
tation, videos, and audio. This scenario has increased the need for the                         tion by having a look at the cover file. Steganography is different from
security and reliability of documents, audio, or videos to maintain pri-                        cryptography. It is employed to hide the data inside another cover ob-
vacy, avoid piracy, and mass production reproduction. This varies from                          ject, whereas, in cryptography, data is encrypted. If the information is
organization to organization or individual to individual. Cryptography                          extracted in cryptography, then the exact data would again be difficult
and steganography are used to achieve the above requirements. Today’s                           to obtain.
digital media provides reliable and easy ways to edit data, and these data                          Cryptology is the way to send the encrypted message further needs
are needed to be delivered safely over a secure network. Steganography                          to be decrypted in the form of the original. Since the attacker would not
is a process of hiding data in the bits of cover objects like a graphic or an                   recognize the hidden message during a communication, this mechanism
audio file. Steganography provides a safe way to communicate privately                           ensures confidentiality.
because the presence of information in the cover item is challenging to                             However, the unreadable type can alert adversaries to the fact that
detect. Media files are suitable for steganography due to their large size.                      a hidden communication is taking place, making the data vulnerable to
Data can be inserted into a file using human perception. The audio file                           active attacks such as data blocking or alteration. As a result, steganog-
uses frequency masking on the tones with the same frequencies, and                              raphy mechanisms have been introduced as a way to get around the lim-
https://doi.org/10.1016/j.csa.2024.100069
Received 6 May 2024; Received in revised form 13 July 2024; Accepted 2 August 2024
Available online 14 August 2024
2772-9184/© 2024 The Authors. Publishing Services by Elsevier B.V. on behalf of KeAi Communications Co., Ltd. This is an open access article under the CC
BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
R. Panigrahi and N. Padhy                                                                                            Cyber Security and Applications 3 (2025) 100069
itations of encryption techniques. Steganography is the process of em-             issues. Swain, G. et al. [11] proposed an algorithm that allows han-
bedding hidden data into a cover medium to create a stego medium. The              dling high-capacity stegno images which is the LSB technique. Their
stego medium must be made to look exactly like the cover medium.et                 approach is to divide the image into non-overlapped 3 × 3-pixel blocks
al., [13] used the DCT technique in steganography. They exhibited the              after they have used the LSB technique for every block subsequently.
correlation and concluded, that if the correlation is high then proved the         Nolkha, A. [12] has done a systematic literature survey. They mainly
stronger compaction. They discussed more about the data hidden con-                focus on how LSB is used in the stegoimage. They have taken a color
cept. They also discussed how segmentation helpful for steganography               image because it holds a large amount of secret data. Speech steganog-
    Major Contribution:                                                            raphy techniques are divided into two categories based on the hiding
                                                                                   domain: time-domain schemes and frequency-domain schemes. Secret
1. We have developed an LSB-based steganographic technique                         messages are encoded in time-domain speech samples in a time-domain
2. Created one GUI-based application and Outlined the process of hid-              scheme. On the other hand, frequency-domain systems embed the hid-
   ing a user-specified message within an image, converting it into ci-             den message in a specific part of the speech signal’s frequency spectrum.
   pher text for enhanced security, and generating a stegno image that             Several speech concealment systems have recently been published in the
   appears identical to the original cover image.                                  literature [14-16].
3. Described properly the process of securely transmitting the stegno
   image over private or public communication networks to the desig-
                                                                                   3. Steganography and types
   nated recipient, who can then retrieve the hidden message using the
   same application.
                                                                                      Steganography attempts to hide information in the covering data in
4. Used the performance metrics, with results demonstrating high im-
                                                                                   such a way that non-participating persons can not recognize the pres-
   age quality retention.
                                                                                   ence of this information by analyzing the detection of data. In contrast
   This article contains 8 sections. Section 1 provides a details back-            to watermarking, steganography is not intended to prevent opponents
ground of steganography and their insights. Sections 2 and 3 dis-                  from removing or changing the hidden message found in the cover data
cuss the state-of-the-art of steganography and its types. Sections 4 and           from the secret material. Still, it emphasizes that it is steganography is
5 give the outline of the digital watermarking system and its procedure.           especially essential for applications where confidential information can
Section 6 discusses how the system is designed for the application and             not be encrypted to secure communication.
Section 7 explained briefly the algorithms required to be developed for
the application. Sections 8 and 9 discussed the system design and per-             3.1. Text steganography
formance metrics evaluation
                                                                                       It is a steganography process where information is concealed in text
2. Literature review                                                               files. The data is hidden by manipulating the spaces and tabs after nth
                                                                                   letters or nth lines. Text steganography is attained by changing the text’s
    Alma, Wardhani, et al. [1], have developed the program used to send            format or modifying the characteristics of the characters. This approach
the original bar code and generate the stegoimage barcode using the                aims to create change, which is reader-friendly and unnoticeable. These
least significant steganography technique. Such two images were com-                characteristics are a bit conflicting with each other. To achieve steganog-
pared and checked with performance metrics like MSE, RMSE, eans,                   raphy, various methods can be used for steganography, and these are
and PNR. Ramesh, M. et al. [2]. has developed the hybrid steganogra-                • Line-Shift Coding: A text file can be modified by vertically shifting
phy method, which allows reading the QR code and converting it into                   the positions of the lines to encode the file uniquely.
the discrete wavelet transformation form. In this article, they have used           • Word-Shift Coding: A text file can be modified by horizontally shift-
two different techniques; these are frequency domain encoding and de-                  ing the position of the words in each line to encode the file uniquely.
coding. Their objective was to hide the information. Chitradevi, B. et al.
[3]. discussed the data hiding techniques by using LSB steganography.
This paper presents a short idea for image steganography, which uses the           3.2. Image steganography
LSB algorithm to hide the data in an image. Zhu, J. et al. [4] have used
the deep learning technique for data hiding. They have discussed the                   Steganography technique in which information is hidden inside an
adversarial, which helps to improve the encoded image video appear-                image. The image used for protecting the data is called a cover image.
ance. The novel Convolutional Network is used to learn to encode a rich            In this technique, the intensities of the pixels are modified according to
by using invisible disturbance Relevant quantities of details. Bal, S.et al.       the secret data. In digital steganography, images are preferred to hide
[5]. discussed the image watermarking technique by using LSB and bit               data because it consist of many bits that digitally represent the image.
pair similarity. They have the symmetric key cryptography technique
for data security purposes. Jung, K. et al. [6]. discussed the method of           3.3. Ssteganography in image
hiding the data using the LSB technique also discussed a semi-reversible
data-hiding method. The LSB technique is used to insert secret data. Ba-               In image steganography, the secret message or data is hidden inside
matraf, A. et al. [7]. suggested a new kind of algorithm called embed-             the images by altering their visible properties. For example, the cover
ding and extraction. They have used peak signal-to-noise ratio (PSNR)              image can be modified in the noisy with color variations to remain un-
for reading the quality images. Duan, X. et al. [8] have discussed about           noticeable of the modifications. The Least Significant Bits(LSB) method
the PSNR and SSM. On their finding, they obtained values around 40 dB               is the most common method to alter the images, and it also consists
and 0.96                                                                           of processes like masking, filtering, and transformation. These methods
    They used both cryptography and deep neural network techniques                 are used according to image quality. Image steganography is performed
to enhance image steganography. Pichardo-Méndez et al. [9] studied                 for images in such a way that the embedded data can be retrieved eas-
the LSB mechanism to hide the information from the digital image. The              ily. Image steganography refers to embedding data, i.e., text, images,
author YiZhang et al., [10]. They have used the proposed algorithm                 or audio or video files. Our project aims to use image steganography
where more statistical inference is used. They have discussed how the              to use spatial domain techniques to achieve text hiding and visible and
stego image suffers during JPEG compression. Due to this reason, they               invisible watermarking. Only a particular decoding technique will re-
have developed a methodology called “compression-resistant Domain                  trieve the secret message. Python incorporates both the encoding and
Constructing + RS-STC Codes, “ which resolves the JPEG compression                 decoding techniques.
                                                                               2
R. Panigrahi and N. Padhy                                                                                            Cyber Security and Applications 3 (2025) 100069
5.2. Decoding
   The below-mentioned Fig. 2 shows that the original image will be                7. BRIEF algorithm implementation
converted into the watermarked image with the help of the embedding
procedure. The Figure below describes the watermark encoding process:              7.1. Least significant bit (LSB)
   Let us denote an image by I, a signature by S = {s1, s2, …sn} labeled
the watermarked image.                                                                The least significant bit is the most commonly used technique in
                                                                                   image steganography. LSB technique involves altering pixel intensities
                                                                                   by a small value, which results in a negligible change in the image,
                                                                                   which remains unnoticeable by the human eye.
                                                                                      There are two different methods to achieve image steganography:
                                                                                     • Spatial method
                                                                                     • Transform method
                                                                               3
R. Panigrahi and N. Padhy                                                                                                                  Cyber Security and Applications 3 (2025) 100069
Each pixel is 8 bits in the gray image, and for a color image, each pixel                         7.4. Decoding Procedure
is 24 bits. Our project is only applicable to colored images. The Human
Visual System cannot detect modifications of pixel intensities when the                            Table 2
least significant bit is modified. LSB is used as an advantage to hide                              Pseudocode For Encoding Procedure.
information in the image with minimum differences in the picture.                                     1. Extracting all the pixels from the stego image.
                                                                                                     2. Taking 3 pixels at a time and storing the LSB of each color in an array.
                                                                                                     3. Checking third-pixel LSBs. If it is 0 means, it is the end of the text message else
7.3. Encoding Procedure                                                                            continue to store the LSB in the array.
                                                                                                     4. After storing all the LSB values, it is transformed into a ciphertext character.
                                                                                                     5. Then the ciphertext is converted back to the original text using the same
Table 1                                                                                            previous key.
Pseudocode for encoding procedure.
                                                                                              4
R. Panigrahi and N. Padhy                                                                                                  Cyber Security and Applications 3 (2025) 100069
will not result in noticeable human differences because the change is              Cryptography) technique, the watermark is encrypted, which protects
very small. In this method, the bits of the pixels are used. Hence it is          against threats. The two different algorithms proposed for image en-
necessary to use a lossless compression format like PNG, or the embed-            cryption and decryption (Table 3).
ded information will be lost in the transformation.                                   At first, we have to add the plain text which is to be encrypted then
   Let 3 pixels are given below in the form 2D matrix; each pixel is of           we have to use the encryption algorithm (AES). So, that it converts the
24 bits.                                                                          plain text to the ciphertext, now we have to decrypt the message so
                                                                                  again we have to use the decryption algorithm so that it can convert the
    (01,100,111 11,100,001 11,001,100)                                            ciphertext into the plain text again and then send it to the receiver.In
    (00,101,111 11,000,000 10,101,001)                                            this context,confidentiality and data integrity are the important and its
    (11,010,000 00,100,001 11,111,001)                                            like as a safefuard against the unauthorised access and use.The two es-
                                                                                  sential things for data sequrities are cryptography and steganography.
   Character ‘A’, binary value equals 10,000,001, is inserted into the
                                                                                  The cryptography providesconceals the message existence and other
2D matrix of the 3 pixels, the following grid results:
                                                                                  technique is allowed to modity the contents . The data is encrypted
                                                                                  and sent after being converted into some other form of gibberish us-
    (01,100,111 11,100,000 11,001,100)
                                                                                  ing cryptography .In steganography, a picture file is delivered with data
    (00,101,110 11,000,000 10,101,000)
                                                                                  contained inside. This study emphasises how combining steganography
    (11,010,000 00,100,001 11,111,000)
                                                                                  and encryption techniques can improve the security of communication
    All the bits of ‘A’ are stored in the LSB of each color, but LSB of the       The above-mentioned (Figs. 7-9) means encryption and decryption tech-
third color of the third pixel is made 0, it acts as a delimiter, which           niques which are implemented and demonstrated. Using multiple layers
signifies the end of the message data. Only four bits are changed out of           of LSB embedding, such as multi-bit LSB, increases the security of the
72 bits to insert the character successfully in the above case. On average,       hidden data. However, it also makes the steganography more detectable
less than half of the bits are required alteration to embed the message           and can reduce the quality of the host image. Our analysis shows a bal-
in the cover image. The modification made to the LSB is too small to be            ance between security and image quality must be maintained (Figs. 5–
noticed by the human eye, so the message is hidden efficiently.                     9).
    For Example, Text=” Steganography” is embedded in the below
cover image:
                                                                                  Table 3
                            Fig. 5. Cover Image.
                                                                                  Proposed algorithm for watermarking.
    Several mechanisms exist for disseminating information in various              Proposed algorithm for watermarking
media. LSB coding is used to manipulate images or compression tech-                The required input: We will provide the grayscale image
nologies that affect image relations. Basic replacement systems attempt             1: Take the gray picture W.
to encode hidden information by substituting inconsequential portions              2: For every pixel (Pi) of W, produce the decimal value.
of the cover with secret message bits. If the receiver understands where           3: Determine the accurate binary representation for each Pi..
                                                                                   4: Invert the binary number Bv of 8 digits to get Rv.
the sensitive information is embedded, he can extract it. A passive at-
                                                                                   5: Find the Key (Ke) of a four-digit divisor.
tacker is unaware of the modest alterations made throughout the em-                6. Next divide the reversed Rv number with the Ke divider.
bedding process.                                                                   7: The rest and quotient are stored next in an 8-bit array. If necessary, add zeros to
    Incorporating the encryption algorithm in further, it enhances the             the left of the remaining bits and quotient bits to complete an 8-bit string.
                                                                                   Output: The proposed algorithm produces encrypted data (ED).
security of the proposed mechanism.By using the SKC (Symmetric Key
                                                                              5
R. Panigrahi and N. Padhy                                                                                           Cyber Security and Applications 3 (2025) 100069
   The above-mentioned Tables 4 and 5 are represented for proposed                 image generates the ciphertext with the help of a secret text message.
watermarking and decrypted watermarking algorithms                                 Then the ciphertext used the LSB technique to convert into a stegno
                                                                                   image. On the receiver side, the user needs to select the stegno image,
8. System design                                                                   then after the novel, the LSB decryption technique is used to transform
                                                                                   it into the ciphertext to get the secret text message. The above Fig. 10
8.1. Use case diagram                                                              is used for text hiding using a use case diagram.
    A Use Case Diagram is a representation of user interaction with the            8.2. Invisible watermarking
system. When retrieving, the user selects the stego image after initially
selecting the cover image, which is transformed into a stegno image.                  The user selects the cover image at the beginning, then from the
Then, decryption is applied to the segno image. From the cover image               cover image generates the text data to produce the QR code. The QR
to the stegno image, it has undergone several steps. First of all, the cover       code is used for invisible watermark implementation purposes. Finally,
                                                                               6
R. Panigrahi and N. Padhy                                                                                                              Cyber Security and Applications 3 (2025) 100069
8.3. Visible watermarking                                                                         The above equation Ω indicates the entire color image and the FSIM
                                                                                               can be represented as the RGB color.
    The below-mentioned Fig. 12 is used for Visible Watermarking. In                                     1 ∑          (      )
                                                                                               𝐹 𝑆𝐼𝑀 =        𝐹 𝑆𝐼 𝑀 𝑥0 , 𝑦0                                      (4)
this case, the user submits the data as a text or image. We have de-                                     𝑂 𝑜
                                                                                           7
R. Panigrahi and N. Padhy                                                                                                   Cyber Security and Applications 3 (2025) 100069
                                                                                   Table 6
                                                                                   Proposed embedding algorithm.
     ⎧                      ( )              (       )                                  ⎧                     ( )            (       )
     ⎪      𝑥𝑖′ 𝑖𝑓 𝑚𝑖 = 𝐿𝑆𝐵 𝑥𝑖 ,    𝑚𝑖+1 = 𝑓 𝑥𝑖, 𝑥𝑖+1 ,                                 ⎪ 𝑥𝑖+1, 𝑖𝑓 𝑚𝑖 = 𝐿𝑆𝐵 𝑥(𝑖 ,) 𝑚𝑖+1 = 𝑓 𝑥(𝑖, 𝑥𝑖+1 ,)
                            ( )              (       )
     ⎪      𝑥𝑖′ 𝑖𝑓 𝑚𝑖 = 𝐿𝑆𝐵 𝑥𝑖 ,    𝑚𝑖+1 ≠ 𝑓 𝑥𝑖, 𝑥𝑖+1 ,                                 ⎪𝑥      1, 𝑖𝑓 𝑚𝑖 = 𝐿𝑆𝐵 𝑥𝑖 , 𝑚𝑖+1 ≠ 𝑓 𝑥𝑖, 𝑥𝑖+1 ,
𝑦𝑖 = ⎨                     ( )              (            )               (6)       𝑦𝑖 = ⎨ 𝑖+1 ±             ( )            (             )                                (7)
     ⎪𝑥𝑖, − 1, 𝑖𝑓 𝑚𝑖 ≠ 𝐿𝑆𝐵( 𝑥𝑖) ,   𝑚𝑖+1 = 𝑓 𝑥𝑖 − 1, 𝑥𝑖+1 ,
                                            (            )                              ⎪𝑥𝑖+1′ 𝑖𝑓 𝑚𝑖 ≠ 𝐿𝑆𝐵 (𝑥𝑖 ), 𝑚𝑖+1 = 𝑓 (𝑥𝑖 − 1, 𝑥𝑖+1 ),
     ⎪ 𝑥𝑖, + 1, 𝑖𝑓 𝑚𝑖 ≠ 𝐿𝑆𝐵 𝑥𝑖 ,    𝑚𝑖+1 ≠ 𝑓 𝑥𝑖 − 1, 𝑥𝑖+1 ,                             ⎪𝑥𝑖+1′ 𝑖𝑓 𝑚𝑖 ≠ 𝐿𝑆𝐵 𝑥𝑖 , 𝑚𝑖+1 ≠ 𝑓 𝑥𝑖 − 1, 𝑥𝑖+1 ,
     ⎩                                                                                  ⎩
                                                                               8
R. Panigrahi and N. Padhy                                                                                                                  Cyber Security and Applications 3 (2025) 100069
                                            Table 7
                                            Characters of the two approaches are compared.
                                            The following terminology is used in the above-mentioned table and represented below as
                                            follows:
                                            H: High.
                                            L: Low.
                                            HH: Higher.
                                            The single (∗ ) represents depending on the cover image utilized and the double(∗ ∗ ) used
                                            the key as well as the random seed. During our test, we used a grayscale/RGB image as the
                                            cover image.
Table 8
Pseudo-random encodings PSNR.
         Table 9
         Least significant bits encoding PSNR.
                                                                                                 9
R. Panigrahi and N. Padhy                                                                                         Cyber Security and Applications 3 (2025) 100069
protection application, such as a Digital Certificate Document System.            9.1. Hiding the message and Extract the hidden message.
People can transfer their digital certificate data to any person in the
globe without risk of change, forgery, or tampering. Access Control Sys-
tem because we choose with whom we have to share our information.
Based on the current situation, digital content is increasingly circulat-
                                                                                   These are the following steps that we have done in our implemen-
ing, and we can cover our information for fair use by using the access
                                                                                   tation.
control mechanism by supplying an access key to extract information. E-                STEP 1: In the above implementation, we conceal our secret
commerce for the life insurance and banking sectors and Media, which               message and will make assured that it is properly encrypted so that
needs to be encrypted for data breaches and dealing with the customer’s            someone would want to extract the message from the image, he
privacy, is a severe concern of the institution, so here steganography             would not be able to decipher the secret message we have hidden.
comes in handy. Digital Watermarking, which may be visible or invis-               In order to construct our secret key, we will first start nano by
ible to the human eye, provides authentication for the originality of              typing nano file.txt, then pressing return, and then we will enter
the documents such as images and video. The reason behind using LSB                our secret key before exiting the program.
steganography is to efficiently embed the data with minimal distortion                   STEP 2: When we send our message, we’ll use the symmetric
                                                                                   key algorithm (as implemented by gpg), which will allow both the
as a comparison to other techniques like DCT or DWT.LSB provides a
                                                                                   sender and the recipient to use a single key for both encryption and
good balance of simplicity as well as computational efficiency of our                decryption.
application.
                                                                            10
R. Panigrahi and N. Padhy                          Cyber Security and Applications 3 (2025) 100069
                            11
R. Panigrahi and N. Padhy                                                                                        Cyber Security and Applications 3 (2025) 100069
                                                                                   The similarity between the original cover speech signal and the stego
       type gpg -c msg.txt to encrypt it.                                      speech signal that contains the hidden data is referred to as the consis-
       Step #3: It will prompt you for a password; simply type in the          tency attribute. The Mean Absolute Error (MAE) and the Mean Square
   one you like.                                                               Error (MSE) can be used to compare the similarity of two signals (MSE).
       Step #4: Uploading this encrypted message to a hosting server           In addition, a new metric, the Segmental Signal-to-Noise-Ratio, is used
   and then copying the downloading link to include it in our image
                                                                               in this paper to assess the accuracy of the stego signal (SNRSeg). The
   is how we accomplish this task.
                                                                               SNRSeg is a favored speech quality indicator that yielded more consis-
       Step#5: To decode the hidden information contained within
   the image                                                                   tent results than traditional quality indicators like the MSE and MAE.
       type decode –i “ IMG” -o “Target o/p format”                            The SNRSeg calculates the average of short segment Signal Noise Ratio
       Step#6: We have successfully extracted the file from the im-             (SNR) values. Calculating the difference between the two test signals
   age; now, it is time to read the information contained within it.           sample by sample yields the SNR.
       type cat msg.txt to read the file.
       Step#7: It is now necessary to decrypt the file that has been                          𝑀−1       𝑁 𝑚∑+𝑁 −1
                                                                                                                 (    ∑𝑁 2             )
                                                                                          10 ∑                           𝑖    𝑥 (𝑖)
   downloaded. This program will prompt us to enter a password,                𝑆𝑁𝑅𝑆𝑒𝑔   =        𝑙𝑜𝑔10             ∑𝑁      =1                               (9)
   after which we will receive our secret message.                                        𝑀 𝑚=0          𝑖=𝑁𝑚       𝑖=1 (𝑥(𝑖) − 𝑦(𝑖))
                                                                                                                                     2
                                                                                   The terms M and N are the number of segments and the length of
                                                                               segments, respectively.The SNRSeg has produced more consistent re-
   Identifying and extracting the hidden message Our recipient has suc-        sults than the standard SNR metric, especially for waveform encoders.
cessfully received the image file, and it is now time to expose the con-            This section is primarily used for the proposed methodology based on
cealed message contained within it.                                            the extraction process. It can also be possible to extract the signals when
                                                                          12
R. Panigrahi and N. Padhy                                                                                        Cyber Security and Applications 3 (2025) 100069
we provide the secret speech. We need to provide samples of speeches            it should be noted that the approach is only useful for JPG and PNG
to retrieve similar kinds of embedding types.                                   images as these require lossless compression techniques, as discussed
    Steps                                                                       above. It is also important to note that while steganography was once
    The same splitting threshold value used at the embedder is used to          undetected, with the various methods currently being used, it is easier
segment the obtained stego speech signal.                                       to detect the presence and easier to obtain.
√
    Each section is subjected to the DCT.
√
    Since the magnitude contains the hidden data, only the magnitude            Future scope
    of the DCT is extracted.
√
    To locate the hidden data, each segment is subjected to the 64-bit              Steganography could allow for avoiding inaccuracies in the printing
    quantization                                                                and scanning of media(data).: Can steganography be detected in image
                                                                                files? That is a severe issue. A simple steganographic technique can be
10. Conclusion                                                                  identified by merely analyzing the low-order bits of the bytes in the
                                                                                image. However, if the steganographic algorithm is more complicated
    It is observed that the results obtained in data hiding are very im-        and the embedded data is scattered over the image, this is random or
pressive through the LSB steganographic substitution process because            encrypts the information before embedding. Inline images are widely
it uses the simple fact that each image can be broken up into individ-          used by the World Wide Web (www). Globally, there are millions of
ual bitplanes, each consisting of different information levels. However,         pictures on different websites. An application can be created to act as a
                                                                           13
R. Panigrahi and N. Padhy                                                                                                                  Cyber Security and Applications 3 (2025) 100069
web browser to retrieve images embedded in the web page. This stego-                               [4] J. Zhu, R. Kaplan, J. Johnson, L. Fei-Fei, Hidden: hiding data with deep networks,
web will work on top of the current Website and could be a way of                                      in: Proceedings of the European conference on computer vision (ECCV), 2018,
                                                                                                       pp. 657–672.
transmitting information secretly. The proposed embedded algorithm is                              [5] S.N. Bal, M.R. Nayak, S.K. Sarkar, On the implementation of a secured watermark-
designed for gray-scale images for secret data in the embedding. Our                                   ing mechanism based on cryptography and bit pair matching, Journal of King Saud
application developed this proposed algorithm. In conclusion, the pro-                                 University-computer and information sciences, 2018.
                                                                                                   [6] K.H. Jung, K.Y. Yoo, A steganographic method based on interpolation and LSB sub-
posed LSB steganographic technique demonstrates high effectiveness in                                   stitution of digital images, Multimed. Tools. Appl. 74 (6) (2015) 2143–2155.
hiding image data, as evidenced by the presented PSNR values. This                                 [7] Bamatraf, A., Ibrahim, R., Salleh, M., & Mohd, N. (2011). A new digital watermark-
method can be effectively utilized in secure communication applica-                                     ing algorithm using a combination of least significant bit (LSB) and inverse bit. arXiv
                                                                                                       preprint arXiv:1111.6727.
tions, contributing to advancements in the field of cybersecurity and
                                                                                                   [8] X. Duan, D. Guo, N. Liu, B. Li, M. Gou, C. Qin, A new high capacity image steganog-
digital data protection.                                                                               raphy method combined with image elliptic curve cryptography and deep neural
                                                                                                       network, IEEe Access. 8 (2020) 25777–25788.
                                                                                                   [9] J.L.    Pichardo-Méndez,       L.    Palacios-Luengas,    R.F.    Martínez-González,
Declaration of competing interest
                                                                                                       O. Jiménez-Ramírez, R. Vázquez-Medina, LSB pseudorandom algorithm for
                                                                                                       image steganography using skew tent map, Arab. J. Sci. Eng. (2019) 1–20.
    The authors declare that they have no known competing financial                                [10] Y. Zhang, C. Qin, W. Zhang, F. Liu, X. Luo, On the fault-tolerant performance for a
interests or personal relationships that could have appeared to influence                               class of robust image steganography, Signal. Process. 146 (2018) 99–111.
                                                                                                  [11] G. Swain, Very high capacity image steganography technique using quotient value
the work reported in this paper.                                                                       differencing and LSB substitution, Arab. J. Sci. Eng. 44 (4) (2019) 2995–3004.
                                                                                                  [12] A. Nolkha, S. Kumar, V.S. Dhaka, Image steganography using lsb substitution: a com-
CRediT authorship contribution statement                                                               parative analysis on different color models, in: smart systems and iot: Innovations
                                                                                                       in computing, Springer, Singapore, 2020, pp. 711–718.
                                                                                                  [13] M. Baziyad, T. Rabie, I. Kamel, Achieving stronger compaction for dct-based
   Rasmita Panigrahi: Writing – original draft, Methodology, Concep-                                   steganography: a region-growing approach, in: World conference on information
tualization. Neelamadhab Padhy: Writing – review & editing, Method-                                    systems and technologies, Cham, Springer, 2020, pp. 251–261.
                                                                                                  [14] R. Sridevi, A. Damodaram, S.V.L. Narasimham, Efficient method of audio steganog-
ology, Investigation, Formal analysis.                                                                 raphy by modified lsb algorithm and strong encryption key with enhanced security,
                                                                                                       J. Theoret. Appl. Informat. Techn. 5 (6) (2009).
References                                                                                        [15] J. Liu, K. Zhou, H. Tian, Least-significant-digit steganography in low bit-rate speech,
                                                                                                       in: 2012 IEEE International Conference on Communications (ICC), IEEE, 2012,
                                                                                                       pp. 1133–1137.
 [1] R.W. Alma, Wardhani, S. Muhasyah, M Delina, The least significant bit of steganog-            [16] M.A. Ahmed, M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan, A novel embedding method to
     raphy method for digital data protection in the barcode, AIP conference proceedings,              increase capacity and robustness of low-bit encoding audio steganography technique
     2169, AIP Publishing LLC, 2019.                                                                   using noise gate software logic algorithm, J. Appl. Sci. 10 (1) (2010) 59–64.
 [2] M. Ramesh, G. Prabakaran, R. Bhavani, QR-code image steganography, in: Proceed-              [17] Q. Huang, W. Ouyang, Protect fragile regions in steganography LSB embedding, in:
     ings of the second international conference on emerging research in computing, in-                Proceedings of the 2010 3rd International symposium on knowledge acquisition and
     formation, communication, and applications, 2014.                                                 modeling (KAM), Wuhan, China, 2010, pp. 175–178.
 [3] B. Chitradevi, N. Thinaharan, M. Vasanthi, Data hiding using the least significant bit        [18] A review of data hiding in digital images by E Lin, E Delp center for education and
     steganography in digital images, Statistic. Approach. Multidisciplin. Res. 1 (2017)               research information assurance and security purdue university, west lafayette, IN
     144–150.                                                                                          47907-2086.
14