THE DESIGN OF A HYBRID LSB STEGANOGRAPHY FRAMEWORK WITH ADAPTIVE PIXEL SELECTION AND CHAOS ENCRYPTION FOR SOCIAL MEDIA IMAGES
DOI:
https://doi.org/10.47709/cnahpc.v8i2.7930Keywords:
Steganography, Adaptive LSB, Chaos Encryption, Arnold Cat Map, AES-256, Tamper Sensitivity, Social Media Security.Abstract
The exchange of sensitive data via social media platforms faces dual challenges: the risk of third-party interception and distortion due to image compression. Conventional steganography methods based on Least Significant Bit (LSB) often fail to balance embedding capacity with visual quality and are vulnerable to statistical steganalysis attacks. This research proposes a hybrid steganography framework that integrates multidomain adaptive pixel selection and layered cryptographic security. The pixel selection method combines Canny Edge Detection, Local Binary Pattern (LBP), and Local Entropy to determine optimal Regions of Interest (ROI). Data security is reinforced through content encryption using Advanced Encryption Standard (AES-256) and pixel position scrambling using Arnold Cat Map (ACM). Validation was conducted on 100 images from the ALASKA2 and Dresden datasets. Experimental results demonstrate the system's superior performance in balancing quality and capacity under standard load, the system achieves an average Peak Signal-to-Noise Ratio (PSNR) of 77.85 dB and a Structural Similarity Index (SSIM) of 1.0000. Stress tests confirmed the system's scalability, accommodating a maximum capacity of 3.00 bpp while maintaining safe visual quality (PSNR 51.26 dB). Although the system is fragile against JPEG compression on public timelines, this characteristic is validated to function effectively as a tamper sensitivity feature to detect illegal manipulation. Therefore, this framework is recommended as a solution for secure covert communication via document transmission channels (file sharing) on social media, ensuring high confidentiality and data authenticity.
Downloads
References
Abdelhakm, M., Salah, A., Askar, S., Abouhawwash, M., & Karawia, A. A. (2024). An image steganography algorithm via a compression and chaotic maps. AIP Advances, 14(4). https://doi.org/10.1063/5.0202343
Abdelrazik, H. F., & Mahmoud, A. M. (2024). International Journal of Intelligent IMAGE STEGANOGRAPHY?: A COMPARATIVE AND PRACTICAL STUDY. 24(2), 41–57.
Abdullah, S. F., & Nawaf, S. F. (2023). Optimizing Data Security with Hybrid Scheme Based on LSB and DWT. Tikrit Journal of Engineering Sciences, 30(3), 190–199. https://doi.org/10.25130/tjes.30.3.17
Abuali, M. S., Rashidi, C. B. M., Raof, R. A. A., Azir, K. N. F. K., Hussein, S. S., & Abd-Alhasan, A. Q. (2024). Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach. Mathematical Modelling of Engineering Problems, 11(6), 1403–1416. https://doi.org/10.18280/mmep.110602
Abuzanouneh, K. I. M., & Hadwan, M. (2021). Multi-Stage Protection using Pixel Selection Technique for Enhancing Steganography. International Journal of Communication Networks and Information Security, 13(1), 55–61. https://doi.org/10.17762/ijcnis.v13i1.4907
Alanzy, M., Alomrani, R., Alqarni, B., & Almutairi, S. (2023). Image Steganography Using LSB and Hybrid Encryption Algorithms. Applied Sciences (Switzerland), 13(21). https://doi.org/10.3390/app132111771
Alenizi, A., Mohammadi, M. S., Al-Hajji, A. A., & Ansari, A. S. (2024). A Review of Image Steganography Based on Multiple Hashing Algorithm. Computers, Materials and Continua, 80(2), 2463–2494. https://doi.org/10.32604/cmc.2024.051826
Apau, R., Asante, M., Twum, F., Ben Hayfron-Acquah, J., & Peasah, K. O. (2024). Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review. In PloS one (Vol. 19, Nomor 9). https://doi.org/10.1371/journal.pone.0308807
Avantika Bisht, Annu Singla, & Kamaldeep Joshi. (2024). A Review on Image Steganography Techniques. International Research Journal on Advanced Engineering Hub (IRJAEH), 2(07), 1986–1996. https://doi.org/10.47392/irjaeh.2024.0271
Awadh, W. A., Alasady, A. S., & Hamoud, A. K. (2022). Hybrid information security system via combination of compression, cryptography, and image steganography. International Journal of Electrical and Computer Engineering, 12(6), 6574–6584. https://doi.org/10.11591/ijece.v12i6.pp6574-6584
BHATT, D. P., PARGI, B., & KUMAR, R. (2024). Enhancing Security through Advanced Image Steganography Techniques. OPSearch: American Journal of Open Research, 3(3), 921–927. https://doi.org/10.58811/opsearch.v3i3.97
Bohang, L., Li, N., Yang, J., Alfarraj, O., Albelhai, F., Tolba, A., Shaikh, Z. A., Alizadehsani, R., P?awiak, P., & Yee, P. L. (2025). Image steganalysis using active learning and hyperparameter optimization. Scientific Reports, 15(1), 1–32. https://doi.org/10.1038/s41598-025-92082-w
Bohra, S., Naik, C., Batra, R., Popat, K., & Kaur, H. (2024). Advancements in Modern Steganography Techniques for Enhanced Data Security: A Comprehensive Review. 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), 941–944. https://doi.org/10.23919/INDIACom61295.2024.10498587
Das, D., Durafe, A., & Patidar, V. (2023). An Efficient Lightweight LSB Steganography with Deep Learning Steganalysis. Computational Intelligence in Image and Video Processing, 131–154. https://doi.org/10.1201/9781003218111-7
Din, R., Shakir, A. H., Ali, S. H., Qasim Almaliki, A. J., Utama, S., & Almaliki, J. Q. (2024). Exploring Steganographic Techniques for Enhanced Data Protection in Digital Files. International Journal of Computational Thinking and Data Science, 1(1), 1–9. https://doi.org/10.37934/ctds.1.1.19
G, V., & Sargunam, B. (2023). An Empirical Study for Image Steganography and Steganalysis: A Challenging Overview. January, 1–7. https://papers.ssrn.com/abstract=4518073
Gloe, T., & Böhme, R. (2010). The Dresden Image Database for Benchmarking Digital Image Forensics. Journal of Digital Forensic Practice, 3, 1584–1590. https://doi.org/10.1080/15567281.2010.531500
Gutub, A., & Al-Shaarani, F. (2020). Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons. Arabian Journal for Science and Engineering, 45(4), 2631–2644. https://doi.org/10.1007/s13369-020-04413-w
Howard, A., Quentin, G., PatrickFrenchie, Cogranne, R., & Cukierski, W. (2020). ALASKA2 Image Steganalysis.
Hussain, M., Riaz, Q., Saleem, S., Ghafoor, A., & Jung, K.-H. (2021). Enhanced adaptive data hiding method using LSB and pixel value differencing. Multimedia Tools and Applications, 80(13), 20381–20401. https://doi.org/10.1007/s11042-021-10652-2
Jain, P., Saini, A., Singh, A., & Shreya, S. (2024). Secure Data Transmission with Steganography. 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 1–4. https://doi.org/10.1109/ICRITO61523.2024.10522274
Jamatia, R., & Bhuyan, B. (2023). Comparative Analysis and Performance Metrics Evaluation of Image Steganography Embedding Algorithms. 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT), 1–7. https://doi.org/10.1109/EASCT59475.2023.10393229
Jasim, Z. K. J., & Kurnaz, S. (2024). An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization. Computers, Materials and Continua, 80(3), 4643–4662. https://doi.org/10.32604/cmc.2024.055195
Kataria, M., Jain, K., & Subramanian, N. (2023). Exploring Advanced Encryption and Steganography Techniques for Image Security. 2023 11th International Symposium on Digital Forensics and Security (ISDFS), 1–6. https://doi.org/10.1109/ISDFS58141.2023.10131890
Kheddar, H., Hemis, M., Himeur, Y., Megías, D., & Amira, A. (2024). Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions. Neurocomputing, 581, 127528. https://doi.org/https://doi.org/10.1016/j.neucom.2024.127528
Kombrink, M. H., Geradts, Z. J. M. H., & Worring, M. (2024). Image steganography approaches and their detection strategies: a survey. ACM Computing Surveys, 57(2). https://doi.org/10.1145/3694965
Kumar, M., Soni, A., Shekhawat, A. R. S., & Rawat, A. (2022). Enhanced Digital Image and Text Data Security Using Hybrid Model of LSB Steganography and AES Cryptography Technique. 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS), 1453–1457. https://doi.org/10.1109/ICAIS53314.2022.9742942
Madaan, R., Zudock, K. K., & Brown, N. L. (2024). Comparison of Steganography Exploits. 2024 IEEE Integrated STEM Education Conference (ISEC), 1. https://doi.org/10.1109/ISEC61299.2024.10665283
Nath, A., Mondal, S., Deb, R., & Das, A. (2021). Data Hiding and Retrieval Method Using LSB Substitution Algorithm. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 3307, 267–279. https://doi.org/10.32628/cseit217352
Njoum, M., Sulaiman, R., Shukur, Z., & Qamar, F. (2024). High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution. Computers, Materials and Continua, 81(1), 183–211. https://doi.org/10.32604/cmc.2024.050090
Nourah Alamri, E. al. (2023). New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 4483–4489. https://doi.org/10.17762/ijritcc.v11i9.9943
Rahman, S., uddin, J., Hussain, H., Shah, S., Salam, A., Amin, F., de la Torre Díez, I., Vargas, D. L. R., & Espinosa, J. C. M. (2025). A novel and efficient digital image steganography technique using least significant bit substitution. Scientific Reports, 15(1), 1–16. https://doi.org/10.1038/s41598-024-83147-3
Rustad, S., Setiadi, D. R. I. M., Syukur, A., & Andono, P. N. (2022). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University - Computer and Information Sciences, 34(6), 3559–3568. https://doi.org/10.1016/j.jksuci.2020.12.017
Selvamani, R., Binti Yusoff, Y., Fatin Liyana Binti Mohd Rosely, N., & BintiMd Siraj, M. (2022). Comparative Analysis on the Image Steganographic Algorithms. 2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA), 1–7. https://doi.org/10.1109/eSmarTA56775.2022.9935396
?ener, D., & Güney, S. (2024). Enhancing Steganography in 256×256 Colored Images with U-Net: A Study on PSNR and SSIM Metrics with Variable-Sized Hidden Images. Review of Computer Engineering Studies, 11(2), 13–29. https://doi.org/10.18280/rces.110202
Setiadi, D. R. I. M. (2021). PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 80(6), 8423–8444. https://doi.org/10.1007/s11042-020-10035-z
Sharma, A., Chauhan, R., Bhatt, C., Devliyal, S., & Kumar, R. R. (2024). Securing Data: Cryptography and Steganography. 2024 Asia Pacific Conference on Innovation in Technology (APCIT), 1–6. https://doi.org/10.1109/APCIT62007.2024.10673714
Soman, V. K., & Natarajan, V. (2025). Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment. Scientific reports, 15(1), 2406. https://doi.org/10.1038/s41598-025-86956-2
Sultana, H., Kamal, A. H. M., Apon, T. S., & Alam, M. G. R. (2024). Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space. Cyber Security and Applications, 2(May 2023). https://doi.org/10.1016/j.csa.2023.100028
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 M Ardi Wiratama Putra, Abdul Rahman

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.











