Journal of Cyber Security and Risk Auditing

Journal of Cyber Security and Risk Auditing

ISSN: 3079-5354 (Online)

Publishing model:

: Open access
open accessOpen Access

Article

👁️8views

Robust Image Steganography against Differential Attacks Using GA-Optimized LSB Embedding

by 

Dena Abu Laila Orcid link ;

Ziad E. Dawahdeh ;

Amer Alqutaesh ;

Ghada Alradwan

PDF logoPDF

Published: 2026/04/02

Abstract

Recently, in the science of data hiding, most research papers propose several techniques to conceal data inside the images and ensure secure mediums such as text, images, audio, and videos with preserving its quality. Researchers have been interested in the last decade of these techniques in image steganography and cryptography, this research proposed a system that uses multiple layers of security in which steganography and cryptography are together to enhance security. This study aims to present a new efficient technique for hiding a gray image inside a blue layer of color image by combining the genetic algorithm (GA) with the Least Significant Bit (LSB) approach to optimal solution permutation for embedding pixel assortment of the image where data is to be concealed. This technique offers immovability differential attacks that are evaluated by several performance metrics. According to experimental findings, the stego and the cover image are visually indistinguishable. PSNR, MSE, and SSIM are used as measurement matrices. Our aim passed a successful test of robustness against experimental analysis.

Keywords

Image SteganographyChaoticSpatial DomainStego ImageImage ProcessingEncryptionLSBGenetic Algorithm.

References

  1. Laila, D. A., Al-Na'amneh, Q., Aljaidi, M., Nasayreh, A. N., Gharaibeh, H., Al Mamlook, R., & Alshammari, M. (2024). Simulation of Routing Protocols for Jamming Attacks in Mobile Ad-Hoc Network. In Risk Assessment and Countermeasures for Cybersecurity (pp. 235-252). IGI Global.
  2. Dhawan, S., & Gupta, R. (2021). Analysis of various data security techniques of steganography: A survey. Information Security Journal: A Global Perspective, 30(2), 63-87.
  3. Zhou, Y., Bao, L., & Chen, C. P. (2014). A new 1D chaotic system for image encryption. Signal processing, 97, 172-182. (Zhou, (2014))
  4. Khalaf, Y., Aljaidi, M., Laila, D. A., Alsarhan, A., Alkhawaldeh, A. K., Alsuwaylimi, A. A., & Kharabsheh, M. (2024). An Effective Encryption Algorithm Based on RSA and DES.
  5. Allasasmh, O., Laila, D. A., Aljaidi, M., Alsarhan, A., & Samara, G. (2024, December). Integrated Approaches to Steganography: Embedding Static Information Across Audio, Visual, and Textual Formats. In 2024 International Jordanian Cybersecurity Conference (IJCC) (pp. 33-39). IEEE.
  6. Almaiah, M. A., Maleh, Y., & Alkhassawneh, A. (Eds.). (2024). Risk assessment and countermeasures for cybersecurity. IGI Global.
  7. Panetta, K., Agaian, S., & Chen, C. P. (2012). Image encryption using P-Fibonacci transform and decomposition. Optics Communications, 285(5), 594-608.
  8. Liao, X., Lai, S., & Zhou, Q. (2010). A novel image encryption algorithm based on self-adaptive wave transmission. Signal processing, 90(9), 2714-2722.‏
  9. Enayatifar, R., Abdullah, A. H., & Isnin, I. F. (2014). Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering, 56, 83-93.
  10. Hua, Z., Zhou, B., & Zhou, Y. (2018). Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Transactions on Industrial Electronics, 66(2), 1273-1284.
  11. Kanan, H. R., & Nazeri, B. (2014). A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert systems with applications, 41(14), 6123-6130.
  12. Jain, A., & Rajpal, N. (2016). A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimedia Tools and Applications, 75, 5455-5472.
  13. Dena Abu Laila, Qais Al-Na'amneh, Mohammad Aljaidi, Ahmad Nawaf Nasayreh et al. "chapter 10 Enhancing 2D Logistic Chaotic Map for Gray Image Encryption", IGI Global, 2024
  14. Iqbal, N., Hussain, I., Khan, M. A., Abbas, S., & Yousaf, S. (2023). An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map. Multimedia Tools and Applications, 1-29.
  15. V, G., G, I. A review on image steganographic techniques based on optimization algorithms for secret communication. Multimed Tools Appl (2023). https://doi.org/10.1007/s11042-023-15568-7.
  16. Hegde, R., & Jagadeesha, S. (2015). Design and Implementation of Image Steganography by using LSB Replacement Algorithm and Pseudo Random Encoding Technique. International Journal on Recent and Innovation Trends in Computing and Communication, 3(7), 4415-4420.
  17. Mohamed, M. H., & Mohamed, L. M. (2016). High capacity image steganography technique based on LSB substitution method. Applied Mathematics & Information Sciences, 10(1), 259.
  18. Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., & Dutta, P. (2014). A novel secure image steganography method based on chaos theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22.
  19. Selim, N. M., Guirguis, S. K., & Hassan, Y. F. (2022). Video steganography for image and text using deep genetic algorithm and LSB. International Journal of Network Security, 24(1), 140-146.
  20. Mandal, J. K., & Khamrui, A. (2014). A genetic-algorithm-based steganography on colour images (GASCI). International Journal of Signal and Imaging Systems Engineering, 7(1), 59-63.
  21. Ramakrishna, H. & Jagadeesha, S. (2015). Design and Implementation of Image Steganography by using LSB Replacement Algorithm and Pseudo Random Encoding Technique. IJRIT in Computing and Communication, Vol. 3 Issue 7, pp. 4415-4420.
  22. Laila, D. A., Aljaidi, M., Almaiah, M. A., AlBourini, M., Al-Na'amneh, Q., Samara, G., ... & Momani, K. (2025). A Novel Scheme to Optimize LSB Steganography Based on a Logistic Chaotic Map and Genetic Algorithm. Iraqi Journal for Computer Science and Mathematics, 6(2), 24.
  23. Gutub, A. A. A. (2010). Pixel indicator technique for RGB image steganography. Journal of emerging technologies in web intelligence, 2(1), 56-64.
  24. Jassim, F. A. (2013). A novel steganography algorithm for hiding text in image using five modulus method. arXiv preprint arXiv:1307.0642.
  25. Bailey, K., & Curran, K. (2006). An evaluation of image based steganography methods. Multimedia Tools and Applications, 30, 55-88.
  26. Karim, S. M., Rahman, M. S., & Hossain, M. I. (2011, December). A new approach for LSB based image steganography using secret key. In 14th international conference on computer and information technology (ICCIT 2011) (pp. 286-291). IEEE.
  27. Muhammad, K., Ahmad, J., Farman, H., Jan, Z., Sajjad, M., & Baik, S. W. (2015). A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Transactions on Internet and Information Systems (TIIS), 9(5), 1938-1962.
  28. Al-Shareeda, M. A., Ali, A. M., Hammoud, M. A., Kazem, Z. H. M., & Hussein, M. A. (2025). Secure IoT-based real-time water level monitoring system using ESP32 for critical infrastructure. J. Cyber Secur. Risk Audit, 2, 43-52.
  29. Alotaibi, E., Sulaiman, R. B., & Almaiah, M. (2025). Assessment of cybersecurity threats and defense mechanisms in wireless sensor networks. J. Cyber Secur. Risk Audit, 2025(1), 47-59.
  30. Ali, A. (2024). Adaptive and context-aware authentication framework using edge AI and blockchain in future vehicular networks. STAP Journal of Security Risk Management, 2024(1), 45–56. https://doi.org/10.63180/jsrm.thestap.2024.1.3
  31. Chandak, A., & Chandak, P. (2026). Blockchain technology in health care: An extensive scoping review of the existing applications, challenges, and future directions. International Journal of Cybersecurity Engineering and Innovation, 2026(1).
  32. Addula, S. R., Norozpour, S., & Amin, M. (2025). Risk assessment for identifying threats, vulnerabilities and countermeasures in cloud computing. Jordanian Journal of Informatics and Computing, 2025(1), 38–48. https://doi.org/10.63180/jjic.thestap.2025.1.5
  33. Abu Laila, D. (2025). Responsive machine learning framework and lightweight utensil of prevention of evasion attacks in the IoT-based IDS. STAP Journal of Security Risk Management, 2025(1), 59–70. https://doi.org/10.63180/jsrm.thestap.2025.1.3
  34. Ibrahim, A., Kadhim, A. F., Hamzah, A. E., & Al-Shareeda, M. A. (2026). A secure and scalable IoT home automation architecture with web and biometric control. International Journal of Cybersecurity Engineering and Innovation, 2026(1).
  35. Alshinwan, M., Memon, A. G., Ghanem, M. C., & Almaayah, M. (2025). Unsupervised text feature selection approach based on improved Prairie dog algorithm for the text clustering. Jordanian Journal of Informatics and Computing, 2025(1), 27–36. https://doi.org/10.63180/jjic.thestap.2025.1.4
  36. Abu Laila, D., Aljawarneh, M., Al-Na’amneh, Q., & Bin Sulaiman, R. (2025). Optimizing intrusion detection systems through benchmarking of ensemble classifiers on diverse network attacks. STAP Journal of Security Risk Management, 2025(1), 71–84. https://doi.org/10.63180/jsrm.thestap.2025.1.4
  37. Alsahaim, S., Almaiah, M. A., & Sulaiman, R. B. (2023). Security threats in mobile phones: Challenges, countermeasures, and the importance of user awareness. International Journal of Cybersecurity Engineering and Innovation, 2023(1).
  38. Kareem, K. A., & Al-Shareeda, M. A. (2026). A low-complexity Li-Fi communication framework for short-range text transmission. Jordanian Journal of Informatics and Computing, 2026(1), 15–24. https://doi.org/10.63180/jjic.thestap.2026.1.2
  39. Alrajeh, M., Almaiah, M., & Mamodiya, U. (2026). Cyber risk analysis and security practices in industrial manufacturing: Empirical evidence and literature insights. International Journal of Cybersecurity Engineering and Innovation, 2026(1).
  40. Al-Na’amneh, Q., Aljawarneh, M., Alhazaimeh, A. S., Hazaymih, R., & Shah, S. M. (2025). Securing trust: Rule-based defense against on/off and collusion attacks in cloud environments. STAP Journal of Security Risk Management, 2025(1), 85–114. https://doi.org/10.63180/jsrm.thestap.2025.1.5