5 Conclusion and Future Work
The proposed method gives better performance in
all the parameters than the existing one. The stego
image generated after embedding the secret
message in the cover image is almost identical to
the original image. However, when the sizes of the
cover images were increased, the image quality of
the proposed algorithm increased, which means that
the larger the cover image, the better the hiding
capacity. Compression Ratio represents the
reduction in the size of the image after the
compression process. The higher the compression
ratio; the lower the transmission effort and disk
space consumption. In the case of the proposed
algorithm, the compression is recorded way higher.
The encoding times of the proposed Secured
Hybrid algorithm for various sizes of the different
images were lesser and the security is better
because its complex coding is what makes the
proposed algorithm better secured. The proposed
scheme is developed to ensure more image security
during transmission by facilitating quick image
transfers. Also, the processing image security
mechanism had to be effective in terms of encoding
time. The results of the proposed algorithm have
shown that the proposed algorithm has performed
stronger and lossless compression on the images.
The overall system performance has shown that the
new system is robust, quick, and effective for
image security.
5.1 Future Work
In the future, more work can be done to look into
improving the Secured hybrid LSB - MSB
steganography algorithm for increased efficiency
without compromising data security or image
quality. This can be achieved by working on the
compression ratio for stronger embedding
procedures and also finding a way to apply this
technique on larger-sized gray-scale images. The
proposed technique in the future will be extended
to use on other steganographic cover objects such
as video or audio.
Additionally, integrating machine learning into
steganography presents a promising avenue to both
detect and prevent steganographic activities while
enhancing the overall security and quality of digital
image steganography.
References:
[1] Marilou O. Espina, Arnel C. Fajardo, Bobby
D. Gerardo, Ruji P. Medina (2019):
Multiple Level Information Security Using
Image Steganography and Authentication,
International Journal of Advanced Trends in
Computer Science and Engineering,
vol.8(6), November - December 2019,
pp.3297- 3303.
[2] Avni Aggarwal, Arpit Sangal, Aditya
Varshney (2019): Image steganography
using lsb algorithm, International Journal of
Information Sciences and Application
(IJISA). ISSN: 0974, 2255, Vol.11, No.1,
2019, (Special Issue) © International
Research Publication House.
[3] M. Hussain, A. W. A. Wahab, Y. I. Bin
Idris, A. T. S. Ho, and K. H. Jung, ―Image
steganography in spatial domain: A survey,
Signal Process. Image Commun., Vol. 65,
pp. 46–66,
2018. https://doi.org/10.1016/j.image.2018.0
3.012.
[4] Khaled and Atta (2022): Developing
algorithms for image steganography and
increasing the capacity depending on
choosing the best pixels. International
Journal of Computer Networks and
Communications (IJCNC), Vol. 14, July
2022.
[5] Jingzhi Lin, Zhenxing Qian, Zichi Wang,
Xinpeng Zhang,and Guorui Feng1, (2020),
A New Steganography Method for Dynamic
GIF Images Based on Palette Sort,
Hindawi Wireless Communications and
Mobile Computing, Vol. 2020, 13 pages.
[6] Subhash Panwar, Mukesh Kumar, Sakshi
Sharma, (2018), Digital Image
Steganography Using Modified LSB and
AES Cryptography, International Journal of
Recent Engineering Research and
Development, Vol. 3, Issue 6, pp.18-27.
[7] Harakannanavar Sunil Ac, Ramachandra R,
Pramodhini, (2019), Performance Analysis
of MSB Based Iris Recognition Using
Hybrid Features Extraction Technique,
International Journal of Engineering and
Advanced Technology (IJEAT), Vol.8 Issue
6, August 2019, pp.230-239.
[8] Pooja Rani and Apoorva Arora (2015):
Image Security System using Encryption
and Steganography. International Journal of
Innovative Research in Science,
Engineering and Technology (An ISO 3297:
2007 Certified Organization), Vol. 4, Issue
6, June 2015.
[9] Mansoor Fateh, Mohsen Rezvani, and
Yasser Irani (2021): A New Method of
Coding for Steganography Based on LSB
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2023.22.29
Abubakar Aminu Mu’azu, Kauthar Kabir