Block Based Image Steganography in Spatial and Frequency Domain

D.N.F Awang Iskandar, Abdulmalik Bacheer Rahhal, Wadood Abdul


Steganography is the art of hiding a secret message in different kind of multimedia (image, voice or video), such that the secret message is not detectable. In this paper, we propose two new algorithms, first one uses the spatial domain for steganography, where the host image is converted into blocks of bit-planes to insert the secret information. The algorithm divides the image into 8 bit planes and then the bit planes are further divided in to N x N blocks. The hidden message is inserted based on a chaotic sequence. We intend to find the most optimum bit plane to insert the hidden information, keeping high imperceptibility in terms of the human visual systems. The algorithm shows relatively good Mean Structural Similarity and Peak Signal to Noise Ratio values. The second algorithm is applied in the frequency domain where the host image is converted using the discrete wavelet transform. Then at second and third level of the transform, the secret information is inserted. The proposed algorithm divides wavelet level divide in to M x M blocks. The hidden message is inserted based on chaotic sequence in to the blocks. This algorithm shows better imperceptivity in terms of the human visual system and PSNR.


Bit Plane; Force of Insertion; Spatial Domain Steganography; Wavelet Domain;

Full Text:



V. Nagaraj, V. Vijayalakshmi, and G. Zayaraz, “Overview of Digital Steganography Methods and Its Applications,” Int. J. Adv. Sci. Technol., vol. 60, pp. 45–58, 2013.

I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography. Morgan Kaufmann, 2007.

H.-W. Tseng and C.-C. Chang, “High capacity data hiding in JPEG-compressed images,” Informatica, vol. 15, no. 1, pp. 127–142, 2004. [4] E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, “High capacity image steganography using wavelet transform and genetic algorithm,” in Proceedings of international multiconference of engineers and computer scientists, 2011, vol. 1, pp. 16–18.

S. Ahani and S. Ghaemmaghami, “Colour image steganography method based on sparse representation,” IET Image Process., vol. 9, no. 6, pp. 496–505, 2015.

S. Sarreshtedari and S. Ghaemmaghami, “High Capacity Image Steganography in Wavelet Domain,” in 2010 7th IEEE Consumer Communications and Networking Conference (CCNC), 2010, pp. 1–5.

D. E. Walia, P. Jain, and N. Navdeep, “An Analysis of LSB & DCT based Steganography,” Glob. J. Comput. Sci. Technol., vol. 10, no. 1, May 2010.

D. Bandyopadhyay, K. Dasgupta, J. K. Mandal, and P. Dutta, “A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain,” Int. J. Secur., 2014.

A. Singh and H. Singh, “An improved LSB based image steganography technique for RGB images,” in 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2015, pp. 1–4.

B. Debnath, J. C. Das, and D. De, “Reversible logic-based image steganography using quantum dot cellular automata for secure nanocommunication,” IET Circuits Devices Syst., vol. 11, no. 1, pp. 58–67, 2017.

J. Bai, C.-C. Chang, T.-S. Nguyen, C. Zhu, and Y. Liu, “A high payload steganographic algorithm based on edge detection,” Displays, vol. 46, pp. 42–51, Jan. 2017.

Shreyank N Gowda, “Block Based Least Significant Bit Algorithm for Image Steganography,” presented at the Annual Int’l Conference on Intelligent Computing, Computer Science & Information Systems, Thailand, 2016.

A. Nag, S. Ghosh, S. Biswas, D. Sarkar, and P. P. Sarkar, “An image steganography technique using X-box mapping,” in 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), 2012, pp. 709–713.

S. Sharma, V. K. Yadav, and S. Batham, “Zero Distortion Technique: An Approach to Image Steganography Using Strength of Indexed Based Chaotic Sequence,” in Security in Computing and Communications, Springer Berlin Heidelberg, 2014, pp. 407–416.

Shivani, V. K. Yadav, and S. Batham, “A Novel Approach of Bulk Data Hiding using Text Steganography,” Procedia Comput. Sci., vol. 57, pp. 1401–1410, Jan. 2015.

B. S. and K. L. Sudha, “Text Steganography using LSB insertion method along with Chaos Theory,” ArXiv12051859 Cs, May 2012.

Y. Wang, W. Chen, Y. Li, W. Wang, and C. T. Li, “HPS: Histogram preserving steganography in spatial domain,” in 2014 International Workshop on Biometrics and Forensics (IWBF), 2014, pp. 1–4.

S. E. Jero and P. Ramu, “Curvelets-based ECG steganography for data security,” Electron. Lett., vol. 52, no. 4, pp. 283–285, 2016.

Yusra A. Y. Al-Najjar, Dr. Der Chen Soong “Comparison of Image Quality Assessment: PSNR, HVS, SSIM, UIQI” in International Journal of Scientific & Engineering Research, Volume 3, Issue 8, August-2017


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 2180-1843

eISSN: 2289-8131