Open Access iconOpen Access

ARTICLE

crossmark

High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution

Murad Njoum1,2,*, Rossilawati Sulaiman1, Zarina Shukur1, Faizan Qamar1

1 Center of Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, 43600, Malaysia
2 Computer Science and Cyber Security, Faculty of Engineering and Information Technology, BirZeit University, BirZeit, Ramallah, P.O. Box 14, Palestine

* Corresponding Author: Murad Njoum. Email: email

Computers, Materials & Continua 2024, 81(1), 183-211. https://doi.org/10.32604/cmc.2024.050090

Abstract

Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data. This property makes it difficult for steganalysts’ powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation. However, using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations. In addition, these numbers may cluster in certain ranges. The hidden data in these clustered pixels will reduce the image quality, which steganalysis tools can detect. Therefore, this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego image. This paper employs the Adelson-Velsky and Landis (AVL) tree data structure algorithm to implement the randomization pixel selection technique for data concealment. The AVL tree algorithm provides several advantages for image steganography. Firstly, it ensures balanced tree structures, which leads to efficient data retrieval and insertion operations. Secondly, the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels, thereby preserving the stego image quality. The data structure employs the pixel indicator technique for Red, Green, and Blue (RGB) channel extraction. The green channel serves as the foundation for building a balanced binary tree. First, the sender identifies the colored cover image and secret data. The sender will use the two least significant bits (2-LSB) of RGB channels to conceal the data’s size and associated information. The next step is to create a balanced binary tree based on the green channel. Utilizing the channel pixel indicator on the LSB of the green channel, we can conceal bits in the 2-LSB of the red or blue channel. The first four levels of the data structure tree will mask the data size, while subsequent levels will conceal the remaining digits of secret data. After embedding the bits in the binary tree level by level, the model restores the AVL tree to create the stego image. Ultimately, the receiver receives this stego image through the public channel, enabling secret data recovery without stego or crypto keys. This method ensures that the stego image appears unsuspicious to potential attackers. Without an extraction algorithm, a third party cannot extract the original secret information from an intercepted stego image. Experimental results showed high levels of imperceptibility and security.

Keywords


Cite This Article

APA Style
Njoum, M., Sulaiman, R., Shukur, Z., Qamar, F. (2024). High-secured image LSB steganography using avl-tree with random RGB channel substitution. Computers, Materials & Continua, 81(1), 183-211. https://doi.org/10.32604/cmc.2024.050090
Vancouver Style
Njoum M, Sulaiman R, Shukur Z, Qamar F. High-secured image LSB steganography using avl-tree with random RGB channel substitution. Comput Mater Contin. 2024;81(1):183-211 https://doi.org/10.32604/cmc.2024.050090
IEEE Style
M. Njoum, R. Sulaiman, Z. Shukur, and F. Qamar, “High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution,” Comput. Mater. Contin., vol. 81, no. 1, pp. 183-211, 2024. https://doi.org/10.32604/cmc.2024.050090



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 580

    View

  • 249

    Download

  • 0

    Like

Share Link