<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">50090</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2024.050090</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution</article-title>
<alt-title alt-title-type="left-running-head">High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution</alt-title>
<alt-title alt-title-type="right-running-head">High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Njoum</surname><given-names>Murad</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><xref ref-type="aff" rid="aff-2">2</xref><email>mnjoum@staff.birzeit.edu</email></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Sulaiman</surname><given-names>Rossilawati</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Shukur</surname><given-names>Zarina</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Qamar</surname><given-names>Faizan</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Center of Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia</institution>, <addr-line>Bangi, Selangor, 43600</addr-line>, <country>Malaysia</country></aff>
<aff id="aff-2"><label>2</label><institution>Computer Science and Cyber Security, Faculty of Engineering and Information Technology, BirZeit University</institution>, <addr-line>BirZeit, Ramallah, P.O. Box 14, Palestine</addr-line></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Murad Njoum. Email: <email>mnjoum@staff.birzeit.edu</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2024</year></pub-date>
<pub-date date-type="pub" publication-format="electronic"><day>15</day><month>10</month><year>2024</year></pub-date>
<volume>81</volume>
<issue>1</issue>
<fpage>183</fpage>
<lpage>211</lpage>
<history>
<date date-type="received">
<day>27</day>
<month>1</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>09</day>
<month>8</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2024 The Authors.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_50090.pdf"></self-uri>
<abstract>
<p>Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data. This property makes it difficult for steganalysts&#x2019; powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation. However, using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations. In addition, these numbers may cluster in certain ranges. The hidden data in these clustered pixels will reduce the image quality, which steganalysis tools can detect. Therefore, this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego image. This paper employs the Adelson-Velsky and Landis (AVL) tree data structure algorithm to implement the randomization pixel selection technique for data concealment. The AVL tree algorithm provides several advantages for image steganography. Firstly, it ensures balanced tree structures, which leads to efficient data retrieval and insertion operations. Secondly, the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels, thereby preserving the stego image quality. The data structure employs the pixel indicator technique for Red, Green, and Blue (RGB) channel extraction. The green channel serves as the foundation for building a balanced binary tree. First, the sender identifies the colored cover image and secret data. The sender will use the two least significant bits (2-LSB) of RGB channels to conceal the data&#x2019;s size and associated information. The next step is to create a balanced binary tree based on the green channel. Utilizing the channel pixel indicator on the LSB of the green channel, we can conceal bits in the 2-LSB of the red or blue channel. The first four levels of the data structure tree will mask the data size, while subsequent levels will conceal the remaining digits of secret data. After embedding the bits in the binary tree level by level, the model restores the AVL tree to create the stego image. Ultimately, the receiver receives this stego image through the public channel, enabling secret data recovery without stego or crypto keys. This method ensures that the stego image appears unsuspicious to potential attackers. Without an extraction algorithm, a third party cannot extract the original secret information from an intercepted stego image. Experimental results showed high levels of imperceptibility and security.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Image steganography</kwd>
<kwd>pixel random selection (PRS)</kwd>
<kwd>AVL tree</kwd>
<kwd>peak signal-to-noise ratio (PSNR)</kwd>
<kwd>imperceptibility</kwd>
<kwd>capacity</kwd>
</kwd-group>
<funding-group>
<award-group id="awg1">
<funding-source>University Kebangsaan Malaysia</funding-source>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>As communication technology advances, public networks have seen an increase in digital media exchange, including images, movies, and audio. Digital media is susceptible to attacks such as eavesdropping, modification, privacy compromise, and theft of confidential information [<xref ref-type="bibr" rid="ref-1">1</xref>]. As data carriers, these images raise significant concerns about their security and confidentiality. Secure information is classified into cryptography, watermarking, and steganography. Cryptographers mainly focus on preventing intruders from breaking the encryption algorithm, which involves transforming plain text into something meaningless. Digital watermarking has been crucial in protecting copyright and intellectual property by embedding a unique watermark within digital content. Maintaining the invisibility of the watermark is essential for its effectiveness. Steganography protects the message from unauthorized access [<xref ref-type="bibr" rid="ref-2">2</xref>]. Cryptography provides one layer of security and confidentiality, while steganography adds an additional layer [<xref ref-type="bibr" rid="ref-3">3</xref>]. The steganographic message remains hidden from view. Even if code breakers suspect steganography in a transferred object, they cannot confirm it. Extracting the hidden message requires knowledge about the message, the file path, or the object&#x2019;s appearance. Without knowing the method used for hiding data within an object, code breakers will fail to pursue the purpose of the secret information. Together, the two techniques can complement each other [<xref ref-type="bibr" rid="ref-4">4</xref>].</p>
<p>Image steganography has two categories: spatial domain and frequency domain. In the spatial domain approach, the secret data to be embedded directly affects the pixel intensity values. Meanwhile, an appropriate transform is applied to the image in the frequency domain, and the resulting coefficients are altered to reflect the secret data [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-6">6</xref>]. Many techniques have been published to embed secret message bits in both spatial and frequency domain categories. The most familiar technique in the spatial domain is the least significant bit (LSB). Other methods such as pixel indicator techniques (PIT) [<xref ref-type="bibr" rid="ref-7">7</xref>], pixel locator sequence (PLS) techniques [<xref ref-type="bibr" rid="ref-8">8</xref>], pseudo-random number generator (PRNG) [<xref ref-type="bibr" rid="ref-9">9</xref>], and Rand-Stego pattern techniques are also used [<xref ref-type="bibr" rid="ref-10">10</xref>]. The main objective of steganalysis is to detect the transmission of steganographic communication between two relevant parties [<xref ref-type="bibr" rid="ref-11">11</xref>]. We can evaluate the performance of data hiding techniques using the peak signal-to-noise ratio (PSNR), mean square error (MSE), and Normalized Correlation Coefficient (NCC). We can also evaluate the data-hiding techniques with other parameters like hiding capacity and security [<xref ref-type="bibr" rid="ref-12">12</xref>,<xref ref-type="bibr" rid="ref-13">13</xref>].</p>
<p>According to the present research, hidden capacity is directly proportional to visual distortion and security. Therefore, there is scope for identifying a better solution. Current methods recommend using a PRNG to choose data-hiding locations. These methods require seeds for the PRNG to generate random sequence numbers to conceal bits of the secret messages. The main disadvantage of these methods is that they are expensive to generate non-repeating numbers, and the distribution of random numbers may not be typical. This issue aids in the detection of secret messages in digital media. A second disadvantage is that these methods need to share the seed key with the recipient. This research proposes a scheme to embed information bits in the LSB of non-consecutive pixels using a pixel indicator and an Adelson-Velsky and Landis (AVL) tree. This paper proposes a new random technique using an AVL tree data structure, pixel indicator, and 24-bit color RGB images as the cover medium instead of concealing the secret bits of confidential messages directly into the LSB of a sequence of pixels of data channels. The LSBs of random red and blue channels will conceal the secret message bits. The LSB of the green channel is used as an indicator because of human eye sensitivity [<xref ref-type="bibr" rid="ref-5">5</xref>].</p>
<p>The rest of the paper is organized as follows: Background studies are shown in <xref ref-type="sec" rid="s2">Section 2</xref>. The literature review is presented in <xref ref-type="sec" rid="s3">Section 3</xref>. The proposed method (AVL tree steganography, embedding, and extraction) is discussed in <xref ref-type="sec" rid="s4">Section 4</xref>. Performance analysis and discussion are presented in <xref ref-type="sec" rid="s5">Section 5</xref>. Finally, <xref ref-type="sec" rid="s6">Section 6</xref> presents the conclusion and future work.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Background Studies</title>
<p>In recent times, there has been a growing emphasis on cryptography and steganography. The need for secure communication and concerns about potential misuse, such as unauthorized distribution of digital information, have underscored the importance of integrating these techniques. As a result, it has become essential to have a comprehensive and well-defined understanding of both fields to implement them effectively. The primary focus of this paper is to address the security aspects associated with transferring text within images and to provide an overview of steganography techniques.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Cryptography</title>
<p>Cryptography is the art and science of sending messages so that only the intended recipient can read them [<xref ref-type="bibr" rid="ref-4">4</xref>]. In other words, cryptography aims to ensure that a message sent from a sender to a receiver remains confidential and secure. Even if someone intercepts the message, they should not be able to read it. Cryptography is a technique for protecting data using encryption formulas and functionalities so that the data held in a computer can only be interpreted by individuals who can decode it. Historically, cryptography was used mainly in the military and diplomacy until a few decades ago when the realization of digital data saw widespread application in many non-military fields such as e-commerce, e-banking, e-governance, telemedicine, e-shopping, and e-mailing.</p>
<p>There are three types of cryptographic schemes for securing data: public-key cryptography, private-key cryptography, and hash functions. The length and type of the keys used depend on the type of encryption algorithm.</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Symmetric Key Cryptography</title>
<p>Symmetric key cryptography is a traditional cryptography implemented as a private key algorithm. They can be divided into conventional or fast algorithms and block ciphers. Fast algorithms like Data Encryption Standard (DES) focus on reducing the encryption and decryption time with a limited key length. Their nature does not meet the requirements of the current epoch; therefore, they are not secure. Modern-designed block ciphers like Advance Encryption Standard (AES) apply the substitution&#x2013;permutation network structure. They are built using different transformations: substitution (S-boxes) and permutation (P-boxes) layers. They produce effective confusion, dispersion, and diffusion properties. The significant amounts of transformation rounds and complex S-boxes improve the security level of those ciphers. Generally, the main disadvantage of conventional symmetric key cryptography is the need for a secure key distribution channel to transmit key material over the network safely [<xref ref-type="bibr" rid="ref-14">14</xref>].</p>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Asymmetric Key Cryptography</title>
<p>Asymmetric key cryptography is a primary component in public key cryptographic algorithms like Rivest&#x2013;Shamir&#x2013;Adleman (RSA), ElGamal, and Elliptic Curve. The main advantages of asymmetric key cryptography are facilitating the management of keys and the secure exchange of keys. The main problem, however, is that it is much slower than symmetric key cryptography. Therefore, the common practice is to use asymmetric key cryptography only to exchange a session key between the two sides and then use the session key with symmetric key cryptography to secure the rest of the communication between the two sides. During the asymmetric key cryptography exchange phase, the two sides must establish the authenticity of the other side and ensure that no man-in-the-middle attacker impersonates the other side to downgrade the communication security level [<xref ref-type="bibr" rid="ref-15">15</xref>].</p>
</sec>
<sec id="s2_4">
<label>2.4</label>
<title>Steganography: Concealing Information</title>
<p>Steganography is the art of hiding a secret data message within an ordinary, non-secret file or other medium to avoid detection and later extraction at its destination [<xref ref-type="bibr" rid="ref-16">16</xref>]. The security of concealing data in images has attracted researchers&#x2019; attention to improving security aspects [<xref ref-type="bibr" rid="ref-17">17</xref>]. Researchers have proposed many steganography techniques to conceal secret messages in multimedia files such as images [<xref ref-type="bibr" rid="ref-18">18</xref>], audio files [<xref ref-type="bibr" rid="ref-19">19</xref>], video files [<xref ref-type="bibr" rid="ref-20">20</xref>], text [<xref ref-type="bibr" rid="ref-21">21</xref>], and internet protocols [<xref ref-type="bibr" rid="ref-22">22</xref>] to protect confidential data from attackers and transfer data without suspicion. Image steganography has two categories: spatial domain and frequency domain. In the spatial domain approach, the secret data to be embedded directly affects the pixel intensity values. Meanwhile, an appropriate transform is applied to the image in the frequency domain, and the resulting coefficients are altered to reflect the secret data [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-6">6</xref>].</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Literature Review</title>
<p>Steganography focuses on capacity, imperceptibility, and security to achieve the invisibility of secret data. Imperceptibility is achieved by embedding data without suspicion, using techniques like localizing regions that can withstand pixel changes. Security involves making hidden information impossible to recover, impenetrable, or unpredictable. Proposed methods like LSB, randomization, pixel indication, and hybrid techniques have improved steganographic security.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Least Significant Bit (LSB)</title>
<p>LSB steganography is a basic technique that hides information within images, videos, or audio files by replacing the least significant bit of each pixel or sample with a bit from the secret message. However, it may not be secure against advanced detection methods or attacks. Information hiding in an image aims to alter less critical information in the carrier image. The LSB is the most used in steganography. It is among the most straightforward and widely used spatial image steganographic techniques [<xref ref-type="bibr" rid="ref-23">23</xref>&#x2013;<xref ref-type="bibr" rid="ref-25">25</xref>]. The idea behind this technique is that the smallest components of an image only provide weak information, and human eyes cannot notice even minute changes in those components. The fundamental idea of the LSB embedding technique is shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Basic LSB technique</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-1.tif"/>
</fig>
<p>In most proposed methods, the secret message bits are randomly or sequentially inserted in the LSB of the pixel positions. The advantages of LSB steganography are: (i) it is the simplest steganographic method to embed a message into digital media such as an image or sound; (ii) it does not require transformation of the cover medium; (iii) the LSB replacement ensures that the stego medium is indistinguishable from the original cover medium; (iv) it is the fastest technique for embedding speed; and (v) it is also possible to partially decode or detect the hidden message without completely decoding the stego object [<xref ref-type="bibr" rid="ref-26">26</xref>,<xref ref-type="bibr" rid="ref-27">27</xref>]. Conversely, the major drawbacks of LSB steganography are: (i) the stego medium is vulnerable to relatively simple statistical analysis; (ii) the hidden data is easily destroyed by simple manipulation or processing of the stego object; (iii) it is easy to insert data by comparing the magnitude of the pixel value or the absolute LSB value with the secret data; (iv) the steganographic algorithm is weak against the known-plaintext attack; (v) the depth or positional representation of the secret data is not considered; and (vi) it frequently provides unsatisfactory visual quality of the stego image [<xref ref-type="bibr" rid="ref-28">28</xref>,<xref ref-type="bibr" rid="ref-29">29</xref>].</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Pixel Indicator Techniques</title>
<p>The PIT is a method to conceal secret messages by adjusting each pixel&#x2019;s least significant bit, allowing subtle color changes undetectable to the human eye. Various factors, such as this pixel&#x2019;s location within the image or its color value, are considered when selecting it. The digital image steganographic method uses odd/even pixel allocation to hide encrypted messages in even pixels, ensuring the change is made on the first or second LSB without affecting the base of odd or even in the stego image [<xref ref-type="bibr" rid="ref-30">30</xref>]. The proposed method in [<xref ref-type="bibr" rid="ref-31">31</xref>] shows an image coding technique that conceals information along a chosen pixel and, on its subsequent value (pixel &#x002B; 1). Two bits of the message can be concealed on each pixel based on a combination of these values. The authors of [<xref ref-type="bibr" rid="ref-25">25</xref>] use the indicator channel to select the data channel for hiding information. The technique depends on the length and parity bits of the secret message. If the length of the message is even, then data channel 1 is red, data channel 2 is green, and data channel 3 is blue; the three most significant bits (MSB) are considered indicators. Every bit of these three represents a channel (R, G, or B) that contains the hidden two bits of the secret message. For example, if three-MSB is 101, the red and blue channels will hide two secret bits; these will be hidden in the LSB of these channels. In [<xref ref-type="bibr" rid="ref-30">30</xref>], the method conceals secret information in red and blue channels using the LSB of the green channel as an indicator. The method uses 2, 2&#x2013;4, or 4 LSBs of red and blue channels for up to six bits.</p>
<p>In [<xref ref-type="bibr" rid="ref-31">31</xref>], the proposed technique divides a cover image into four blocks of storage area and decides if each desired pixel can be saved based on the red channel&#x2019;s three MSBs. If the three MSBs have a value of 111, all red, green, and blue channels are candidates for data storage. No data can be stored in bits with a value of 000. If the bits have a value of 011, both green and blue channels are candidates. Four zeros in the LSBs determine the number of hidden bits. Pixel indicator techniques in steganography use one or more pixels on a cover image to signal whether the image contains hidden data. If these pixels are modified, they can lose their significance, and the steganalysis can fail. The significant advantage of pixel indicator techniques from the steganographic point of view is that, unless the indicators are disabled, no other changes are made to the image. This is very useful when the steganographic capacity is low or when the steganographic algorithm works in an adaptive mode, concealing data bit by bit and needing to access the stego image many times for different data to be embedded. The main disadvantage of pixel-indicator techniques is that the secret message is not directly embedded in the cover image. Data embedding, extraction, and possibly the adaptive hiding algorithm are more complex than desired [<xref ref-type="bibr" rid="ref-32">32</xref>&#x2013;<xref ref-type="bibr" rid="ref-35">35</xref>].</p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Random Techniques</title>
<p>Randomization techniques enhance security in stego images by scattering secret message bits in a pattern known only to the method&#x2019;s owner, making this distribution undetectable by attackers. The least significant bit is used in a cover image to embed information in a random bit of a pixel using a PRNG. PRNG employs a 3-3-2 approach to hide a byte in a 24-bit color image, selecting random pixels and bit positions within the R, G, and B values. The authors in [<xref ref-type="bibr" rid="ref-36">36</xref>] proposed an efficient and adaptive data-hiding scheme based on a secure reference matrix. LSB steganography using a pixel locator sequence (PLS) with AES (Advance Encryption Standard) is suggested in [<xref ref-type="bibr" rid="ref-8">8</xref>], which uses a randomly generated secure reference matrix stored as a PLS file. PLS increases the security of LSB steganography by randomly distributing the secret data hidden in the image, making it difficult for unauthorized users to detect the hidden data. The PLS file is encrypted using AES. The random-bit selection algorithm in [<xref ref-type="bibr" rid="ref-37">37</xref>] enables users to conceal information within a cover image using randomly generated integers and user-specified parameters for the number of bits to be replaced in each pixel. The methods in [<xref ref-type="bibr" rid="ref-38">38</xref>&#x2013;<xref ref-type="bibr" rid="ref-40">40</xref>] employ a chaotic pseudorandom generator to randomly determine the position and hierarchy of image pixels for embedding information while encrypting the secret message. In [<xref ref-type="bibr" rid="ref-10">10</xref>], a random varied pattern key is generated automatically or manually saved in a file and shared with the recipient. Both methods in [<xref ref-type="bibr" rid="ref-30">30</xref>,<xref ref-type="bibr" rid="ref-41">41</xref>] use the Henon map function and stego keys to generate a random sequence of pixels to hide the bits of the secret messages. Random selections in embedding locations or values generate an equal probability of steganographic messages, enhancing security and resistance to steganalysis. The distribution of these techniques is independent of the cover image position. Advanced steganographic programs extract secret messages from known steganographic implementations. Multi-dimensional random algorithms, like those used in deterministic techniques, prevent the detection of structures, ensuring system resistance to attack. The main advantages of this technique are: 1) Increased safety. By introducing an element of unpredictability and randomness, random procedures in steganography make it more difficult for unauthorized users to detect hidden information. 2) Resistance to detection: Randomly dispersing the hidden data throughout the cover file makes it less evident and difficult to find. 3) Robustness: Spreading the secret information throughout the carrier file in several places increases its resistance to corruption or data loss. The main disadvantages of the random technique are: 1) Complexity: Random techniques typically require more complex algorithms and procedures than straightforward steganography approaches. 2) Reduced hiding capacity: Randomly distributing the hidden information may result in fewer bits accessible in each location, leading to a lower overall hiding capacity. 3) Increased computational overhead: Random approaches frequently require more computational resources to produce and control the randomization process [<xref ref-type="bibr" rid="ref-32">32</xref>,<xref ref-type="bibr" rid="ref-33">33</xref>].</p>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Hide Bits in Minimum and Maximum Color Intensity</title>
<p>In steganography, one approach is to hide bits of information by minimizing the color intensity of pixels in an image. By decreasing the color intensity of specific pixels, hidden data can be embedded without significantly altering the image&#x2019;s appearance. This method makes it difficult for third parties to detect the presence of hidden information, thus ensuring the security and confidentiality of the communication. Using the minimum color intensity of pixels, the hidden data can blend seamlessly with the cover media, making it virtually impossible for unauthorized users to detect or extract the hidden information [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>].</p>
<p>The concept of hiding bits at maximum color intensity refers to concealing information within an image by manipulating the RGB values of pixels. This technique takes advantage of the imperceptibility of human vision to slight variations in color within a specific range. Secret information can be embedded without significantly altering the image&#x2019;s appearance by adjusting each pixel&#x2019;s most significant and second significant bits. Utilizing the maximum color intensity of each pixel allows more data to be hidden within the image while maintaining high image quality and minimizing visual distortions.</p>
<p>This information-hiding method provides transparency, security, and robustness in data transmission within images. The primary objective of hiding bits in maximum color intensity is to ensure the security and integrity of information during transmission through images [<xref ref-type="bibr" rid="ref-45">45</xref>,<xref ref-type="bibr" rid="ref-46">46</xref>].</p>
<p>Ultimately, the choice depends on the trade-off between hiding capacity and imperceptibility. If the priority is to maximize the amount of information that can be hidden while accepting a slightly higher risk of detection, using the maximum color intensity may be preferred. On the other hand, if the goal is to minimize the chance of detection at the expense of hiding capacity, the minimum color intensity approach could be more suitable. The minimum color intensity technique also provides several advantages: 1) It can hide many significant or more visually noticeable bits. 2) The degradation from hiding these bits is more evenly distributed. This helps prevent localized noticeable degradation, as the human visual system is more sensitive to alterations in specific image regions. 3) It is more protective of the secret, as it must first modify the encoded image to access and reveal the original message. The maximum color intensity technique offers several advantages: 1) The message colors never lose intensity. 2) It can conceal less significant bits outside the range of easily noticeable degradation. 3) It works with all types of images. 4) It&#x2019;s easier and more efficient to implement.</p>
</sec>
<sec id="s3_5">
<label>3.5</label>
<title>Summary and Comparison</title>
<p>The main features, pros, and cons of the literature methods discussed in this paper can be summarized in the following table (<xref ref-type="table" rid="table-1">Table 1</xref>).</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Features, prose and, cos of literature techniques in steganography</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Technique</th>
<th>Features</th>
<th>Pros</th>
<th>Cons</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td>LSB</td>
<td><list list-type="bullet">
<list-item>
<p>LSB steganography is user-friendly and straightforward, making it accessible to those with limited technical expertise.</p></list-item>
</list></td>
<td><list list-type="bullet">
<list-item>
<p>Simplicity</p></list-item>
<list-item>
<p>Large hiding capacity</p></list-item>
<list-item>
<p>Imperceptibility.</p></list-item>
<list-item>
<p>They were used for grayscale images and RGB images.</p></list-item>
</list></td>
<td><list list-type="bullet">
<list-item>
<p>Vulnerability to detection.</p></list-item>
<list-item>
<p>Fragile due to image manipulations or compression.</p></list-item>
<list-item>
<p>Potential for accidental disclosure.</p></list-item>
<list-item>
<p>Limited security:</p></list-item>
</list></td>
</tr>
<tr>
<td>PIT</td>
<td><list list-type="bullet">
<list-item>
<p>The PIT uses one channel to indicate the hidden data in the other two channels.</p></list-item>
</list></td>
<td><list list-type="bullet">
<list-item>
<p>Increased capacity for data hiding.</p></list-item>
<list-item>
<p>Enhanced security.</p></list-item>
</list></td>
<td><list list-type="bullet">
<list-item>
<p>The complexity of method.</p></list-item>
<list-item>
<p>Increased detection risk.</p></list-item>
<list-item>
<p>Fragility and potential data loss.</p></list-item>
<list-item>
<p>Limited availability of tools and resources.</p></list-item>
<list-item>
<p>Reduced image quality.</p></list-item>
</list></td>
</tr>
<tr>
<td>Random techniques</td>
<td><list list-type="bullet">
<list-item>
<p>Random techniques are methods for selecting embeddings or covering changes at specific locations.</p></list-item>
</list></td>
<td><list list-type="bullet">
<list-item>
<p>Enhanced security.</p></list-item>
<list-item>
<p>Resistance to the statistical analysis.</p></list-item>
<list-item>
<p>Increased robustness: by distributing the hidden information over file.</p></list-item>
</list></td>
<td><list list-type="bullet">
<list-item>
<p>Increased complexity.</p></list-item>
<list-item>
<p>Reduced hiding capacity.</p></list-item>
<list-item>
<p>It increased computational overhead.</p></list-item>
</list></td>
</tr>
<tr>
<td>Hide Bits in Min/ MaxColor intensity</td>
<td></td>
<td><list list-type="bullet">
<list-item>
<p>Increased security.</p></list-item>
<list-item>
<p>Improved imperceptibility.</p></list-item>
<list-item>
<p>Resistance to simple detection techniques.</p></list-item>
</list></td>
<td><list list-type="bullet">
<list-item>
<p>They limited hiding capacity.</p></list-item>
<list-item>
<p>Susceptibility to more advanced detection techniques.</p></list-item>
<list-item>
<p>Vulnerability to image modifications.</p></list-item>
</list></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Proposed Method</title>
<p>This section emphasizes the modifications to conventional LSB steganography for high security. Our basic idea is to use an AVL tree for embedding the information bits and to use a random sequence of pixels for embedding the data bits to improve security while maintaining the capacity of the cover image. Firstly, the cover image must have more than enough pixels to conceal portions of the secret message, as it must be compatible with the text message length. Since each pixel will contain two bits of a secret message, the cover image must have more pixels than the message&#x2019;s length divided by two. Then, construct an AVL tree to embed the secret bits to minimize the distortion between the transformed and original cover images. The measure used to calculate the distortion is MSE. We modify the typical method of embedding the bits in random order. Instead of embedding two bits in sequential order at a time, this paper explores the possibilities of embedding two bits in non-sequential order, selecting the one that results in the slightest increase in MSE. The specific details of the method of concealing the secret bits are far too extensive to mention here, so we offer an outline in our paper.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Overview of the Proposed Method</title>
<p>This proposed steganography method increases the data payload and secures the secret data. The AVL tree is used to determine the exact location for the replacement, while the random RGB channel substitution is used to secure the planted secret data. Overall, this method eases the data detection process and can provide a high payload with minimum distortion to the cover image [<xref ref-type="bibr" rid="ref-47">47</xref>].</p>
<p>This paper uses an AVL tree, queue data structures, and pixel indicator channels of 24-bit RGB images in the LSB-based image steganography technique. The proposed algorithm embeds secret bits randomly in the LSBs of nonconsecutive pixels using the AVL tree without sharing a stego key or seed number used to generate a random number. The proposed randomization technique will depend on the selected pixels for hiding the bits that will be constructed based on the existing pixels in each level of the AVL tree. Furthermore, the green channel is selected to maintain the AVL tree construction without any change between the client and server. The construction of the AVL tree will be based on the green channel because the green color is more sensitive to human eyes than red and blue. Changing bits in the green channel will be detected by human eyes [<xref ref-type="bibr" rid="ref-48">48</xref>]. In addition, the green channel&#x2019;s LSB was selected to indicate the secret message bits&#x2019; position in the other channels.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Implementation Details</title>
<p>The first step is to read the cover image pixels&#x2019; RGB channels as decimal numbers. Then, a node is created to store information about the pixel containing the red, green, and blue decimal values. Additionally, the node will store the order of cover image pixels read from left to right and from top to bottom. The decimal value of the green channel will be used to construct the AVL tree because this value will remain unchanged and will not contain any hidden bits. The order of pixels will indicate the current position of the pixels after the extraction process.</p>
<p>The second step is constructing the AVL tree based on the green channel. For example, <xref ref-type="fig" rid="fig-2">Fig. 2</xref> shows the steps for inserting a secret bit into the green channel integer values of pixels from the first pixel to the fifth pixel.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>A sample steps for constructing an AVL tree (a) insert 164; (b) insert 202; (c) insert 55; (d) insert 78; (e) insert 102; (f) the balanced AVL tree</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-2.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-2">Fig. 2a</xref> shows the green channel&#x2019;s first inserting value (164). <xref ref-type="fig" rid="fig-2">Fig. 2b</xref>&#x2013;<xref ref-type="fig" rid="fig-2">d</xref> show the insertion of 202 to the right side since its value is greater than the parent&#x2019;s (164), then the insertion of 55 to the left side since its value is less than the parent&#x2019;s. When inserting 102, as shown in <xref ref-type="fig" rid="fig-2">Fig. 2e</xref>, the tree needs a single rotation to the left. The result will be shown when all table pixels are read into the AVL tree. As seen in <xref ref-type="fig" rid="fig-2">Fig. 2f</xref>, the pixel location will change according to the rebalancing of the tree.</p>

<p>The formation of the AVL tree is used to classify the cover image&#x2019;s pixel location and balance the tree. At the same time, the sorting is based on comparing the pixel values of the green channel belonging to the cover image. The next step involves converting the secret message from ASCII codes into a sequence of bits, simplifying the concealing process within the cover image pixels. The red or blue channel will be used to save two bits. The last step of this method is hiding the message in the pixels of the cover image by combining the AVL trees and the concept of random RGB selection with bits of a secret message. The position of the pixels is essential to determining the location of pixel modification. So, the position of the pixels classified at the top will use the pixels of the cover image with a small RGB value. This is important due to the probability of certain RGB combinations in the bright pixels, as noise is smaller than the RGB combinations in color images. This process is done incrementally, starting from the tree&#x2019;s top node with the proposed AVL trees and level by level, and is stored in a blue or red channel based on the LSB two bits of the green channel. The following section will show the algorithm of this proposed method.</p>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Embedding a Secret Message Algorithm</title>
<p>The following <xref ref-type="table" rid="table-2">Table 2</xref> shows the algorithm of the proposed method steps to embed a secret message into the cover image.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Embedding a secret messaging algorithm</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th colspan="2"><bold>Algorithm:</bold> Embedding a secret messaging algorithm</th>
</tr>
<tr>
<th colspan="2"><bold>Input:</bold> Cover image and text message.</th>
</tr>
<tr>
<th colspan="2"><bold>Output:</bold> Stego image</th>
</tr>
</thead>
<tbody>
<tr>
<td>1.</td>
<td>Start</td>
</tr>
<tr>
<td>2.</td>
<td>Read a Secret Message</td>
</tr>
<tr>
<td></td>
<td>2.1. &#x2002;Read the secret text message from a text file.</td>
</tr>
<tr>
<td></td>
<td>2.2.&#x2002; Define a &#x201C;strlen&#x201D; variable and store the length of the secret message inside this variable.</td>
</tr>
<tr>
<td></td>
<td>2.3. &#x2002;Convert the &#x201C;strlen&#x201D; into a binary number and store it in a new &#x201C;strlenbin&#x201D; variable with<break/>&#x2003;&#x2003; 30 digits.</td>
</tr>
<tr>
<td></td>
<td>2.4. &#x2002;Read the secret text message and store it in a &#x201C;secretmessage&#x201D; variable.</td>
</tr>
<tr>
<td></td>
<td>2.5. &#x2002;Convert the &#x201C;secretmessage&#x201D; characters into binary.</td>
</tr>
<tr>
<td></td>
<td>2.6. &#x2002;Concatenate the string from Steps 3 and 5, then store them in a &#x201C;strmesgbin&#x201D; variable.</td>
</tr>
<tr>
<td></td>
<td>2.7.&#x2002; Define an integer variable &#x201C; strlen2&#x201D;.</td>
</tr>
<tr>
<td></td>
<td>2.8. &#x2002;Set strlen2&#x003D;string length of (strmesgbin)</td>
</tr>
<tr>
<td>3.</td>
<td>Reading the pixels of a cover image.</td>
</tr>
<tr>
<td></td>
<td>3.1. &#x2002;Load the cover image from the selected image directory.</td>
</tr>
<tr>
<td></td>
<td>3.2. &#x2002;Read RGB image pixels as integers.</td>
</tr>
<tr>
<td></td>
<td>3.3. &#x2002;Build an AVL tree data structure balanced based on the green channel value.</td>
</tr>
<tr>
<td>4.</td>
<td>Concealing the bits of the secret message:</td>
</tr>
<tr>
<td></td>
<td>4.1. &#x2002;Define the needed node variable (neededNode) that indicates the maximum length of text<break/>&#x2003;&#x2003; that can be stored in the cover image.</td>
</tr>
<tr>
<td></td>
<td>4.2. &#x2002;Set neededNode &#x003D; strlen2 divided by 2.</td>
</tr>
<tr>
<td></td>
<td>4.3. &#x2002;If neededNode &#x003E;image size, then throw an exception (&#x201C;Message can&#x2019;t be hidden in this<break/>&#x2003;&#x2003; image&#x201D;)</td>
</tr>
<tr>
<td></td>
<td>4.4. &#x2002;Else, go to the next step.</td>
</tr>
<tr>
<td></td>
<td>4.5. &#x2002;Convert integer pixels of RGB from part C) into a binary system (red, green, and blue)</td>
</tr>
<tr>
<td></td>
<td>4.6. &#x2002;While (strmesgbin &#x003D; 0), and (AVL tree).</td>
</tr>
<tr>
<td></td>
<td>&#x2002;&#x2002;&#x2002;&#x2002;&#x2002;1. &#x2002;Read the LSB of the green-bit pixel channel of a node in the AVL tree</td>
</tr>
<tr>
<td></td>
<td>&#x2002;&#x2002;&#x2002;&#x2002;&#x2002;2. &#x2002;Read the 2 most significant bits from part B) Step 8.</td>
</tr>
<tr>
<td></td>
<td>&#x2002;&#x2002;&#x2002;&#x2002;&#x2002;3. &#x2002;If the LSB 2 bits of green pixel &#x003D;&#x003D; &#x201C;00&#x201D; or &#x201C;11&#x201D;</td>
</tr>
<tr>
<td></td>
<td>&#x2002;&#x2002;&#x2002;&#x2002;&#x2002;4. &#x2002;Then, store the 2 MSB encrypted bits in the LSB 2 bits of the red pixel</td>
</tr>
<tr>
<td></td>
<td>&#x2002;&#x2002;&#x2002;&#x2002;&#x2002;5. &#x2002;Else, store these 2 bits in LSB bits of the blue pixel.</td>
</tr>
<tr>
<td></td>
<td>&#x2002;&#x2002;&#x2002;&#x2002;&#x2002;6. &#x2002;update, strlen2 &#x003D; strlen2-2</td>
</tr>
<tr>
<td>5.</td>
<td>Store the AVL-tree back to the buffered image file:</td>
</tr>
<tr>
<td></td>
<td>5.1. &#x2002;&#x2002;Read the AVL-tree pixels from part C) and store them in a new AVL-tree that is<break/>&#x2003;&#x2003;&#x2002;balanced according to the pixel number (pixel_no)</td>
</tr>
<tr>
<td></td>
<td>5.2. &#x2002;&#x2002;Read the pixels from the last step into the image file.</td>
</tr>
<tr>
<td></td>
<td>5.3. &#x2002;&#x2002;Stego image is the output.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The comparison with other hiding schemes shows that the proposed scheme has higher imperceptibility while maintaining high visual quality. Additionally, the proposed method shows a high level of security since steganalysis tools can&#x2019;t detect it. It&#x2019;s better than other techniques since the secret message isn&#x2019;t encrypted like other methods and is resistant to steganalysis tools. An example is given for this algorithm, as shown in <xref ref-type="table" rid="table-2">Table 2</xref>. This example illustrates hiding the secret &#x201C;hello&#x201D; message inside the cover image.</p>

<p>The example starts with creating the AVL tree and then embedding the secret message &#x201C;hello&#x201D; inside the tree. This example will be illustrated in the following steps:
<list list-type="order">
<list-item>
<p>Read the secret text message from a file.</p></list-item>
<list-item>
<p>Set the length to 5, as &#x201C;hello&#x201D; has five characters.</p></list-item>
<list-item>
<p>Convert the length into binary with 30 digits:<bold> 01000 00000000 00000101</bold>.</p></list-item>
<list-item>
<p>Convert &#x201C;hello&#x201D; into binary, totaling up to 40 bits (shown in <xref ref-type="table" rid="table-3">Table 3</xref>).</p>
</list-item>
<list-item>
<p>The algorithm builds the AVL tree, as shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>. The construction of the AVL tree steps is illustrated in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>.</p>
</list-item>
</list></p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>&#x201C;hello&#x201D; ASCII code</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>h</th>
<th>e</th>
<th>l</th>
<th>l</th>
<th>o</th>
</tr>
</thead>
<tbody>
<tr>
<td>01101000</td>
<td>01100101</td>
<td>01101100</td>
<td>01101100</td>
<td>01101111</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Part of AVL tree for image bits of <xref ref-type="table" rid="table-4">Table 4</xref></title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-3.tif"/>
</fig>
<p><xref ref-type="table" rid="table-4">Table 4</xref> shows a sample of pixels&#x2019; cover image. These decimal values represent the decimal values for the RGB channel from pixels 1 to 40.</p>

<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Before embedding bits&#x2019; message</title>
</caption>
<table frame="hsides">
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<tbody>
<tr>
<td>Pixel</td>
<td>1</td>
<td>2</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>6</td>
<td>7</td>
<td>8</td>
</tr>
<tr>
<td>Red</td>
<td>163</td>
<td>204</td>
<td>173</td>
<td>157</td>
<td>255</td>
<td>212</td>
<td>233</td>
<td>7</td>
</tr>
<tr>
<td>Green</td>
<td>164</td>
<td>202</td>
<td>55</td>
<td>78</td>
<td>102</td>
<td>99</td>
<td>212</td>
<td>76</td>
</tr>
<tr>
<td>Blue</td>
<td>158</td>
<td>202</td>
<td>46</td>
<td>76</td>
<td>77</td>
<td>92</td>
<td>211</td>
<td>75</td>
</tr>
<tr>
<td>Pixel</td>
<td>9</td>
<td>10</td>
<td>11</td>
<td>12</td>
<td>13</td>
<td>14</td>
<td>15</td>
<td>16</td>
</tr>
<tr>
<td>Red</td>
<td>112</td>
<td>214</td>
<td>171</td>
<td>25</td>
<td>25</td>
<td>21</td>
<td>23</td>
<td>77</td>
</tr>
<tr>
<td>Green</td>
<td>10</td>
<td>222</td>
<td>59</td>
<td>7</td>
<td>10</td>
<td>99</td>
<td>22</td>
<td>75</td>
</tr>
<tr>
<td>Blue</td>
<td>15</td>
<td>212</td>
<td>47</td>
<td>9</td>
<td>7</td>
<td>92</td>
<td>21</td>
<td>76</td>
</tr>
<tr>
<td>Pixel</td>
<td>17</td>
<td>18</td>
<td>19</td>
<td>20</td>
<td>21</td>
<td>22</td>
<td>23</td>
<td>24</td>
</tr>
<tr>
<td>Red</td>
<td>13</td>
<td>214</td>
<td>171</td>
<td>157</td>
<td>208</td>
<td>23</td>
<td>72</td>
<td>123</td>
</tr>
<tr>
<td>Green</td>
<td>14</td>
<td>22</td>
<td>155</td>
<td>78</td>
<td>94</td>
<td>21</td>
<td>73</td>
<td>124</td>
</tr>
<tr>
<td>Blue</td>
<td>15</td>
<td>21</td>
<td>47</td>
<td>71</td>
<td>93</td>
<td>210</td>
<td>72</td>
<td>148</td>
</tr>
<tr>
<td>Pixel</td>
<td>25</td>
<td>26</td>
<td>27</td>
<td>28</td>
<td>29</td>
<td>30</td>
<td>31</td>
<td>32</td>
</tr>
<tr>
<td>Red</td>
<td>201</td>
<td>179</td>
<td>159</td>
<td>215</td>
<td>212</td>
<td>233</td>
<td>78</td>
<td>143</td>
</tr>
<tr>
<td>Green</td>
<td>199</td>
<td>53</td>
<td>178</td>
<td>112</td>
<td>199</td>
<td>202</td>
<td>77</td>
<td>134</td>
</tr>
<tr>
<td>Blue</td>
<td>199</td>
<td>48</td>
<td>176</td>
<td>79</td>
<td>191</td>
<td>201</td>
<td>76</td>
<td>148</td>
</tr>
<tr>
<td>Pixel</td>
<td>33</td>
<td>34</td>
<td>35</td>
<td>36</td>
<td>37</td>
<td>38</td>
<td>39</td>
<td>40</td>
</tr>
<tr>
<td>Red</td>
<td>202</td>
<td>173</td>
<td>151</td>
<td>253</td>
<td>223</td>
<td>231</td>
<td>75</td>
<td>220</td>
</tr>
<tr>
<td>Green</td>
<td>201</td>
<td>155</td>
<td>178</td>
<td>112</td>
<td>199</td>
<td>215</td>
<td>72</td>
<td>112</td>
</tr>
<tr>
<td>Blue</td>
<td>200</td>
<td>146</td>
<td>176</td>
<td>78</td>
<td>192</td>
<td>223</td>
<td>73</td>
<td>68</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Explanation of the example:</bold></p>
<p><bold>1. Preparation:</bold></p>
<p>The secret message &#x201C;hello&#x201D; has a length of 5 &#x003D; (101)<sub>2</sub> &#x003D; (0000000000 0000000000 0000000101)<sub>2</sub>, and the message &#x201C;hello&#x201D; in binary &#x003D; (0110100001100101011011000110110001101111)<sub>2</sub>.</p>
<p>After the secret message is concatenated with the binary length, the binary result will be: (0000000000000000000000000001010110100001100101011011000110110001101111).</p>
<p><bold>2. Embedding process:</bold></p>
<p>The secret bits representing the length of the message: <bold>000000000000000000000000000101</bold> will be embedded starting from the first level and up to the fourth level, which will then be followed by the secret message <bold>0110100001100101011011000110110001101111</bold>.</p>
<p>The embedding process starts by traversing the tree level by level, starting from the first level, the root node (green pixel is <bold>102</bold>). This pixel node contains <bold>(<italic>R:255, G:102, B:77, Pixel_no:5</italic>)</bold>. Converting the node into binary will give: (102)<sub>10</sub> &#x003D; (<bold><italic>1100110</italic></bold>)<sub>2</sub>, (255)<sub>10</sub> &#x003D; (<bold><italic>1111111</italic></bold>)<sub>2</sub>, and (77)<sub>10</sub> &#x003D; (<bold><italic>1001101</italic></bold>)<sub>2</sub>. Then, according to <xref ref-type="table" rid="table-4">Table 4</xref>, check the LSB two bits of the green channel, pixel 5. If it is equal to <bold><italic>00</italic></bold> or <bold><italic>11</italic>,</bold> then hide the two bits of the secret message in the <bold><italic>red</italic></bold> channel. Otherwise, the algorithm will hide the two secret bits in the <bold><italic>blue</italic></bold> channel.</p>

<p>According to the least significant two bits of the green value of pixel 5, which is (10), the two bits of the secret message from left (00) will be hidden in the blue channel of 77 value as highlighted in cyan in <xref ref-type="table" rid="table-4">Table 4</xref>. After modification of the blue channel value, the pixel will be changed from 77 &#x003D; (1001101)<sub>2</sub> to 76 &#x003D; (1001100) since the last two significant bits of the blue channel (<bold>01</bold>) were replaced by (<bold>00</bold>).</p>

<p>The following levels are considered for hiding the secret message bits:</p>
<p><bold>(112,10,15), (13,14,15), (174,53,48), (171,59,47), (77,175,76), (157,78,76), (212,99,92), (215,112,79), (143,134,148), (173,155,146), (201,199,199), (202,201,200), (204,202,201), (214,222,212), (25,7,9), (23,21,210), (75,72,73), (78,77,76), (208,94,93), (21,99,92)</bold> contain the secret message, while the pairs (151,178,176), (253,112,78), (231,215,223), (233,199,192), and (220,112,68) do not contain concealed bits. Note that the pairs of pixels containing no secret information are not used and, therefore, are stopped.</p>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Extracting the Secret Message</title>
<p>To extract the secret message from the stego image, the same algorithm will be rebuilt using the same techniques but in reverse order.</p>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Performance Analysis</title>
<p>This paper has experimented with the proposed techniques using various authentic color images and 24-bit BMP images of different sizes to represent the flexibility of the technique on different types of images. For experimental purposes, this paper used 24-bit images as a cover image to compare the resulting stego image with the original cover image in terms of quality and hiding capacity. For each image size, the proposed method embedded data equal to a lesser 50% and 40% of the size of the cover image to represent the quality and hiding capacity of the stego image with minimal change in the actual image. The sample images used for experimentation are shown in <xref ref-type="fig" rid="fig-4">Fig. 4a</xref>&#x2013;<xref ref-type="fig" rid="fig-4">c</xref>, and the corresponding resultant stego images are shown in <xref ref-type="fig" rid="fig-5">Fig. 5a</xref>&#x2013;<xref ref-type="fig" rid="fig-5">c</xref>.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Cover sample images (a) Tiffany; (b) Papper; (c) Baboon</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-4.tif"/>
</fig><fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Stego result images (a) Tiffany; (b) Pepper; (c) Baboon</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-5.tif"/>
</fig>
<p>MSE is the mean square error between the ith pixel of the cover image C and stego image S, and M and N are the image&#x2019;s dimensions.</p>
<sec id="s5_1">
<label>5.1</label>
<title>Experimental Environment</title>
<p>All examples of steganography discussed in this paper are limited to bitmap files. There are two reasons for this. First, working with bitmap files allows the manipulation of every bit of data in the file, and second, this provides a more accurate measurement of the capacity of the least significant bit available for secret message storage. However, the limitation of AVL tree steganography (hereafter will be called AVLTree-Steg) to one file type is arbitrary and was done to demonstrate the capabilities of steganography. Working with any file format is a simple exercise in code development. Several software programs were developed for this document to read and display the BMP image files produced on the Macintosh platform. Steganography is a technique used to hide files in digital media, such as images, videos, and audio. It can be used in image tools to hide files in digital images like BMP and JPEG, video tools in video files like AVI and MPEG, and audio tools in sound files like WAV and MP3. Some applications can hide files in executables, but this is more memory intensive. Most steganography tools are easy to handle and require no special knowledge. However, interface complexity can lead to confusion when introducing these tools.</p>
<p>Most steganography tools fall into the image, video, and audio categories. This paper will focus on images because many can be exchanged between clients simultaneously. Additionally, the size of images is preferable to other media, such as audio and video. The AVLTree-Steg program was written and compiled in Java using the Eclipse 2023 environment. Eclipse 2023 was chosen for the compiler platform due to its accessibility, cost-effectiveness, and cross-computer usability. No specific assembler command or function was used. The MacBook Pro (2021) and Enhanced IDE were utilized during the initial stages of the program. The development platform was an Apple M1 Pro with 16 megabytes of RAM and a 500-gigabyte hard disk.</p>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Evaluation Metrics</title>
<p>This section presents a review of existing evaluation metrics. Since they departed from one another, the following different evaluation metrics are categorized into three different groups.</p>
<sec id="s5_2_1">
<label>5.2.1</label>
<title>PSNR, MSE, and NCC Analysis</title>
<p>The metrics used to evaluate the approach are <italic>MSE</italic> and <italic>PSNR</italic>, as shown in <xref ref-type="disp-formula" rid="eqn-1">Eqs. (1)</xref> and <xref ref-type="disp-formula" rid="eqn-2">(2)</xref>. High values of the <italic>PSNR</italic> criterion are preferred for evaluating the stego image&#x2019;s quality. Here&#x2019;s the formula to compute <italic>MSE</italic> and <italic>PSNR</italic>:
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mi>P</mml:mi><mml:mi>S</mml:mi><mml:mi>N</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>10</mml:mn><mml:mtext>&#x00A0;</mml:mtext><mml:mi>l</mml:mi><mml:mi>o</mml:mi><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mn>10</mml:mn></mml:mrow></mml:msub><mml:mfrac><mml:msup><mml:mn>255</mml:mn><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mi>M</mml:mi><mml:mi>S</mml:mi><mml:mi>E</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula>
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mi>M</mml:mi><mml:mi>S</mml:mi><mml:mi>E</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>W</mml:mi></mml:mrow></mml:munderover><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi></mml:mrow></mml:munderover><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>Y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>W</mml:mi><mml:mi>X</mml:mi><mml:mi>H</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>The image&#x2019;s dimensions are denoted by the values <italic>W</italic> and <italic>H</italic>, the image coordinates by <italic>i</italic> and <italic>j</italic>, and the cover and stego images by <italic>X</italic> and <italic>Y</italic>. If the <italic>PSNR</italic> values are more than 50 dB, the images are considered high quality [<xref ref-type="bibr" rid="ref-12">12</xref>].</p>
<p><xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref> shows the embedding capacity, also known as &#x201C;embedding payload&#x201D;, refers to the proportion of the embedded secret bits in the cover image&#x2019;s pixels. The abbreviation <italic>ER</italic> stands for embedding rate.</p>
<p><disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mi>E</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mi>N</mml:mi><mml:mrow><mml:mi>W</mml:mi><mml:mi>X</mml:mi><mml:mi>H</mml:mi></mml:mrow></mml:mfrac><mml:mi>b</mml:mi><mml:mi>p</mml:mi><mml:mi>p</mml:mi></mml:math></disp-formula>where <italic>N</italic> is the number of hidden bits, <italic>W</italic> is the width, and <italic>H</italic> is the height of the cover image.</p>
<p>Normal Cross Correlation (NCC): The <italic>NCC</italic> value is calculated in <xref ref-type="disp-formula" rid="eqn-4">Eq. (4)</xref>. The Normalized Correlation Coefficient (NCC) can be used to assess the robustness of extraction results. If the <italic>NCC</italic> value is near 1, the likeness to the original message image is also close [<xref ref-type="bibr" rid="ref-13">13</xref>].</p>
<p><disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mi>N</mml:mi><mml:mi>C</mml:mi><mml:mi>C</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>W</mml:mi></mml:mrow></mml:munderover><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi></mml:mrow></mml:munderover><mml:mi>I</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>Y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2217;</mml:mo><mml:msup><mml:mi>I</mml:mi><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>Y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:msqrt><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>W</mml:mi></mml:mrow></mml:munderover><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi></mml:mrow></mml:munderover><mml:mi>I</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>Y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:msqrt><mml:msqrt><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>W</mml:mi></mml:mrow></mml:munderover><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi></mml:mrow></mml:munderover><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>Y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:msqrt></mml:mrow></mml:mfrac></mml:math></disp-formula>where <italic>W</italic> and <italic>H</italic> are the width and height of the image, <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>I</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>Y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> represents the coordination of the cover image and, <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msup><mml:mi>I</mml:mi><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>Y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mtext>represent the coordination of</mml:mtext></mml:mrow></mml:math></inline-formula> stego image.</p>
</sec>
<sec id="s5_2_2">
<label>5.2.2</label>
<title>Histogram Analysis</title>
<p>The security level of the proposed methods is evaluated by comparing the cover image histogram with the stego image. The method is considered secure if there is no significant difference between them. When the payload is small (2 KB) the histogram of the stego image of the three techniques is relatively similar to the cover image histogram, implying low distortion. This will be explained in the next section.</p>
<p>The distortion remained low when the payload capacity was increased (32 KB). Because one channel was left unaltered and two channels were used for the embedding procedure, those two channels bore the brunt of the histogram&#x2019;s distortion. On the other hand, the original cover image&#x2019;s histogram and the other channel&#x2019;s histogram are the same. This will be explained in more detail in the following section.</p>
</sec>
<sec id="s5_2_3">
<label>5.2.3</label>
<title>The Probability of Detection Using Statistical Attack</title>
<p>The stego images were subjected to statistical analytical attacks such as RS Analysis and Sample Pairs Analysis to determine the probabilities of detecting the stego images [<xref ref-type="bibr" rid="ref-49">49</xref>]. It is based on the idea that the statistical characteristics of the cover media, the unaltered file, and the stego media that contains hidden data are different. The stego image steganography replacement technique involves hiding information by modifying the least significant bit of pixel values in a digital image. This technique reduces the difference in frequency between adjacent colors, making the changes less noticeable to the human eye. However, the number of pairings remains the same, maintaining the image&#x2019;s visual quality. The confidentiality of encrypted hidden messages using cryptography technology can make the hidden information harder to detect through statistical analysis. Even though the chi-square detection technique can successfully locate images with sequentially embedded data, it will only work if the data are integrated consecutively. The only images that chi-square detection technology can find are those that have been continuously implanted with secret messages [<xref ref-type="bibr" rid="ref-50">50</xref>]. For the stego image to resist statistical attacks, it must achieve a probability of detection near zero (0). Steganalysis tools save time and offer new attack angles for forensic analysts. StegExpose is a real-world solution that efficiently analyzes LSB steganography images using proven attacks. Its focus is intelligently combining steganalytic methods for more accurate results [<xref ref-type="bibr" rid="ref-51">51</xref>].</p>
</sec>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>Details of Dataset</title>
<p>We use steganography to hide the secret message (binary text) in the cover images and generate the stego images. Each cover image will conceal 1000 random-length secret messages to ensure the safety of the steganography. Since a greater payload may lead to a larger payload, the secret message length is randomly selected from {2, 4, 8, 16, and 32} kilobytes by combining more than the file. This dataset is a collection of newsgroup documents. The ten newsgroups collection has become a popular data set for experiments in text applications of machine learning techniques, such as text classification and clustering. This paper will use the same dataset for the steganographic system. Each newsgroup file in the bundle represents a single newsgroup. Each message in a file is the text of some newsgroup document posted to that newsgroup. This is a list of the ten newsgroups: &#x201C;business,&#x201D; The categories include &#x201C;entertainment,&#x201D; &#x201C;food,&#x201D; &#x201C;graphics,&#x201D; &#x201C;historical,&#x201D; &#x201C;medical,&#x201D; &#x201C;politics,&#x201D; &#x201C;space,&#x201D; &#x201C;sport,&#x201D; and &#x201C;technology&#x201D; [<xref ref-type="bibr" rid="ref-52">52</xref>].</p>
<p>This paper&#x2019;s dataset contains 3000 RGB-BMP images, dimensions 512 &#x00D7; 512, for steganography, steganalysis, and similar image processing applications. The dataset includes various image captures such as &#x201C;paper,&#x201D; &#x201C;flowers,&#x201D; &#x201C;farmers,&#x201D; &#x201C;beach,&#x201D; &#x201C;birds,&#x201D; &#x201C;river,&#x201D; &#x201C;cow,&#x201D; &#x201C;grapes,&#x201D; &#x201C;strawberries,&#x201D; and &#x201C;trees.&#x201D; All images are color images with 512 &#x00D7; 512 resolutions from a regular, high-definition camera. Moreover, we randomly select an additional seven cover images, &#x201C;Tiffany,&#x201D; &#x201C;Pepper,&#x201D; and &#x201C;Baboon,&#x201D; from the internet as a benchmark. These images have pixel values whose size is 512 &#x00D7; 512, ensuring that all the resolutions of the cover images match those of the dataset. This paper uses the 3000 image matrices mentioned above as the cover images [<xref ref-type="bibr" rid="ref-53">53</xref>].</p>
<p>Finally, the number of cover image-containing stego images containing the secret message with a size of 16 KB, &#x201C;steganography,&#x201D; accounts for 10% of all steganographic images, thus leading to a total of 300 stego images generated by steganography methods.</p>
</sec>
<sec id="s5_4">
<label>5.4</label>
<title>Results and Discussion</title>
<p>The simulation results using both the LSB image steganography, pixel indicator technique, and the proposed method applied to the Tiffany, Pepper, and Baboon benchmarks are shown in this section. The histogram, PSNR, MSE, NCC, and file size analyses for the dataset are also presented. The salient outcomes are discussed as follows:</p>
<sec id="s5_4_1">
<label>5.4.1</label>
<title>Preparation</title>
<p>Select a set of cover images of varying sizes and content. These images represent a natural scene. Create a cover image that conceals a secret message. These messages are text files. We will load the AVL tree method. This technique uses the least significant bit (LSB) substitution method and random and pixel indicator techniques, where the least significant bits of pixel values are modified to encode the secret data.</p>
</sec>
<sec id="s5_4_2">
<label>5.4.2</label>
<title>Experimental Steps</title>
<p><italic>Step 1:</italic> Load a cover image into the software.</p>
<p><italic>Step 2:</italic> Apply the steganography algorithm to embed a secret message within the cover image.</p>
<p><italic>Step 3</italic>: Save the modified image as a stego image.</p>
<p><italic>Step 4</italic>: Repeat steps one to three for multiple cover images using the same secret message.</p>
<p><italic>Step 5</italic>: Randomize the order of the stego images to avoid bias.</p>
<p><italic>Step 6</italic>: Prepare a control group by selecting the original cover images without any embedded data.</p>
<p><italic>Step 7</italic>: Conduct statistical analysis or evaluation metrics to measure the effectiveness of the steganography technique.</p>
</sec>
<sec id="s5_4_3">
<label>5.4.3</label>
<title>Image Steganography Using Benchmarks from the Proposed Method Dataset</title>
<p>The results regarding the imperceptibility compared with similar techniques are shown in <xref ref-type="table" rid="table-5">Table 5</xref>. PSNR is another popular way of measuring the distortion of the cover image caused by embedding. It is the relationship between a signal&#x2019;s maximum value and distortion&#x2019;s noise power (MSE). A higher value of PSNR indicates better-quality embedding. As can be seen, the PSNR value (imperceptibility) of the proposed AVL tree method is highly satisfactory compared with other proposed methods. It fulfills the imperceptibility requirement at this stage since the MSE of this method converges to zero for all compared proposed methods. <xref ref-type="fig" rid="fig-6">Fig. 6</xref> shows the cover image &#x201C;Tiffany&#x201D; and the stego image after the proposed method is used.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Results of the AVL tree proposed method</title>
</caption>
<table frame="hsides">
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Cover capacity</th>
<th align="center" colspan="4">Tiffany</th>
<th align="center" colspan="2">Baboon</th>
<th align="center" colspan="3">Pepper</th>
</tr>
<tr>
<th><bold>Text file size (KB)</bold></th>
<th><bold>MSE</bold></th>
<th><bold>PSNR</bold></th>
<th><bold>NCC</bold></th>
<th><bold>MSE</bold></th>
<th><bold>PSNR</bold></th>
<th><bold>NCC</bold></th>
<th><bold>MSE</bold></th>
<th><bold>PSNR</bold></th>
<th><bold>NCC</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>0.0209</td>
<td>64.92</td>
<td>1.00</td>
<td>0.0218</td>
<td>64.75</td>
<td>1.00</td>
<td>0.0195</td>
<td>65.23</td>
<td>1.00</td>
</tr>
<tr>
<td>2</td>
<td>0.0392</td>
<td>62.20</td>
<td>1.00</td>
<td>0.0416</td>
<td>61.94</td>
<td>1.00</td>
<td>0.0373</td>
<td>62.42</td>
<td>1.00</td>
</tr>
<tr>
<td>4</td>
<td>0.0787</td>
<td>59.17</td>
<td>1.00</td>
<td>0.0820</td>
<td>58.99</td>
<td>1.00</td>
<td>0.0727</td>
<td>59.51</td>
<td>1.00</td>
</tr>
<tr>
<td>8</td>
<td>0.1573</td>
<td>56.16</td>
<td>1.00</td>
<td>0.1647</td>
<td>55.96</td>
<td>1.00</td>
<td>0.1466</td>
<td>56.49</td>
<td>1.00</td>
</tr>
<tr>
<td>16</td>
<td>0.3211</td>
<td>53.06</td>
<td>1.00</td>
<td>0.3249</td>
<td>53.01</td>
<td>1.00</td>
<td>0.2931</td>
<td>53.46</td>
<td>1.00</td>
</tr>
<tr>
<td>32</td>
<td>0.5720</td>
<td>50.56</td>
<td>1.00</td>
<td>0.5310</td>
<td>50.88</td>
<td>1.00</td>
<td>0.5326</td>
<td>50.87</td>
<td>1.00</td>
</tr>
</tbody>
</table>
</table-wrap><fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Tiffany&#x2019;s sample for Cover and Stego images (a) Cover image; (b) Stego image</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-6.tif"/>
</fig>
<p><xref ref-type="table" rid="table-5">Table 5</xref> shows the metric results (MSE, PSNR, and NCC) of the proposed AVL tree method, tested on benchmarks (Tiffany, Baboon, and Pepper) with different plaintext file sizes (1, 2, 4, 8, 16, and 32 kilobytes). It is evident from <xref ref-type="fig" rid="fig-7">Fig. 7</xref> that the PSNR values of the cover object are approximately the same as those of the stego image for all three RGB layers. This indicates that the proposed method does not damage the cover object, and the stego image quality is sufficient to resist attacks from any harmful intruder. Additionally, comparing the results across all RGB layers shows that the PSNR values do not vary significantly. This consistency is due to the AVL tree technique, which hides secret message bits randomly in the cover image without sharing a stego key, as discussed in this proposed method. This technique embeds the secret message bits into the two significant bits of the red and blue channels, resulting in similar statistics for both the cover and stego objects. We achieve this by alternately hiding the two bits, once in the red channel and the next time in the blue channel.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Tiffany.bmp (512 &#x00D7; 512) Histogram with a secret message size of 2 KB</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-7.tif"/>
</fig>
<p>The results of the proposed method are presented in line diagrams and tables, which authenticate the success of the proposed approach over existing methods. <xref ref-type="fig" rid="fig-7">Figs. 7</xref> through <xref ref-type="fig" rid="fig-12">12</xref> represent the histograms of cover images <italic>vs</italic>. stego images for the benchmarks (Tiffany, Baboon, and Pepper). These figures were captured (via screenshots) from the developed AVLTreeStego App. As shown in <xref ref-type="table" rid="table-5">Table 5</xref>, the benchmark results have a PSNR greater than 50 dB, indicating the high imperceptibility of the proposed method. Additionally, the mean standard error for this experiment is low, reflecting undetectable distortion and high image quality, with a Nice Cross-Correlation (NCC) of 1.0. This algorithm shows high imperceptibility because, when compared with recent research, the PSNR is consistently better than others except in studies [<xref ref-type="bibr" rid="ref-10">10</xref>] and [<xref ref-type="bibr" rid="ref-38">38</xref>]. In [<xref ref-type="bibr" rid="ref-38">38</xref>], the authors hide one character per pixel, whereas the AVL tree method hides only four bits. In [<xref ref-type="bibr" rid="ref-10">10</xref>], the image distortion is high due to a high MSE. The MSE of the AVL tree method is also better than that of other proposed methods, indicating high stego image quality. Furthermore, all compared methods use a stego key to conceal secret messages in the cover image, which must be shared with the recipient, but the AVL tree method does not. The capacity of this proposed method is also commendable.</p>
</sec>
<sec id="s5_4_4">
<label>5.4.4</label>
<title>Image Steganography Using Comparative Methods Benchmarks</title>
<p>In <xref ref-type="table" rid="table-6">Table 6</xref>, the results of the comparative methods [<xref ref-type="bibr" rid="ref-8">8</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>,<xref ref-type="bibr" rid="ref-30">30</xref>], and [<xref ref-type="bibr" rid="ref-36">36</xref>&#x2013;<xref ref-type="bibr" rid="ref-38">38</xref>] are listed and compared with the proposed AVL tree method. These methods were tested on different 24-bit RGB cover images of various sizes (256 &#x00D7; 256, 481 &#x00D7; 321, or 512 &#x00D7; 512) and with different secret message lengths (114 bytes, 2 kilobytes, 5.3 kilobytes, 8 kilobytes, 10 kilobytes, and 18 kilobytes).</p>
<table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>Comparison of MSE and PSNR of the proposed method (AVL tree) with other techniques</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td>Criteria</td>
<td>[<xref ref-type="bibr" rid="ref-8">8</xref>]</td>
<td>AVL tree</td>
<td>[<xref ref-type="bibr" rid="ref-9">9</xref>]</td>
<td>AVL tree</td>
<td>[<xref ref-type="bibr" rid="ref-10">10</xref>]</td>
<td>AVL tree</td>
<td>[<xref ref-type="bibr" rid="ref-30">30</xref>]</td>
<td>AVL tree</td>
<td>[<xref ref-type="bibr" rid="ref-36">36</xref>]</td>
<td>AVL tree</td>
<td>[<xref ref-type="bibr" rid="ref-37">37</xref>]</td>
<td>AVL tree</td>
<td>[<xref ref-type="bibr" rid="ref-38">38</xref>]</td>
<td>AVL tree</td>
</tr>
<tr>
<td>File size</td>
<td colspan="2">114 bytes</td>
<td colspan="2">18 KBytes</td>
<td colspan="2">18 KBytes</td>
<td colspan="2">10 KBytes</td>
<td colspan="2">8 KBytes</td>
<td colspan="2">5.3 KBytes</td>
<td colspan="2">2 KBytes</td>
</tr>
<tr>
<td>Image size</td>
<td colspan="2">512 &#x00D7; 512</td>
<td colspan="2">512 &#x00D7; 512</td>
<td colspan="2">512 &#x00D7; 512</td>
<td colspan="2">512 &#x00D7; 512</td>
<td colspan="2">481 &#x00D7; 32</td>
<td colspan="2">256 &#x00D7; 256</td>
<td colspan="2">512 &#x00D7; 512</td>
</tr>
<tr>
<td>PNSR</td>
<td>48.3</td>
<td>76.5</td>
<td>40.5</td>
<td>53.0</td>
<td>67.3</td>
<td>54.13</td>
<td>48.40</td>
<td>56.98</td>
<td>49.9</td>
<td>52.16</td>
<td>59.69</td>
<td>66.81</td>
<td>69.3</td>
<td>63.9</td>
</tr>
<tr>
<td>MSE</td>
<td>0.95</td>
<td>0.001</td>
<td>7.67</td>
<td>0.33</td>
<td>2.55</td>
<td>0.251</td>
<td>0.939</td>
<td>0.130</td>
<td>&#x2013;</td>
<td>0.396</td>
<td>0.007</td>
<td>0.014</td>
<td>0.01</td>
<td>0.026</td>
</tr>
<tr>
<td>Colored</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td>Share keys</td>
<td>Yes</td>
<td>No</td>
<td>Yes</td>
<td>No</td>
<td>Yes</td>
<td>No</td>
<td>Yes</td>
<td>No</td>
<td>Yes</td>
<td>No</td>
<td>Yes</td>
<td>No</td>
<td>Yes</td>
<td>No</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The methods were tested on the same samples (cover images and secret messages). The PSNR results of [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-9">9</xref>,<xref ref-type="bibr" rid="ref-30">30</xref>] and [<xref ref-type="bibr" rid="ref-36">36</xref>] are above 50 dB, while those of [<xref ref-type="bibr" rid="ref-10">10</xref>], and [<xref ref-type="bibr" rid="ref-37">37</xref>,<xref ref-type="bibr" rid="ref-38">38</xref>] are below 50 dB. All proposed methods were shared with the recipient using stego keys. Testing the same dataset revealed that the suggested method had a PSNR of over 50 dB. The proposed method does not share any stego keys. <xref ref-type="fig" rid="fig-7">Figs. 7</xref> to <xref ref-type="fig" rid="fig-12">12</xref> show some of the images&#x2019; histograms. The small payload (2 KB) (<xref ref-type="fig" rid="fig-7">Figs. 7</xref>, <xref ref-type="fig" rid="fig-9">9</xref>, and <xref ref-type="fig" rid="fig-11">11</xref>) resulted in a similar histogram for the stego image, where the payload capacity increased to 32 KB, resulting in low distortion as shown in <xref ref-type="fig" rid="fig-8">Figs. 8</xref>, <xref ref-type="fig" rid="fig-10">10</xref>, and <xref ref-type="fig" rid="fig-12">12</xref>.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Tiffany.bmp (512 &#x00D7; 512) Histogram with a secret message size of 32 KB</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-8.tif"/>
</fig><fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Baboon.bmp (512 &#x00D7; 512) Histogram with a secret message size of 2 KB</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-9.tif"/>
</fig><fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>Baboon.bmp (512 &#x00D7; 512) Histogram with a secret message size 32 KB</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-10.tif"/>
</fig><fig id="fig-11">
<label>Figure 11</label>
<caption>
<title>Pepper.bmp (512 &#x00D7; 512) Histogram with a secret message size of 2 KB</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-11.tif"/>
</fig>
<fig id="fig-12">
<label>Figure 12</label>
<caption>
<title>Pepper.bmp (512 &#x00D7; 512) Histogram with a secret message size of 32 KB</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-12.tif"/>
</fig>
</sec>
<sec id="s5_4_5">
<label>5.4.5</label>
<title>Image Steganography Using Benchmark of Proposed Methods</title>
<p>The probabilities of detecting the stego images with RS and chi-square using the StegoExpose tool [<xref ref-type="bibr" rid="ref-51">51</xref>] have averages of 0.05408144 for the RS Analysis and 0.13303362 for the chi-square analysis. When the same samples of the [<xref ref-type="bibr" rid="ref-8">8</xref>] method are tested with the proposed AVL tree data structure proposed method, the results show averages of 0.13303362 for the RS analysis and 0.05408144 for the chi-square analysis.</p>
<p>In <xref ref-type="table" rid="table-7">Table 7</xref>, the results of the comparative method [<xref ref-type="bibr" rid="ref-8">8</xref>] are provided for security analysis obtained for the sample of stego images in <xref ref-type="fig" rid="fig-13">Fig. 13</xref>.</p>
<table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>Security analysis comparison between [<xref ref-type="bibr" rid="ref-8">8</xref>] and AVL tree data structure proposed method</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Method</th>
<th align="center" colspan="2"> [<xref ref-type="bibr" rid="ref-8">8</xref>]</th>
<th align="center" colspan="2">AVL tree data structure method</th>
</tr>
</thead>
<tbody>
<tr>
<td>Images</td>
<td>Chi-Square</td>
<td>RS Analysis</td>
<td>Chi-Square</td>
<td>RS Analysis</td>
</tr>
<tr>
<td>Butterfly</td>
<td>0.02026724</td>
<td>0.02654193</td>
<td>0.25961672</td>
<td>0.16178021</td>
</tr>
<tr>
<td>Apple</td>
<td>0.29121700</td>
<td>0.01922108</td>
<td>0.24458866</td>
<td>0.01447541</td>
</tr>
<tr>
<td>Building</td>
<td>0.00509353</td>
<td>0.00480165</td>
<td>0.00315208</td>
<td>0.01529719</td>
</tr>
<tr>
<td>Fruit</td>
<td>0.02162384</td>
<td>0.02754041</td>
<td>0.02477702</td>
<td>0.02477294</td>
</tr>
<tr>
<td>Average</td>
<td>0.08455040</td>
<td>0.01952627</td>
<td>0.13303362</td>
<td>0.05408144</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-13">
<label>Figure 13</label>
<caption>
<title>Cover samples for proposed method reprinted with permission from Tiwari et al. [<xref ref-type="bibr" rid="ref-8">8</xref>]</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_50090-fig-13.tif"/>
</fig>
</sec>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Discussion</title>
<p>As mentioned in <xref ref-type="sec" rid="s2">Section 2</xref>, randomization techniques were used in many proposed methods to add more security to the hidden bits by selecting the pixels randomly. These techniques achieved random pixel selection differently. Many techniques use PRNG with seed keys like [<xref ref-type="bibr" rid="ref-9">9</xref>] and [<xref ref-type="bibr" rid="ref-37">37</xref>], while other proposed methods use mathematical equations to generate a random sequence number like [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-30">30</xref>], and [<xref ref-type="bibr" rid="ref-38">38</xref>]. The proposed methods [<xref ref-type="bibr" rid="ref-10">10</xref>,<xref ref-type="bibr" rid="ref-36">36</xref>] use patterns and matrices stored in files. All mentioned random techniques require sharing keys with the recipients. However, the method suggested in this paper does not share the stego key with the recipient to extract the secret data from the stego image, as it uses an AVL tree and queue data structure. The AVL tree data structure has the properties of sorted data and balanced node access, which is more efficient since accessing the tree nodes is O(log n). New integer nodes are added to the tree on the left side of the parent if their value is less than the parent node&#x2019;s value. Greater or equal values are placed on the right side after constructing the AVL tree, as shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>, based on the integer values of the green channel. This channel is sensitive to human eyes, so changes may be detected quickly. The traversal of the tree level by level can be done using a queue data structure. The root node is added to the queue. While the queue is not empty, access the root node and pop it from the queue. If the root has left or right nodes, push them to the queue. In this technique, the proposed method can access all nodes from top to bottom and from left to right, level by level, as shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>. These nodes [5, 3, 27, 15, 4, 19, &#x2026;, 38] are accessed randomly as tagged with the red numbers representing the pixels from the cover image. While traversing nodes of the tree from top to bottom, the 2-bit LSB of each red and blue channel will be altered with bits of length and secret message based on the two least significant bits of the green channel. The fluctuation between the red and blue channels to hide the message bits of a secret message depending on the two least significant bits of the green channel will enhance security because the sequence of hidden bits will not be in consecutive channels.</p>

<p>One of the main advantages of using the AVL tree data structure is sorting the object nodes in order. Traversing the AVL tree sequentially from left, parent, and right will result in an orderly printing of this tree. When the AVL tree in the figure is traversed, the result will be like 7, 10, 10, 14, 21, 22, &#x2026;, 215. This property is potent for sorting the color intensity in ascending order. So, when hiding two bits in LSB, the value of the red or blue channel will be incremented by &#x002B;3, &#x002B;2, &#x002B;1, or decremented by &#x2013;1, &#x2013;2, &#x2013;3, or unchanged. As a result, the changes in red and blue channels will be undetectable by attacker tools like StegoExpose. Furthermore, this proposed method uses traversal of the node of the AVL tree level by level to conceal the secret message bits in nonadjacent pixels to enhance the security level because when the bits are hidden in nonadjacent pixels, the attack tools, which depend on statistical analysis, cannot detect the existence of a bit or bits in these pixels.</p>
<p>When the AVL method is compared with the proposed method in [<xref ref-type="bibr" rid="ref-8">8</xref>], the tool detects one (Butterfly.bmp) image out of five from the sample in <xref ref-type="fig" rid="fig-13">Fig. 13</xref> that might have concealed data inside. However, it can detect the secret message, but the estimated file size was 37,008 bytes, which is not the correct size of the secret message because it was 114 bytes. Also, the extraction of secret messages cannot be done without an extraction algorithm. The AVL tree data structure showed strong security against the attack tool, although it doesn&#x2019;t use any encryption method to encrypt the secret message as in the method [<xref ref-type="bibr" rid="ref-8">8</xref>].</p>

<p>The chi-square statistical test is the foundation of the chi-square steganalysis algorithm, which compares the expected distribution of pixel values in a cover image to the distribution in an image under steganalysis. This method detects hidden information in steganographic methods, which often involve minor modifications to the image&#x2019;s statistical characteristics, such as shifting the pixel value distribution or adding correlations between nearby pixels [<xref ref-type="bibr" rid="ref-49">49</xref>]. Residual statistics (RS) refer to the statistical properties of differences between original cover media and stego media, obtained by subtracting the cover media from the stego media [<xref ref-type="bibr" rid="ref-13">13</xref>]. When the statistical results of both techniques are near zero, the attacker fails to detect the existence of the secret message in the stego images.</p>
<p>The proposed method was tested on a benchmark (Tiffany, Baboon, and Pepper) from the dataset, and the test showed high security after being checked by the StegoExpose tool. This tool 100% fails to detect secret messages in the cover images of traditional datasets (Baboon, Tiffany, Pepper) with different lengths of secret files (1, 2, 3, 4, 5, 8, 16, and 32 KB). When the chi-square test is applied to the sample images (Tiffany, Baboon, and Pepper) of the research using the StegExpose tool [<xref ref-type="bibr" rid="ref-51">51</xref>], the probability of detecting the stego images (Tiffany.bmp, Baboon.bmp, and Pepper.bmp) using Chi-square detection averages is 0.00683106. The results showed that chi-square failed to discover the existence of the hidden message in the stego image. Also, the suggested scheme shows that the system is resistant to RS attacks in various payloads. The probability of detecting the stego images (Tiffany.bmp, Baboon.bmp, and Pepper.bmp) using RS analysis averages is 0.09962817. The results showed that RS analysis failed to discover the hidden message in the stego image.</p>
<p>Authors in [<xref ref-type="bibr" rid="ref-8">8</xref>] use the Advance Encryption Standard (AES) algorithm to encrypt the message before hiding bits in the cover image to show that the proposed algorithm is highly secure. Still, the AVL tree data structure algorithm showed the same resistance to attackers with approximately the same results as <xref ref-type="table" rid="table-7">Table 7</xref> shows without encrypting the message.</p>

<p>It is feasible to spot possible alterations that point to the existence of steganographic content by comparing the histograms of the stego and cover images. Depending on the needs of the investigation, the entire image can be subjected to histogram-based steganalysis or just particular sections of interest. The presence of concealed information can be found by looking at the distribution of pixel values and finding disparities. It&#x2019;s crucial to remember that although histogram analysis might be helpful in steganalysis, it is not infallible.</p>
</sec>
<sec id="s7">
<label>7</label>
<title>Conclusion and Future Work</title>
<p>In conclusion, the current practice uses simple data structures that do not require a steganographic context or data modeling. This paper offers more sophisticated data structures, which can be considered robust against common steganalytic attacks. In steganography, a high PSNR indicates the hidden data is less detectable, making the stego image appear more like the original cover image. This ensures that the embedded data remains secure and undetected by casual observers or automated detection methods. Testing the AVLTree-Steg method on the benchmark demonstrates high imperceptibility, with the PSNR exceeding 50 dB for all tested benchmark step images. The MSE is critical in steganography as it quantifies the average squared difference between the cover and stego images. A lower MSE indicates that the stego image closely resembles the original cover image, reducing the likelihood of detecting hidden data. Minimal distortion is essential for maintaining the cover image&#x2019;s quality and ensuring the steganographic method&#x2019;s security and effectiveness.</p>
<p>The proposed method demonstrates a low MSE, indicating minimal distortion between the cover and stego images. The NCC measures the similarity between the original cover image and the stego image, with a value close to 1.0 indicating strong similarity. This NCC value is crucial as it guarantees the inconspicuousness of the embedded data and the preservation of the cover image integrity. All stego images in the benchmark exhibit an NCC of approximately 1.0. Moreover, when comparing the benchmark images to the stego images, the histograms of all channels closely match those of the cover images, indicating the method&#x2019;s excellent security.</p>
<p>Comparing the AVLTree-Steg method with other recent methods reveals high imperceptibility and large capacity. Furthermore, the proposed method has a high level of security, as steganalysis tools cannot detect it. This work uses an AVL tree in steganography to generate random pixel locations that conceal secret bits. This paper implements a randomization technique that eliminates the need for sharing stego keys, significantly reducing the risk of interception or unauthorized access. Steganography becomes inherently secure without the need for stego keys. One example of keyless steganography is using image-based techniques, where secret messages are hidden within the pixel values of an image. By slightly altering the least significant bits of the image&#x2019;s pixels, hidden data can be embedded without noticeable changes to image quality. This method allows the message to be extracted simply by reversing the pixel alterations. This paper demonstrates improved imperceptibility, by altering the red or blue pixels of the cover image to occur in a different order. This AVL tree contains information from top to bottom and left to right, enhancing the concealment method and significantly reducing the detectability of hidden data. The node-hiding process relies on the green channel, providing consistent results when analyzing the tree horizontally and level-by-level.</p>
<p>In the future, we can enhance capacity by concealing confidential data in all channels of the cover image and altering pixels based on various criteria. By distributing hidden data more evenly across the red, green, and blue channels, we can increase the overall capacity and improve the imperceptibility of the cover image. We can embed a higher volume of confidential information using this approach without compromising the visual quality of the cover image. Additionally, spreading the data across multiple channels reduces the likelihood of detection, as changes in pixel values are less concentrated and, therefore less noticeable. We can also encrypt sensitive bits before embedding them inside the cover image. We will also explore using alternative data structures, such as a hash, heap, stack, queue, or graph, to improve capacity, imperceptibility, efficiency, or security. These data structures can store a secret message that is extremely difficult to decipher. It is possible to further improve the security of a secret message by encrypting it with encryption algorithms. For instance, the Advanced Encryption Standard (AES) is widely used to secure sensitive data. AES is known for its robustness and efficiency, making it a popular choice for both government and commercial applications. By using AES, you can ensure that your message remains confidential and protected from unauthorized access. Finally, we can utilize compression algorithms, such as Huffman coding, to further reduce the encrypted messages, and improve the overall security of the method.</p>
</sec>
</body>
<back>
<ack>
<p>The authors would like to thank the editors and reviewers for their detailed review and insightful advice.</p>
</ack>
<sec><title>Funding Statement</title>
<p>This research was funded by the University Kebangsaan Malaysia.</p>
</sec>
<sec><title>Author Contributions</title>
<p>The authors confirm their contribution to the paper as follows: Study conception and design: Murad Njoum, Rossilawati Sulaiman, and Zarina Shukur; Analysis and interpretation of results: Murad Njoum; Draft manuscript preparation: Murad Njoum, Rossilawati Sulaiman, and Faizan Qamar. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability"><title>Availability of Data and Materials</title>
<p>The data and codes supporting this study&#x2019;s findings are available from the corresponding authors upon reasonable request.</p>
</sec>
<sec><title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare that there are no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V. K.</given-names> <surname>Trivedi</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Stalin</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Joshi</surname></string-name>, <string-name><given-names>M. H.</given-names> <surname>Alkinani</surname></string-name>, <string-name><given-names>P. K.</given-names> <surname>Shukla</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Gaur</surname></string-name></person-group>, &#x201C;<article-title>User data privacy in multimedia domain using 3-3 LSB-based color image steganography with RC4 and Bernoulli map protection</article-title>,&#x201D; <source>J. Electron. Imaging</source>, vol. <volume>31</volume>, no. <issue>3</issue>, <year>2022</year>, Art. no. 033021. doi: <pub-id pub-id-type="doi">10.1117/1.JEI.31.3.033021</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M. M.</given-names> <surname>Iqbal</surname></string-name>, <string-name><given-names>U.</given-names> <surname>Khadam</surname></string-name>, <string-name><given-names>K. J.</given-names> <surname>Han</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Han</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Jabbar</surname></string-name></person-group>, &#x201C;<article-title>A robust digital watermarking algorithm for text document copyright protection based on feature coding</article-title>,&#x201D; in <conf-name>2019 15th Int. Wirel. Commun. Mobile Comput. Conf. (IWCMC)</conf-name>, <publisher-loc>Tangier, Morocco</publisher-loc>, <publisher-name>IEEE</publisher-name>, <year>Jun. 2019</year>, pp. <fpage>1940</fpage>&#x2013;<lpage>1945</lpage>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K. C.</given-names> <surname>Nunna</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Marapareddy</surname></string-name></person-group>, &#x201C;<article-title>Secure data transfer through internet using cryptography and image steganography</article-title>,&#x201D; in <conf-name>2020 SoutheastCon</conf-name>, <publisher-loc>Raleigh, NC, USA</publisher-loc>, <publisher-name>IEEE</publisher-name>, vol. <volume>2</volume>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/SoutheastCon44009.2020.9368301</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V. B.</given-names> <surname>Savant</surname></string-name> and <string-name><given-names>R. D.</given-names> <surname>Kasar</surname></string-name></person-group>, &#x201C;<article-title>A review on network security and cryptography</article-title>,&#x201D; <source>Res. J. Eng. Technol.</source>, vol. <volume>12</volume>, no. <issue>4</issue>, pp. <fpage>110</fpage>&#x2013;<lpage>114</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.52711/2321-581X</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Akhila</surname></string-name> and <string-name><given-names>V. J.</given-names> <surname>Manoj</surname></string-name></person-group>, &#x201C;<article-title>Image steganography using pixel value differencing with modulus function and optimization</article-title>,&#x201D; in <conf-name>2022 4th Int. Conf. Smart Syst. Inventive Technol. (ICSSIT)</conf-name>, <publisher-loc>Tirunelveli, India</publisher-loc>, <year>2022</year>, pp. <fpage>1369</fpage>&#x2013;<lpage>1373</lpage>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Al-Shaarani</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Gutub</surname></string-name></person-group>, &#x201C;<article-title>Securing matrix counting-based secret-sharing involving crypto steganography</article-title>,&#x201D; <source>J. King Saud Univ.&#x2013;Comput. Inf. Sci.</source>, vol. <volume>34</volume>, no. <issue>9</issue>, pp. <fpage>6909</fpage>&#x2013;<lpage>6924</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1016/j.jksuci.2021.09.009</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>C. K.</given-names> <surname>Deo</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Singh</surname></string-name>, <string-name><given-names>D. K.</given-names> <surname>Singh</surname></string-name>, and <string-name><given-names>N. K.</given-names> <surname>Soni</surname></string-name></person-group>, &#x201C;<article-title>Developing a highly secure and high Capacity LSB steganography technique using PRNG</article-title>,&#x201D; in <conf-name>2020 Int. Conf. Comput. Perform. Eval. (ComPE)</conf-name>, <publisher-loc>Shillong, India</publisher-loc>, <year>2020</year>, pp. <fpage>136</fpage>&#x2013;<lpage>140</lpage>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Tiwari</surname></string-name> and <string-name><given-names>S. J.</given-names> <surname>Gangurde</surname></string-name></person-group>, &#x201C;<article-title>LSB steganography using pixel locator sequence with AES</article-title>,&#x201D; in <conf-name>2021 2nd Int. Conf. Secure Cyber Comput. Commun. (ICSCCC)</conf-name>, <publisher-loc>Jalandhar, India</publisher-loc>, <year>2021</year>, pp. <fpage>302</fpage>&#x2013;<lpage>307</lpage>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>U. M. E.</given-names> <surname>Ali</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Ali</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Sohrawordi</surname></string-name>, and <string-name><given-names>M. N.</given-names> <surname>Sultan</surname></string-name></person-group>, &#x201C;<article-title>A LSB based image steganography using random pixel and bit selection for high payload</article-title>,&#x201D; <source>Int. J. Math. Sci. Comput.</source>, vol. <volume>3</volume>, pp. <fpage>24</fpage>&#x2013;<lpage>31</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. H.</given-names> <surname>Abuhmaidan</surname></string-name>, <string-name><given-names>A. K.</given-names> <surname>Kayed</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Alrisia</surname></string-name></person-group>, &#x201C;<article-title>Steganography: A flexible embedded randomization technique</article-title>,&#x201D; <source>KSII Trans. Internet Inf. Syst.</source>, vol. <volume>17</volume>, no. <issue>1</issue>, pp. <fpage>120</fpage>&#x2013;<lpage>144</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.3837/tiis.2023.01.007</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Meg&#x00ED;as</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Mazurczyk</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Kuribayashi</surname></string-name></person-group>, &#x201C;<article-title>Data hiding and its applications: Digital watermarking and steganography</article-title>,&#x201D; <source>Appl. Sci.</source>, vol. <volume>11</volume>, no. <issue>22</issue>, <year>2021</year>, Art. no. 10928. doi: <pub-id pub-id-type="doi">10.3390/app112210928</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Panchikkil</surname></string-name>, <string-name><given-names>V. M.</given-names> <surname>Manikandan</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>A multi-directional pixel-swapping approach (MPSA) for entropy-retained reversible data hiding in encrypted images</article-title>,&#x201D; <source>Entropy</source>, vol. <volume>25</volume>, no. <issue>4</issue>, <year>2023</year>, Art. no. 563. doi: <pub-id pub-id-type="doi">10.3390/e25040563</pub-id>; <pub-id pub-id-type="pmid">37190351</pub-id></mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M. N. M.</given-names> <surname>Najih</surname></string-name>, <string-name><given-names>E. H.</given-names> <surname>Rachmawanto</surname></string-name>, <string-name><given-names>C. A.</given-names> <surname>Sari</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Astuti</surname></string-name></person-group>, &#x201C;<article-title>An improved secure image hiding technique using PN-sequence based on DCT-OTP</article-title>,&#x201D; in <conf-name>2017 1st Int. Conf. Inform. Comput. Sci. (ICICoS)</conf-name>, <publisher-loc>Semarang, Indonesia</publisher-loc>, <year>2017</year>, pp. <fpage>47</fpage>&#x2013;<lpage>52</lpage>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Santhanalakshmi</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Lakshana</surname></string-name>, and <string-name><given-names>G. M.</given-names> <surname>Shahitya</surname></string-name></person-group>, &#x201C;<article-title>Enhanced AES-256 cipher round algorithm for IoT applications</article-title>,&#x201D; <source>Sci. Temper</source>, vol. <volume>14</volume>, no. <issue>1</issue>, pp. <fpage>184</fpage>&#x2013;<lpage>190</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.58414/SCIENTIFICTEMPER.2023.14.1.22</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Dijesh</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Babu</surname></string-name>, and <string-name><given-names>Y.</given-names> <surname>Vijayalakshmi</surname></string-name></person-group>, &#x201C;<article-title>Enhancement of e-commerce security through asymmetric key algorithm</article-title>,&#x201D; <source>Comput. Commun.</source>, vol. <volume>153</volume>, no. <issue>7</issue>, pp. <fpage>125</fpage>&#x2013;<lpage>134</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comcom.2020.01.033</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Wazirali</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Alasmary</surname></string-name>, <string-name><given-names>M. M.</given-names> <surname>Mahmoud</surname></string-name>, and <string-name><given-names>A.</given-names> <surname>Alhindi</surname></string-name></person-group>, &#x201C;<article-title>An optimized steganography hiding capacity and imperceptibly using genetic algorithms</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>7</volume>, pp. <fpage>133496</fpage>&#x2013;<lpage>133508</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2019.2941440</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Maheswari</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Siva</surname></string-name>, and <string-name><given-names>G.</given-names> <surname>Nalinipriya</surname></string-name></person-group>, &#x201C;<article-title>An innovative model for secure environment using steganography</article-title>,&#x201D; in <conf-name>2022 8th Int. Conf. Smart Struct. Syst. (ICSSS)</conf-name>, <publisher-loc>Chennai, India</publisher-loc>, <year>2022</year>, pp. <fpage>1</fpage>&#x2013;<lpage>5</lpage>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. A.</given-names> <surname>Almayyahi</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Sulaiman</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Qamar</surname></string-name>, and <string-name><given-names>A. E.</given-names> <surname>Hamzah</surname></string-name></person-group>, &#x201C;<article-title>High-security image steganography technique using XNOR operation and fibonacci algorithm</article-title>,&#x201D; <source>Int. J. Adv. Comput. Sci. Appl.</source>, vol. <volume>11</volume>, no. <issue>10</issue>, pp. <fpage>511</fpage>&#x2013;<lpage>522</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.14569/issn.2156-5570</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. H.</given-names> <surname>Ali</surname></string-name>, <string-name><given-names>L. E.</given-names> <surname>George</surname></string-name>, <string-name><given-names>A. A.</given-names> <surname>Zaidan</surname></string-name>, and <string-name><given-names>M. R.</given-names> <surname>Mokhtar</surname></string-name></person-group>, &#x201C;<article-title>High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain</article-title>,&#x201D; <source>Multimed. Tool Appl.</source>, vol. <volume>77</volume>, no. <issue>23</issue>, pp. <fpage>31487</fpage>&#x2013;<lpage>31516</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1007/s11042-018-6213-0</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Zhao</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Liu</surname></string-name>, and <string-name><given-names>C.</given-names> <surname>Feng</surname></string-name></person-group>, &#x201C;<article-title>A video steganography method based on transform block decision for H. 265/HEVC</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>9</volume>, pp. <fpage>55506</fpage>&#x2013;<lpage>55521</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2021.3059654</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. A.</given-names> <surname>Majeed</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Sulaiman</surname></string-name>, and <string-name><given-names>Z.</given-names> <surname>Shukur</surname></string-name></person-group>, &#x201C;<article-title>New text steganography technique based on part-of-speech tagging and format-preserving encryption</article-title>,&#x201D; <source>KSII Trans. Internet Inf. Syst.</source>, vol. <volume>18</volume>, no. <issue>1</issue>, pp. <fpage>170</fpage>&#x2013;<lpage>191</lpage>, <year>2024</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O. H.</given-names> <surname>Alhabeeb</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Fauzi</surname></string-name>, and <string-name><given-names>R.</given-names> <surname>Sulaiman</surname></string-name></person-group>, &#x201C;<article-title>Developing a novel DNA-based steganography algorithm using random table generation with segmentation</article-title>,&#x201D; <source>Multimed. Tools Appl.</source>, vol. <volume>83</volume>, no. <issue>14</issue>, pp. <fpage> 40529</fpage>&#x2013;<lpage>40567</lpage>, <year>Apr. 2024</year>. doi: <pub-id pub-id-type="doi">10.1007/s11042-023-16699-7</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Y. P.</given-names> <surname>Astuti</surname></string-name>, <string-name><given-names>E. H.</given-names> <surname>Rachmawanto</surname></string-name>, and <string-name><given-names>C. A.</given-names> <surname>Sari</surname></string-name></person-group>, &#x201C;<article-title>Simple and secure image steganography using LSB and triple XOR operation on MSB</article-title>,&#x201D; in <conf-name>2018 Int. Conf. Inf. Commun. Technol. (ICOIACT)</conf-name>, <publisher-loc>Yogyakarta, Indonesia</publisher-loc>, <year>2018</year>, pp. <fpage>191</fpage>&#x2013;<lpage>195</lpage>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Ahmed</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Ahmed</surname></string-name></person-group>, &#x201C;<article-title>A secure image steganography using LSB and double XOR operations</article-title>,&#x201D; <source>Int. J. Comput. Sci. Net.</source>, vol. <volume>20</volume>, no. <issue>5</issue>, pp. <fpage>139</fpage>&#x2013;<lpage>139</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>N. M.</given-names> <surname>Al-Aidroos</surname></string-name> and <string-name><given-names>H. A.</given-names> <surname>Bahamish</surname></string-name></person-group>, &#x201C;<article-title>Image steganography based on LSB matching and image enlargement</article-title>,&#x201D; in <conf-name>2019 First Int. Conf. Intell. Comput. Eng. (ICOICE)</conf-name>, <publisher-loc>Hadhramout, Yemen</publisher-loc>, <year>2019</year>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Baso</surname></string-name></person-group>, &#x201C;<article-title>Performance analysis of the last significant bit (LSB) method in steganography for data hiding in image data</article-title>,&#x201D; <source>J. Secur., Comput., Inf., Embedded, Netw., Intell. Syst.</source>, pp. <fpage>58</fpage>&#x2013;<lpage>62</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.61220/scientist.v1i2.20234</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Bilgaiyan</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Ahmad</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Sagnika</surname></string-name></person-group>, &#x201C;<article-title>Adaptive image steganography using rotating color channels and inverted LSB substitution</article-title>,&#x201D; <source>SN Comput. Sci.</source>, vol. <volume>4</volume>, no. <issue>5</issue>, <year>2023</year>, Art. no. 565. doi: <pub-id pub-id-type="doi">10.1007/s42979-023-01949-0</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y. Y.</given-names> <surname>Demircan</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Ozekes</surname></string-name></person-group>, &#x201C;<article-title>A novel LSB steganography technique using image segmentation</article-title>,&#x201D; <source>J. Univers. Comput. Sci. (JUCS)</source>, vol. <volume>30</volume>, no. <issue>3</issue>, pp. <fpage>308</fpage>&#x2013;<lpage>332</lpage>, <year>2024</year>. doi: <pub-id pub-id-type="doi">10.3897/jucs.105702</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A. K.</given-names> <surname>Patel</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Vekariya</surname></string-name></person-group>, &#x201C;<article-title>A literature review on image quality and embedding payload for image steganography</article-title>,&#x201D; in <conf-name>AIP Conf. Proc.</conf-name>, <publisher-name>AIP Publishing</publisher-name>, <year>Dec. 2023</year>, vol. <volume>2855, no. 1</volume>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N. A. F.</given-names> <surname>Abbas</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Abdulredha</surname></string-name>, <string-name><given-names>R. K.</given-names> <surname>Ibrahim</surname></string-name>, and <string-name><given-names>A. H.</given-names> <surname>Ali</surname></string-name></person-group>, &#x201C;<article-title>Security and imperceptibility improving of image steganography using pixel allocation and random function techniques</article-title>,&#x201D; <source>Int. J. Electr. Comput. Eng.</source>, vol. <volume>12</volume>, no. <issue>1</issue>, pp. <fpage>694</fpage>&#x2013;<lpage>705</lpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Joshi</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Gill</surname></string-name>, and <string-name><given-names>R.</given-names> <surname>Yadav</surname></string-name></person-group>, &#x201C;<article-title>A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the grayscale image</article-title>,&#x201D; <source>J. Comput. Netw. Commun.</source>, vol. <volume>2018</volume>, no. <issue>8</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>10</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1155/2018/9475142</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Ghoul</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Sulaiman</surname></string-name>, and <string-name><given-names>Z.</given-names> <surname>Shukur</surname></string-name></person-group>, &#x201C;<article-title>A review on security techniques in image steganography</article-title>,&#x201D; <source>Int. J. Adv. Comput. Sci. Appl.</source>, vol. <volume>14</volume>, no. <issue>6</issue>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.14569/issn.2156-5570</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Kuznetsov</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Frontoni</surname></string-name>, and <string-name><given-names>K.</given-names> <surname>Chernov</surname></string-name></person-group>, &#x201C;<article-title>Beyond traditional steganography: Enhancing security and performance with spread spectrum image steganography</article-title>,&#x201D; <source>Appl. Intell.</source>, vol. <volume>54</volume>, no. <issue>7</issue>, pp. <fpage>5253</fpage>&#x2013;<lpage>5277</lpage>, <year>2024</year>. doi: <pub-id pub-id-type="doi">10.1007/s10489-024-05415-z</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y. G.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>B. P.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y. H.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>W. M.</given-names> <surname>Shi</surname></string-name>, and <string-name><given-names>X.</given-names> <surname>Liao</surname></string-name></person-group>, &#x201C;<article-title>Efficient color image encryption by color-grayscale conversion based on steganography</article-title>,&#x201D; <source>Multimed. Tools Appl.</source>, vol. <volume>82</volume>, no. <issue>7</issue>, pp. <fpage>10835</fpage>&#x2013;<lpage>10866</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s11042-022-13689-z</pub-id>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Rahmani</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Mohammadpour</surname></string-name></person-group>, &#x201C;<article-title>High hiding capacity steganography method based on pixel indicator technique</article-title>,&#x201D; in <conf-name>2017 5th Iranian Joint Congress Fuzzy Intell. Syst. (CFIS)</conf-name>, <year>2017</year>, pp. <fpage>144</fpage>&#x2013;<lpage>149</lpage>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Zhang</surname></string-name>, and <string-name><given-names>L.</given-names> <surname>Harn</surname></string-name></person-group>, &#x201C;<article-title>An efficient and adaptive data-hiding scheme based on secure random matrix</article-title>,&#x201D; <source>PLoS One</source>, vol. <volume>14</volume>, no. <issue>10</issue>, <year>2019</year>, Art. no. 222892. doi: <pub-id pub-id-type="doi">10.1371/journal.pone.0222892</pub-id>; <pub-id pub-id-type="pmid">31577802</pub-id></mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Gahan</surname></string-name> and <string-name><given-names>G. D.</given-names> <surname>Devanagavi</surname></string-name></person-group>, &#x201C;<article-title>A secure steganography model using random-bit select algorithm</article-title>,&#x201D; in <conf-name>2020 Third Int. Conf. Adv. Electron., Comput. Commun. (ICAECC)</conf-name>, <publisher-loc>Bengaluru, India</publisher-loc>, <year>2020</year>, pp. <fpage>1</fpage>&#x2013;<lpage>5</lpage>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Kordov</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Zhelezov</surname></string-name></person-group>, &#x201C;<article-title>Steganography in color images with random order of pixel selection and encrypted text message embedding</article-title>,&#x201D; <source>PeerJ Comput. Sci.</source>, vol. <volume>7</volume>, no. <issue>11</issue>, <year>2021</year>, Art. no. 380. doi: <pub-id pub-id-type="doi">10.7717/peerj-cs.380</pub-id>; <pub-id pub-id-type="pmid">33817027</pub-id></mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Wu</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>A novel scheme for random sequential high-capacity data hiding based on PVD and LSB</article-title>,&#x201D; <source>Signal, Image Video Process.</source>, pp. <fpage>1</fpage>&#x2013;<lpage>11</lpage>, <year>2023</year>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. K.</given-names> <surname>Abdul-Hussein</surname></string-name> and <string-name><given-names>H. T. S.</given-names> <surname>ALRikabi</surname></string-name></person-group>, &#x201C;<article-title>Secured transfer and storage image data for cloud communications</article-title>,&#x201D; <source>Int. J. Online Biomed. Eng.</source>, vol. <volume>19</volume>, no. <issue>6</issue>, pp. <fpage>4</fpage>&#x2013;<lpage>17</lpage>, <year>2023</year>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Song</surname></string-name>, <string-name><given-names>A. A. A.</given-names> <surname>El-Latif</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhao</surname></string-name>, and <string-name><given-names>B.</given-names> <surname>Abd-El-Atty</surname></string-name></person-group>, &#x201C;<article-title>Reversibly selective encryption for medical images based on coupled chaotic maps and steganography</article-title>,&#x201D; <source>Complex Intell. Syst.</source>, vol. <volume>10</volume>, no. <issue>2</issue>, pp. <fpage>2187</fpage>&#x2013;<lpage>2213</lpage>, <year>2024</year>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Horng</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Xu</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Chang</surname></string-name>, and <string-name><given-names>C.</given-names> <surname>Chang</surname></string-name></person-group>, &#x201C;<article-title>An efficient data-hiding scheme based on multidimensional Mini-SuDoKu</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>20</volume>, no. <issue>9</issue>, <year>2020</year>, Art. no. 2739. doi: <pub-id pub-id-type="doi">10.3390/s20092739</pub-id>; <pub-id pub-id-type="pmid">32403350</pub-id></mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Shao</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Liu</surname></string-name>, and <string-name><given-names>D.</given-names> <surname>Shen</surname></string-name></person-group>, &#x201C;<article-title>A novel steganography scheme for color image based on HLS translation</article-title>,&#x201D; <source>J. Phys.: Conf. Ser.</source>, vol. <volume>2025</volume>, no. <issue>1</issue>, <year>2021</year>, Art. no. 12058. doi: <pub-id pub-id-type="doi">10.1088/1742-6596/2025/1/012058</pub-id>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Pan</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Qin</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Tan</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Xiang</surname></string-name>, and <string-name><given-names>G.</given-names> <surname>Hou</surname></string-name></person-group>, &#x201C;<article-title>A video coverless information hiding algorithm based on semantic segmentation</article-title>,&#x201D; <source>EURASIP J. Image Video Process.</source>, vol. <volume>2020</volume>, no. <issue>1</issue>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1186/s13640-020-00512-8</pub-id>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Q.</given-names> <surname>Jiang</surname></string-name></person-group>, &#x201C;<article-title>An image hiding algorithm based on bit plane and two-dimensional code</article-title>,&#x201D; in <conf-name>2021 Third Int. Conf. Intell. Commun. Technol. Virtual Mobile Netw. (ICICV)</conf-name>, <publisher-loc>Tirunelveli, India</publisher-loc>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Tang</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Nie</surname></string-name>, <string-name><given-names>C. M.</given-names> <surname>Pun</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Yao</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Yu</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Color image reversible data hiding with double-layer embedding</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>6915</fpage>&#x2013;<lpage>6926</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2020.2964264</pub-id>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. T.</given-names> <surname>Elshoush</surname></string-name>, <string-name><given-names>M. M.</given-names> <surname>Mahmoud</surname></string-name>, and <string-name><given-names>A.</given-names> <surname>Altigani</surname></string-name></person-group>, &#x201C;<article-title>A new high capacity and secure image realization steganography based on ASCII code matching</article-title>,&#x201D; <source>Multimed. Tools Appl.</source>, vol. <volume>81</volume>, no. <issue>4</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>47</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1007/s11042-021-11741-y</pub-id>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Deshmukh</surname></string-name> and <string-name><given-names>D. G.</given-names> <surname>Kurundkar</surname></string-name></person-group>, &#x201C;<article-title>Video steganography using edge detection techniques</article-title>,&#x201D; in <conf-name>Proc. Int. Conf. Commun. Inf. Process. (ICCIP)</conf-name>, <publisher-loc>Chongqing, China</publisher-loc>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C. C.</given-names> <surname>Chang</surname></string-name>, <string-name><given-names>G. D.</given-names> <surname>Su</surname></string-name>, <string-name><given-names>C. C.</given-names> <surname>Lin</surname></string-name>, and <string-name><given-names>Y. H.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>Position-aware guided hiding data scheme with reversibility and adaptivity for dual images</article-title>,&#x201D; <source>Symmetry</source>, vol. <volume>14</volume>, no. <issue>3</issue>, <year>2022</year>, Art. no. 509. doi: <pub-id pub-id-type="doi">10.3390/sym14030509</pub-id>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I. H.</given-names> <surname>Pan</surname></string-name>, <string-name><given-names>K. C.</given-names> <surname>Liu</surname></string-name>, and <string-name><given-names>C. L.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Chi-square detection for PVD steganography</article-title>,&#x201D; <source>2020 Int. Symp. Comput., Consumer Control</source>, no. <issue>3C)</issue>, pp. <fpage>30</fpage>&#x2013;<lpage>33</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/IS3C50286.2020</pub-id>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Boehm</surname></string-name></person-group>, &#x201C;<article-title>Stegexpose-A tool for detecting LSB steganography</article-title>,&#x201D; <year>2014</year>, <italic>arXiv:1410.6656</italic>.</mixed-citation></ref>
<ref id="ref-52"><label>[52]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Baxter</surname></string-name></person-group>, &#x201C;<article-title>Dataset text document classification</article-title>,&#x201D; <year>2020</year>. <comment>Accessed: Jun. 8, 2020</comment>. [Online]. Available: <ext-link ext-link-type="uri" xlink:href="https://www.kaggle.com/datasets/sunilthite/text-document-classification-dataset">https://www.kaggle.com/datasets/sunilthite/text-document-classification-dataset</ext-link></mixed-citation></ref>
<ref id="ref-53"><label>[53]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Al-Jarrah</surname></string-name></person-group>, &#x201C;<article-title>RGB-BMP steganalysis dataset</article-title>,&#x201D; <source>Mendeley Data</source>, vol. <volume>V1</volume>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.17632/sp4g8h7v8k.1</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>