Huffman coding-based data reduction and quadristego logic for secure image steganography

被引:0
|
作者
Ramadhan, Irsyad Fikriansyah [1 ]
de la Croix, Ntivuguruzwa Jean [1 ,2 ]
Ahmad, Tohari [1 ]
Uzamurengera, Andre [3 ]
机构
[1] Inst Teknol Sepuluh Nopember, Dept Informat, Surabaya 60111, Indonesia
[2] Univ Rwanda, Coll Sci & Technol, African Ctr Excellence Internet Things, Kigali 3900, Rwanda
[3] Natl Bank Rwanda, Kigali 531, Rwanda
来源
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH | 2025年 / 65卷
关键词
Reversible Data Hiding (RDH); Image steganography; Four stego images; Huffman coding; Information security; STRATEGY;
D O I
10.1016/j.jestch.2025.102033
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ensuring secure data transmission is critical for maintaining confidentiality and has become increasingly important. Steganography, which embeds secret information within digital images, has been widely explored to safeguard sensitive data from unauthorized access over public networks. However, existing steganographic algorithms often face a significant trade-off between payload capacity, image quality, and security. Embedding large amounts of data can cause noticeable distortion in image quality, undermining the technique's effectiveness. Furthermore, current methods lack adaptability to diverse cover media and struggle to maintain reversibility and high visual quality under increased embedding capacities. To address these challenges, this study proposes a novel steganographic algorithm integrating two key innovations: (1) Enhancement of stego image quality via stego image's segmentation into four images, reducing concentration-induced distortions, and (2) optimization of data embedding through Huffman coding through a lossless compression minimizing the embedding-induced distortions while maximizing payload capacity. The experimental results show that the proposed method achieves high visual fidelity, with PSNR values ranging from 75.793 dB to 44.997 dB without encryption and from 51.159 dB to 44.316 dB with encryption for payloads between 10 KB and 100 KB. These values exceed the 30 dB threshold for acceptable image steganography, ensuring minimal perceptual distortion. Additionally, the SSIM remains consistently above 0.98, indicating strong structural preservation of stego images. Comparative analysis with existing methods confirms that the proposed approach outperforms in embedding capacity, structural similarity index measure (SSIM), and peak signal-to-noise ratio (PSNR), reflecting the stego images' quality.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Lossless Compression of Full-Surface Solar Magnetic Field Image Based on Huffman Coding
    Liu, Yue
    Luo, Li
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 899 - 903
  • [42] A secure image steganography algorithm based on least significant bit and integer wavelet transform
    ELSHAZLY Emad
    ABDELWAHAB Safey
    ABOUZAID Refaat
    ZAHRAN Osama
    ELARABY Sayed
    ELKORDY Mohamed
    JournalofSystemsEngineeringandElectronics, 2018, 29 (03) : 639 - 649
  • [43] A new high capacity and secure image realization steganography based on ASCII code matching
    Elshoush, Huwaida T.
    Mahmoud, Mahmoud M.
    Altigani, Abdelrahman
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (04) : 5191 - 5237
  • [44] A robust and imperceptible n-Ary based image steganography in DCT domain for secure communication
    Rajwinder Kaur
    Butta Singh
    Multimedia Tools and Applications, 2024, 83 : 20357 - 20386
  • [45] A robust and imperceptible n-Ary based image steganography in DCT domain for secure communication
    Kaur, Rajwinder
    Singh, Butta
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (07) : 20357 - 20386
  • [46] Reversible Data Hiding in Encrypted Images Based on Time-Varying Huffman Coding Table
    Yang, Yaolin
    He, Hongjie
    Chen, Fan
    Yuan, Yuan
    Mao, Ningxiong
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 8607 - 8619
  • [47] Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment
    Ragab, Mahmoud
    Alshehri, Samah
    Alhadrami, Hani A.
    Kateb, Faris
    Ashary, Ehab Bahaudien
    Abdel-khalek, S.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1323 - 1338
  • [48] Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding
    Yin, Zhaoxia
    Xiang, Youzhi
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 22 (04) : 874 - 884
  • [49] Reversible Data Hiding in Encrypted Images Based on Bit-plane Rearrangement and Huffman Coding
    Liu, Mengqi
    Gao, Tiegang
    2021 5TH INTERNATIONAL CONFERENCE ON INNOVATION IN ARTIFICIAL INTELLIGENCE (ICIAI 2021), 2021, : 62 - 68
  • [50] Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
    Naser, Mohammed Abdullah
    Al-alak, Saif M. Kh.
    Hussein, Ahmed Mohammed
    Jawad, Majid Jabbar
    BAGHDAD SCIENCE JOURNAL, 2022, 19 (06) : 1362 - 1368