THE DESIGN OF A HYBRID LSB STEGANOGRAPHY FRAMEWORK WITH ADAPTIVE PIXEL SELECTION AND CHAOS ENCRYPTION FOR SOCIAL MEDIA IMAGES

Authors

  • M Ardi Wiratama Putra Universitas MDP, Palembang ,South Sumatera, Indonesia
  • Abdul Rahman Universitas MDP, Palembang ,South Sumatera, Indonesia

DOI:

https://doi.org/10.47709/cnahpc.v8i2.7930

Keywords:

Steganography, Adaptive LSB, Chaos Encryption, Arnold Cat Map, AES-256, Tamper Sensitivity, Social Media Security.

Abstract

The exchange of sensitive data via social media platforms faces dual challenges: the risk of third-party interception and distortion due to image compression. Conventional steganography methods based on Least Significant Bit (LSB) often fail to balance embedding capacity with visual quality and are vulnerable to statistical steganalysis attacks. This research proposes a hybrid steganography framework that integrates multidomain adaptive pixel selection and layered cryptographic security. The pixel selection method combines Canny Edge Detection, Local Binary Pattern (LBP), and Local Entropy to determine optimal Regions of Interest (ROI). Data security is reinforced through content encryption using Advanced Encryption Standard (AES-256) and pixel position scrambling using Arnold Cat Map (ACM). Validation was conducted on 100 images from the ALASKA2 and Dresden datasets. Experimental results demonstrate the system's superior performance in balancing quality and capacity under standard load, the system achieves an average Peak Signal-to-Noise Ratio (PSNR) of 77.85 dB and a Structural Similarity Index (SSIM) of 1.0000. Stress tests confirmed the system's scalability, accommodating a maximum capacity of 3.00 bpp while maintaining safe visual quality (PSNR 51.26 dB). Although the system is fragile against JPEG compression on public timelines, this characteristic is validated to function effectively as a tamper sensitivity feature to detect illegal manipulation. Therefore, this framework is recommended as a solution for secure covert communication via document transmission channels (file sharing) on social media, ensuring high confidentiality and data authenticity.

 

Downloads

Download data is not yet available.

References

Abdelhakm, M., Salah, A., Askar, S., Abouhawwash, M., & Karawia, A. A. (2024). An image steganography algorithm via a compression and chaotic maps. AIP Advances, 14(4). https://doi.org/10.1063/5.0202343

Abdelrazik, H. F., & Mahmoud, A. M. (2024). International Journal of Intelligent IMAGE STEGANOGRAPHY?: A COMPARATIVE AND PRACTICAL STUDY. 24(2), 41–57.

Abdullah, S. F., & Nawaf, S. F. (2023). Optimizing Data Security with Hybrid Scheme Based on LSB and DWT. Tikrit Journal of Engineering Sciences, 30(3), 190–199. https://doi.org/10.25130/tjes.30.3.17

Abuali, M. S., Rashidi, C. B. M., Raof, R. A. A., Azir, K. N. F. K., Hussein, S. S., & Abd-Alhasan, A. Q. (2024). Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach. Mathematical Modelling of Engineering Problems, 11(6), 1403–1416. https://doi.org/10.18280/mmep.110602

Abuzanouneh, K. I. M., & Hadwan, M. (2021). Multi-Stage Protection using Pixel Selection Technique for Enhancing Steganography. International Journal of Communication Networks and Information Security, 13(1), 55–61. https://doi.org/10.17762/ijcnis.v13i1.4907

Alanzy, M., Alomrani, R., Alqarni, B., & Almutairi, S. (2023). Image Steganography Using LSB and Hybrid Encryption Algorithms. Applied Sciences (Switzerland), 13(21). https://doi.org/10.3390/app132111771

Alenizi, A., Mohammadi, M. S., Al-Hajji, A. A., & Ansari, A. S. (2024). A Review of Image Steganography Based on Multiple Hashing Algorithm. Computers, Materials and Continua, 80(2), 2463–2494. https://doi.org/10.32604/cmc.2024.051826

Apau, R., Asante, M., Twum, F., Ben Hayfron-Acquah, J., & Peasah, K. O. (2024). Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review. In PloS one (Vol. 19, Nomor 9). https://doi.org/10.1371/journal.pone.0308807

Avantika Bisht, Annu Singla, & Kamaldeep Joshi. (2024). A Review on Image Steganography Techniques. International Research Journal on Advanced Engineering Hub (IRJAEH), 2(07), 1986–1996. https://doi.org/10.47392/irjaeh.2024.0271

Awadh, W. A., Alasady, A. S., & Hamoud, A. K. (2022). Hybrid information security system via combination of compression, cryptography, and image steganography. International Journal of Electrical and Computer Engineering, 12(6), 6574–6584. https://doi.org/10.11591/ijece.v12i6.pp6574-6584

BHATT, D. P., PARGI, B., & KUMAR, R. (2024). Enhancing Security through Advanced Image Steganography Techniques. OPSearch: American Journal of Open Research, 3(3), 921–927. https://doi.org/10.58811/opsearch.v3i3.97

Bohang, L., Li, N., Yang, J., Alfarraj, O., Albelhai, F., Tolba, A., Shaikh, Z. A., Alizadehsani, R., P?awiak, P., & Yee, P. L. (2025). Image steganalysis using active learning and hyperparameter optimization. Scientific Reports, 15(1), 1–32. https://doi.org/10.1038/s41598-025-92082-w

Bohra, S., Naik, C., Batra, R., Popat, K., & Kaur, H. (2024). Advancements in Modern Steganography Techniques for Enhanced Data Security: A Comprehensive Review. 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), 941–944. https://doi.org/10.23919/INDIACom61295.2024.10498587

Das, D., Durafe, A., & Patidar, V. (2023). An Efficient Lightweight LSB Steganography with Deep Learning Steganalysis. Computational Intelligence in Image and Video Processing, 131–154. https://doi.org/10.1201/9781003218111-7

Din, R., Shakir, A. H., Ali, S. H., Qasim Almaliki, A. J., Utama, S., & Almaliki, J. Q. (2024). Exploring Steganographic Techniques for Enhanced Data Protection in Digital Files. International Journal of Computational Thinking and Data Science, 1(1), 1–9. https://doi.org/10.37934/ctds.1.1.19

G, V., & Sargunam, B. (2023). An Empirical Study for Image Steganography and Steganalysis: A Challenging Overview. January, 1–7. https://papers.ssrn.com/abstract=4518073

Gloe, T., & Böhme, R. (2010). The Dresden Image Database for Benchmarking Digital Image Forensics. Journal of Digital Forensic Practice, 3, 1584–1590. https://doi.org/10.1080/15567281.2010.531500

Gutub, A., & Al-Shaarani, F. (2020). Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons. Arabian Journal for Science and Engineering, 45(4), 2631–2644. https://doi.org/10.1007/s13369-020-04413-w

Howard, A., Quentin, G., PatrickFrenchie, Cogranne, R., & Cukierski, W. (2020). ALASKA2 Image Steganalysis.

Hussain, M., Riaz, Q., Saleem, S., Ghafoor, A., & Jung, K.-H. (2021). Enhanced adaptive data hiding method using LSB and pixel value differencing. Multimedia Tools and Applications, 80(13), 20381–20401. https://doi.org/10.1007/s11042-021-10652-2

Jain, P., Saini, A., Singh, A., & Shreya, S. (2024). Secure Data Transmission with Steganography. 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 1–4. https://doi.org/10.1109/ICRITO61523.2024.10522274

Jamatia, R., & Bhuyan, B. (2023). Comparative Analysis and Performance Metrics Evaluation of Image Steganography Embedding Algorithms. 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT), 1–7. https://doi.org/10.1109/EASCT59475.2023.10393229

Jasim, Z. K. J., & Kurnaz, S. (2024). An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization. Computers, Materials and Continua, 80(3), 4643–4662. https://doi.org/10.32604/cmc.2024.055195

Kataria, M., Jain, K., & Subramanian, N. (2023). Exploring Advanced Encryption and Steganography Techniques for Image Security. 2023 11th International Symposium on Digital Forensics and Security (ISDFS), 1–6. https://doi.org/10.1109/ISDFS58141.2023.10131890

Kheddar, H., Hemis, M., Himeur, Y., Megías, D., & Amira, A. (2024). Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions. Neurocomputing, 581, 127528. https://doi.org/https://doi.org/10.1016/j.neucom.2024.127528

Kombrink, M. H., Geradts, Z. J. M. H., & Worring, M. (2024). Image steganography approaches and their detection strategies: a survey. ACM Computing Surveys, 57(2). https://doi.org/10.1145/3694965

Kumar, M., Soni, A., Shekhawat, A. R. S., & Rawat, A. (2022). Enhanced Digital Image and Text Data Security Using Hybrid Model of LSB Steganography and AES Cryptography Technique. 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS), 1453–1457. https://doi.org/10.1109/ICAIS53314.2022.9742942

Madaan, R., Zudock, K. K., & Brown, N. L. (2024). Comparison of Steganography Exploits. 2024 IEEE Integrated STEM Education Conference (ISEC), 1. https://doi.org/10.1109/ISEC61299.2024.10665283

Nath, A., Mondal, S., Deb, R., & Das, A. (2021). Data Hiding and Retrieval Method Using LSB Substitution Algorithm. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 3307, 267–279. https://doi.org/10.32628/cseit217352

Njoum, M., Sulaiman, R., Shukur, Z., & Qamar, F. (2024). High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution. Computers, Materials and Continua, 81(1), 183–211. https://doi.org/10.32604/cmc.2024.050090

Nourah Alamri, E. al. (2023). New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 4483–4489. https://doi.org/10.17762/ijritcc.v11i9.9943

Rahman, S., uddin, J., Hussain, H., Shah, S., Salam, A., Amin, F., de la Torre Díez, I., Vargas, D. L. R., & Espinosa, J. C. M. (2025). A novel and efficient digital image steganography technique using least significant bit substitution. Scientific Reports, 15(1), 1–16. https://doi.org/10.1038/s41598-024-83147-3

Rustad, S., Setiadi, D. R. I. M., Syukur, A., & Andono, P. N. (2022). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University - Computer and Information Sciences, 34(6), 3559–3568. https://doi.org/10.1016/j.jksuci.2020.12.017

Selvamani, R., Binti Yusoff, Y., Fatin Liyana Binti Mohd Rosely, N., & BintiMd Siraj, M. (2022). Comparative Analysis on the Image Steganographic Algorithms. 2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA), 1–7. https://doi.org/10.1109/eSmarTA56775.2022.9935396

?ener, D., & Güney, S. (2024). Enhancing Steganography in 256×256 Colored Images with U-Net: A Study on PSNR and SSIM Metrics with Variable-Sized Hidden Images. Review of Computer Engineering Studies, 11(2), 13–29. https://doi.org/10.18280/rces.110202

Setiadi, D. R. I. M. (2021). PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 80(6), 8423–8444. https://doi.org/10.1007/s11042-020-10035-z

Sharma, A., Chauhan, R., Bhatt, C., Devliyal, S., & Kumar, R. R. (2024). Securing Data: Cryptography and Steganography. 2024 Asia Pacific Conference on Innovation in Technology (APCIT), 1–6. https://doi.org/10.1109/APCIT62007.2024.10673714

Soman, V. K., & Natarajan, V. (2025). Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment. Scientific reports, 15(1), 2406. https://doi.org/10.1038/s41598-025-86956-2

Sultana, H., Kamal, A. H. M., Apon, T. S., & Alam, M. G. R. (2024). Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space. Cyber Security and Applications, 2(May 2023). https://doi.org/10.1016/j.csa.2023.100028

Downloads

Published

2026-05-01

How to Cite

Putra, M. A. W., & Rahman, A. (2026). THE DESIGN OF A HYBRID LSB STEGANOGRAPHY FRAMEWORK WITH ADAPTIVE PIXEL SELECTION AND CHAOS ENCRYPTION FOR SOCIAL MEDIA IMAGES. Journal of Computer Networks, Architecture and High Performance Computing, 8(2), 273–280. https://doi.org/10.47709/cnahpc.v8i2.7930

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.