CFP last date
21 April 2025
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 21 April 2025

Submit your paper
Know more
Reseach Article

STEGASHIELD – A Multi-Technique Image Steganography for Enhanced Security and Undetectability

by Athira Varma Jayakumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 73
Year of Publication: 2025
Authors: Athira Varma Jayakumar
10.5120/ijca2025924603

Athira Varma Jayakumar . STEGASHIELD – A Multi-Technique Image Steganography for Enhanced Security and Undetectability. International Journal of Computer Applications. 186, 73 ( Mar 2025), 49-56. DOI=10.5120/ijca2025924603

@article{ 10.5120/ijca2025924603,
author = { Athira Varma Jayakumar },
title = { STEGASHIELD – A Multi-Technique Image Steganography for Enhanced Security and Undetectability },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2025 },
volume = { 186 },
number = { 73 },
month = { Mar },
year = { 2025 },
issn = { 0975-8887 },
pages = { 49-56 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number73/stegashield-a-multi-technique-image-steganography-for-enhanced-security-and-undetectability/ },
doi = { 10.5120/ijca2025924603 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-03-25T22:41:34.306109+05:30
%A Athira Varma Jayakumar
%T STEGASHIELD – A Multi-Technique Image Steganography for Enhanced Security and Undetectability
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 73
%P 49-56
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image steganography, the technique of concealing information within digital images, faces challenges in achieving both security and imperceptibility. This paper presents STEGASHIELD, a novel image steganography system that combines diverse techniques to enhance these critical aspects. STEGASHIELD employs random embedding of secret pixels, AES encryption of secret data, and false image embedding to achieve a high level of security. Imperceptibility is improved through new algorithms for optimal seed and position calculation, along with pixel-by-pixel analysis for minimal distortion. To counter histogram attacks, the research introduces a histogram preservation technique that compensates for tonal value losses resulting from secret image embedding. Experimental results demonstrate that STEGASHIELD significantly outperforms the plain LSB method in both imperceptibility and security, as evidenced by improved PSNR values and histogram comparison tests. This research contributes to the field of information hiding by providing a robust steganographic solution that effectively balances the dual requirements of security and undetectability in digital image steganography.

References
  1. Datta, Biswajita, Upasana Mukherjee, and Samir Kumar Bandyopadhyay. "LSB layer independent robust steganography using binary addition." Procedia Computer Science 85 (2016): 425-432.
  2. Swain, Gandharba. "Very high capacity image steganography technique using quotient value differencing and LSB substitution." Arabian Journal for Science and Engineering 44.4 (2019): 2995-3004.
  3. Senarathne, A., and Kasun De Zoysa. "ILSB: indexing with least significant bit algorithm for effective data hiding." Int J Comput Appl 161.5 (2017): 28-42.
  4. Tutuncu, Kemal, and Baris Demirci. "Adaptive LSB Steganography Based on Chaos Theory and Random Distortion." Advances in Electrical and Computer Engineering 18.3 (2018): 15-22.
  5. Gowda, Shreyank N., and Sumit Sulakhe. "Block Based Least Significant Bit Algorithm For Image Steganography." Annual Int'l Conference on Intelligent Computing, Computer Science & Information Systems (ICCSIS-16). 2016.
  6. Mukherjee, Srilekha, and Goutam Sanyal. "A multi level image steganography methodology based on adaptive PMS and block based pixel swapping." Multimedia Tools and Applications (2019): 1-16.
  7. Subong, Ryan A., Arnel C. Fajardo, and Yoon Joong Kim. "LSB Rotation and Inversion Scoring Approach to Image Steganography." 2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 2018.
  8. Astuti, Erna Zuni, et al. "Flipping the Message Bits to Increase Imperceptibility in the Least Significant Bit Image Steganography." Journal of Physics: Conference Series. Vol. 1201. No. 1. IOP Publishing, 2019.
  9. Susanto, Ajib, et al. "Dual Security Method for Digital Image using HBV Encryption and Least Significant Bit Steganography." Journal of Physics: Conference Series. Vol. 1201. No. 1. IOP Publishing, 2019.
  10. Abood, May H. "An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms." 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT). IEEE, 2017.
  11. Muhammad, Khan, et al. "CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method." Multimedia Tools and Applications 76.6 (2017): 8597-8626.
  12. Rustad, Supriadi, Abdul Syukur, and Pulung Nurtantio Andono. "Inverted LSB image steganography using adaptive pattern to improve imperceptibility." Journal of King Saud University-Computer and Information Sciences 34.6 (2022): 3559-3568.
  13. Ray, Atrayee Majumder, et al. "Hybrid Cryptography and Steganography Method to Provide Safe Data Transmission in IoT." International Conference on Data Analytics & Management. Singapore: Springer Nature Singapore, 2023.
  14. Ogiela, Marek R., and Katarzyna Koptyra. "False and multi-secret steganography in digital images." Soft Computing 19.11 (2015): 3331-3339.
Index Terms

Computer Science
Information Sciences
Security
Image processing

Keywords

Image Steganography LSB Substitution Security AES Encryption Fisher Yates Shuffle False Image Embedding Histogram Preservation