Image Steganography: Digital Information Embedding Using Singular Value Decomposition and Simulation Software
DOI:
https://doi.org/10.25170/jurnalelektro.v18i2.6869Keywords:
Hidden Data Extraction, Image Processing, Information Security, Singular Value Decomposition, Steganography, WatermarkingAbstract
Singular Value Decomposition (SVD) is a matrix decomposition technique that is widely used in digital signal and image processing because of its ability to represent important information efficiently. This study aims to explore the use of the SVD method in the steganography and watermarking process of digital images as part of efforts to improve the security of multimedia information. The approach used involves inserting hidden data in the form of images, sentences, and paragraphs into the host image by modifying the singular value elements of the image matrix decomposition results. Various scenarios are simulated, including inserting RGB format watermarks into grayscale images and vice versa, by testing variations in the insertion parameter (α). Evaluation is carried out on the visual quality of the resulting image (imperceptibility), as well as the success rate of information extraction. The experimental results show that this method can insert information without causing significant visual distortion and still maintain high message extraction accuracy. This study confirms the effectiveness and flexibility of the SVD technique as an information insertion method that can be applied in digital copyright protection systems and visual data security. This method also has the potential to be integrated with other techniques in more complex and robust watermarking systems.
References
[1] A. Nath, S. Das, R. Sharma, S. Mandal, and H. Sadhu, “Digital steganography: A comprehensive study on various methods for hiding secret data in a cover file,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 10, no. 3, pp. 291–300, 2024. [Online]. Available: https://doi.org/10.32628/cseit24103107.
[2] J. Wu, “Application of singular value decomposition in image compression,” Theor. Nat. Sci., vol. 25, no. 1, pp. 181–185, 2023. [Online]. Available: https://doi.org/10.54254/2753-8818/25/20240959
[3] K. Xing, “Singular value decomposition: A useful technique for image denoising,” Theor. Nat. Sci., vol. 39, no. 1, pp. 226–231, 2024. [Online]. Available: https://doi.org/10.54254/2753-8818/39/20240610
[4] P. Zizler and R. La Haye, “Singular value decomposition,” in Linear Algebra in Data Science, Compact Textbooks in Mathematics. Cham, Switzerland: Birkhäuser, 2024. [Online]. Available: https://doi.org/10.1007/978-3-031-54908-3_6
[5] J. Singh and M. Singla, “Image steganography technique based on singular value decomposition and discrete wavelet transform,” vol. 10, no. 2, pp. 122–125.
[6] K. A. Tanc, “An overview of digital image steganography,” Procedia Comput. Sci., vol. 168, pp. 289–295, 2020.
[7] H. Al-Khafaji, B. Al-Himyari, and H. Alharbi, “Enhancing image watermarking: An innovative multi-objective genetic algorithm-based DWT-SVD approach for robustness and imperceptibility,” Int. J. Saf. Secur. Eng., vol. 14, no. 6, pp. 1921–1931, 2024. [Online]. Available: https://doi.org/10.18280/ijsse.140626
[8] T.-X. Thanh, “Singular value decomposition and applications in data processing and artificial intelligence,” HPU2 J. Sci.: Nat. Sci. Technol., vol. 2, pp. 34–41, 2023. [Online]. Available: https://doi.org/10.56764/hpu2.jos.2023.2.3.34-41
[9] H. Zhang, L. Zhu, and J. Liu, “Singular value decomposition based image steganography in the transform domain,” Multimed. Tools Appl., vol. 82, pp. 435–458, 2023. [Online]. Available: https://doi.org/10.1007/s11042-021-13525-4
[10] Y. J. Teoh, H.-C. Ling, W. K. Wong, and T. A. Basuki, “A hybrid SVD-based image watermarking scheme utilizing both U and V orthogonal vectors for robustness and imperceptibility,” IEEE Access, vol. 11, pp. 51018–51031, 2023. [Online]. Available: https://doi.org/10.1109/ACCESS.2023.3279028
[11] E. A. Sofyan, C. A. Sari, E. H. Rachmawanto, and N. R. D. Cahyo, “High-quality evaluation for invisible watermarking based on discrete cosine transform (DCT) and singular value decomposition (SVD),” Adv. Sustain. Sci. Eng. Technol., vol. 6, no. 1, pp. 1–8, 2024. [Online]. Available: https://doi.org/10.26877/asset.v6i1.17186
[12] H. Rathi, “Hiding information using image steganography,” in Proc. 2024 Int. Conf. Electr. Electron. Comput. Technol. (ICEECT), Greater Noida, India, 2024, pp. 1–5. [Online]. Available: https://doi.org/10.1109/ICEECT61758.2024.10739114
[13] M. Begum et al., “Image watermarking using discrete wavelet transform and singular value decomposition for enhanced imperceptibility and robustness,” Algorithms, vol. 17, no. 1, p. 32, 2024. [Online]. Available: https://doi.org/10.3390/a17010032
[14] S. N. Al-Azzam and F. A. Al-Garni, “The use of binary digit mapping on ASCII characters to create a high-capacity, undetectable text steganography,” J. Adv. Sci. Eng. Technol., vol. 6, no. 1, pp. 51–59, 2023. [Online]. Available: https://doi.org/10.32441/jaset.05.02.05
[15] S. S. Baawi, K. M. Hashim, and B. K. Hilal, “An image watermarking technique proposed based on discrete cosine transformation and pseudo-random generator,” 2021. [Online]. Available: https://doi.org/10.32792/jeps.v11i1.96
[16] B. Mokashi, V. S. Bhat, J. D. Pujari, S. Roopashree, T. R. Mahesh, and D. S. Alex, “Efficient hybrid blind watermarking in DWT-DCT-SVD with dual biometric features for images,” Contrast Media Mol. Imaging, vol. 2022, 2022. [Online]. Available: https://doi.org/10.1155/2022/2918126



