A Novel Technique for Data Steganography


  • A. Y. Hindi Department of Communication Technology Engineering, Al-Balqa' Applied University, As-Salt, Jordan
  • M. O. Dwairi Department of Communication Technology Engineering, Al-Balqa' Applied University, Jordan http://orcid.org/0000-0002-3325-052X
  • Z. A. AlQadi Department of Computer Engineering, Al-Balqa' Applied University, Jordan
Volume: 9 | Issue: 6 | Pages: 4942-4945 | December 2019 | https://doi.org/10.48084/etasr.2955


In this paper, a novel stego-method will be introduced, which can be used to hide any secret message in any holding color image. The proposed method will be implemented and tested and the calculated parameters will be compared with the LSB method parameters. It will be shown that the proposed method provides a high-security level by using two keys to extract the secret message from the holding image, making it very difficult to hack.


steganography, hiding time, extracting time, MSE, PSNR


Download data is not yet available.


E. Zukerman, “Review: OpenPuff steganography tool hides confidential data in plain sigh”, PC World, available at: www.pcworld.com/article/2026357/review-openpuff-steganography-tool-hides-confidential-data-in-plain-sight.html

Encryption and steganography, available at: http://www.cis.upenn.edu/~cis110/13fa/hw/hw04/steganography.html#steganography

S. Channalli, A. Jadhav, “Steganography an art of hiding data’’, International Journal on Computer Science and Engineering, Vol. 1, No. 3, pp. 137-141, 2009

A. A. Z. Alqadi, M. K. A. Zalata, G. M. Qaryouti, “Comparative analysis of color image steganography”, International Journal of Computer Science and Mobile Computing, Vol. 5, No. 11, pp. 37-43, 2016

R. Z. Wang, C. F. Lin, J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm”, Pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2000 DOI: https://doi.org/10.1016/S0031-3203(00)00015-7

C. K. Chan, L. M. Chen, “Hiding data in images by simple LSB substitution”, Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004 DOI: https://doi.org/10.1016/j.patcog.2003.08.007

C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Pattern Recognition, Vol. 41, No. 8, pp. 2674-2683, 2008 DOI: https://doi.org/10.1016/j.patcog.2008.01.019

M. M. Emam, A. A. Aly, F. A. Omara, “An improved image steganography method based on LSB technique with random pixel selection”, International Journal of Advanced Computer Science & Applications, Vol. 7, No. 3, pp. 361-366, 2016 DOI: https://doi.org/10.14569/IJACSA.2016.070350

G. Kaur, A. Kochhar, “A steganography implementation based on LSB & DCT”, International Journal for Science and Emerging Technologies with Latest Trends, Vol. 4, No. 1, pp. 35-41, 2012

M. J. Thenmozhi, T. Menakadevi, “A new secure image steganography using Lsb and Spiht based compression method”, International Journal of Engineering Research & Science, Vol. 2, No. 3, pp. 80-85, 2016

S. Shabnam, K. Hemachandran, “LSB based steganography using bit masking method on RGB planes”, International Journal of Computer Science and Information Technologies, Vol. 7, No. 3, pp. 1169-1173, 2016

B. Datta, U. Mukherjee, S. K. Bandyopadhyay, “LSB layer independent robust steganography using binary addition”, Procedia Computer Science, Vol. 85, pp. 425-432, 2016 DOI: https://doi.org/10.1016/j.procs.2016.05.188

A. S. Pandit, S. R. Khope, “Review on image steganography”, International Journal of Engineering Science, Vol. 6, No. 5, pp. 6115-6117, 2016

D. Artz, “Digital steganography: Hiding data within data”, IEEE Internet Computing, Vol. 5, No. 3, pp. 75-80, 2001 DOI: https://doi.org/10.1109/4236.935180

A. M. A. Shatnawi, “A new method in image steganography with improved image quality”, Applied Mathematical Sciences, Vol. 6, No. 79, pp. 3907-3915, 2012

S. Gupta, A. Goyal, B. Bhushan, “Information hiding using least significant bit steganography and cryptography”, International Journal of Modern Education and Computer Science, Vol. 6, pp. 27-34, 2012 DOI: https://doi.org/10.5815/ijmecs.2012.06.04

J. K. Mandal, D. Das, “Color image steganography based on pixel value differencing in spatial domain”, International Journal of Information Sciences and Techniques, Vol. 2, No. 4, pp. 83-93, 2012 DOI: https://doi.org/10.5121/ijist.2012.2408

M. O. Al-Dwairi, A. Hendi, Z. AlQadi, “An efficient and highly secure technique to encrypt-decrypt color images”, Engineering, Technology & Applied Science Research, Vol. 9, No. 3, pp. 4165-4168, 2019 DOI: https://doi.org/10.48084/etasr.2525

A. Y. Hendi, M. O. Dwairi, Z. A. Al-Qadi, M. S. Soliman, “A novel simple and highly secure method for data encryption-decryption”, International Journal of Communication Networks and Information Security, Vol. 11, No. 1, pp. 232-238, 2012

G. Sonal, H. Mer, “A survey: Image Steganography using different method”, International Journal of Novel Research and Development, Vol. 2, No. 4, pp. 48-51, 2017


How to Cite

A. Y. Hindi, M. O. Dwairi, and Z. A. AlQadi, “A Novel Technique for Data Steganography”, Eng. Technol. Appl. Sci. Res., vol. 9, no. 6, pp. 4942–4945, Dec. 2019.


Abstract Views: 422
PDF Downloads: 272

Metrics Information
Bookmark and Share

Most read articles by the same author(s)