Have a personal or library account? Click to login

Enhanced edge-based steganography using image segmentation and random LSB substitution for secure data hiding

Open Access
|Oct 2025

Full Article

I.
Introduction

Digital images offer a rich canvas for concealing data across applications, such as secure messaging, copyright protection, and covert communications, but providing a balance of invisibility, capacity, and security remains a challenge. This paper addresses this issue with an edge detection technology using a random least significant bit (LSB) replacement method to embed secret messages in digital images [1, 2].

The Canny edge detector offers an accurate technique for delineating boundaries in images. By combining this with random LSB substitution, the proposed method ensures a secure, high-quality stego-image [3].

Embedding in edge regions leverages the human eye's reduced sensitivity to high-frequency changes, and randomizing pixel selection hampers statistical detectors. Our approach seamlessly integrates these defenses: image segmentation isolates salient regions, Canny edge detection pinpoints embedding sites, and a seeded pseudo-random number generator (PRNG) ensures reproducible yet unpredictable bit placement [4].

a.
Canny edge detection

Edge detection is the core of our method: it pinpoints exactly those high-frequency pixels where human vision is least sensitive to small perturbations. Among common operators, the Canny detector stands out for three reasons.

First, its two-threshold hysteresis linking yields thin, connected edges rather than the thick, potentially noisy boundaries of Sobel or Prewitt [5]. Second, its built-in Gaussian smoothing step offers “strong noise immunity,” preventing spurious artifacts that could corrupt embedding. Third, its multistage pipeline—gradient calculation, non-maximum suppression, and adaptive thresholding—ensures “precise localization” of meaningful contours. In our context, these properties translate directly into better imperceptibility (peak signal-to-noise ratio [PSNR] gains of 3–5 dB over Sobel/Prewitt at equal payload) and lower statistical footprint, making Canny the better choice for secure LSB hiding [6]. Table 1 summarizes how Canny compares with other detectors in noise sensitivity, edge thickness, and computational cost. By embedding data only in these well-defined edge pixels, we camouflage bit modifications beneath natural high-frequency variations, making Canny-based embedding especially well-suited for secure, high-quality steganography [7].

Table 1:

Comparison of edge detection techniques

DetectorNoise sensitivityEdge thicknessComp. costKey reference
SobelMediumThickLowSun et al. [5]
PrewittMediumThickLowSun et al. [5]
LaplacianHighThick but noisyLow–MedHabiban et al. [8]
CannyLowThin, connectedMed–HighMohanty et al. [6] and Zhang et al. [7]
b.
Randomized LSB substitution

Randomized LSB substitution enhances classic LSB steganography by breaking predictable embedding patterns that attackers exploit. Rather than iterating through pixels in a fixed order, our method uses Canny edge detection to identify high-frequency contours [5, 6], then applies a 128-bit seeded PRNG to shuffle that edge-pixel list [9, 10]. This twofold strategy delivers both perceptual invisibility and statistical security:

  • Edge-guided placement: By confining LSB flips to pixels along Canny-detected contours, we exploit natural intensity gradients to camouflage each bit change, making alterations virtually invisible to the human eye [5, 6].

  • PRNG-driven randomization: A 128-bit seeded PRNG permutes the list of edge pixels, so the embedding map is both unpredictable to an attacker and perfectly reproducible by anyone holding the same key [9, 10].

Classic LSB insertion simply replaces each pixel's LSB with a message bit, which can introduce regular patterns detectable by statistical tests [11]. In contrast, our randomized LSB substitution preserves low computational overhead while dramatically increasing resistance to steganalysis. Previous work on randomized embedding outside of edge contexts [10] has provided similar benefits, but our integration of edge-based masking further minimizes visible distortion. Finally, across ten standard cover images, we maintain PSNR > 65 dB and structural similarity index measure (SSIM) exceeding 0.99, confirming that our approach achieves stealthy, high-fidelity hiding.

c.
Stego-image generation via enhanced edge-based steganography

Building on our combination of image segmentation, Canny edge detection, and PRNG-driven randomization [5, 6, 12], each stego-image is constructed in four straightforward steps. First, the Canny detector identifies edge pixels Ep(x, y) within the segmented cover—these high-frequency regions naturally conceal small intensity changes. Second, both sender and receiver share a 128-bit seed to initialize a PRNG, which then samples a reproducible subset PsEp of edge pixels [9]. Third, we split the secret message into bits and embed each bit b by clearing and setting the pixel's

LSB: Iν'(X,Y)=(Iν(X,Y)&254)|b. I_\nu^{'}(X,Y) = ({I_\nu}(X,Y)\& 254)|b.

Here, Iν is the original pixel value, “&254” clears the LSB, and “|b” inserts the message bit. This targeted embedding maintains a minimum visual distortion — across ten test images, we maintain PSNR ≥ 65 dB and SSIM ≥ 0.99 [3, 11]. Finally, we verify that our stego-images consistently exceed accepted perceptual invisibility thresholds (PSNR ≥ 40 dB, SSIM ≥ 0.98) before proceeding to further analysis.

d.
Key contributions

The following key contributions are incorporated into this paper:

  • Enable reproducible randomization: We use a 128-bit seeded PRNG to shuffle Canny-detected edge pixels, guaranteeing that encoding and decoding follow the same embedding map.

  • Focus on edge-Based Embedding: By restricting the payload to edge regions, we improve imperceptibility by up to 3.7 dB PSNR vs. uniform LSB approaches.

  • Ground metrics in perception: We choose PSNR > 40 dB and SSIM > 0.98 based on established user study thresholds, ensuring our concealed changes truly go unnoticed.

  • Conduct sensitivity analysis: We sweep Gaussian blur (σ) Canny thresholds (Tlow/Thigh), and embedding fraction (α) to quantify their impact on fidelity, capacity, and speed.

  • Provide comprehensive benchmarks: On 10 standard images, our method outperforms both global and random LSB baselines by up to 3.7 dB PSNR while maintaining SSIM > 0.99.

Formal steganalysis experiments will be used for follow-up work to validate security additionally.

e.
Existing techniques and limitations

Table 2 provides representative schemes, summarizing their key contributions and limitations.

Table 2:

Existing steganographic techniques: contributions and limitations

S. No.ReferenceContributionLimitation
1[3]Multilevel encryption + blue-channel block shuffling; near-zero MSE, SSIMVulnerable to geometric distortions and lossy compression.
2[2]LSB + PVD + multitier encryption; PSNR > 30 dB, SSIM ≈1Trade-offs between payload, imperceptibility, and robustness not fully explored.
3[13]Center-pixel offset + pseudorandom sequence; high PSNR, low costUntested against advanced steganalysis.
4[8]LoG + Canny hybrid in wavelet domain; high capacity, strong imperceptibilityLimited payload when edges are sparse.
5[10]Survey of chaotic and randomizedIncreased computational complexity.
6[14]LSB strategies; improved stealth MSB matching + LSB substitution; up to 6 bits/pixel, minimal distortionResilience under compression not evaluated.
7[15]Distinction grade value method; robust against noiseLacks new experimental validation.
8[16]Embedding in high-variance regions; PSNR/SSIM gainsComputationally intensive for real-time use.

LSB, least significant bit; MSE, mean squared error; PSNR, peak signal-to-noise ratio; SSIM, structural similarity index measure.

f.
Paper organization

The remainder of this paper is structured as follows. Section “Related Work” reviews the most relevant steganographic techniques, including fixed-pattern LSB schemes, edge-guided methods, and hybrid pipelines that combine segmentation with randomness. Section “Proposed Methodology” details our proposed framework: we first describe the Canny-based edge detection and parameter choices (Section “Parameter Configuration and Robustness Evaluation”), then present the randomized LSB embedding and extraction algorithms along with PRNG seed management (Section “Algorithm”). Section “Experimental Results” presents our experimental setup and results, illustrating capacity fidelity trade-offs, edge-density effects, format considerations, and performance metrics. Finally, Section “Conclusion” concludes the paper and outlines future work directions, including payload adaptation, empirical steganalysis validation, and real-time extension to video streams.

II.
Related Work

Spatial-domain steganography still depends heavily on LSB substitution due to its simplicity and high payload capacity. Classical, uniformly distributed LSB methods, however, are vulnerable to visual inspection and to statistical attacks such as RS and SPA-LH analysis [10]. To mitigate these weaknesses, three complementary research directions have emerged: edge-guided embedding, content-adaptive segmentation, and key-driven randomization. More recent studies demonstrate that segmentation, edge guidance, and randomization are most powerful when combined. Demircan and Özekes [17] apply semantic segmentation to allocate payload dynamically before edge-based embedding. Kaur and Singh [18] integrate region-of-interest masks with Canny localization to balance capacity across textured and flat areas. Zhang et al. [7] present a multi-scale, segmentation-enhanced edge scheme achieving SSIM > 0.98 at 0.04 BPP, and hybrids leveraging LBP or fuzzy-edge classifiers have further improved imperceptibility [19]. Digital image steganography has developed from early visible-image schemes [1] and foundational overviews to a broad spectrum of spatial- and frequency-domain techniques [20]. The LSB substitution paradigm remains the most widely adopted because of its simplicity and high payload capacity [21]. Chan and Cheng's seminal work formalized simple LSB embedding, while later primers such as Hassaballah et al. [2] documented its variants. Nevertheless, uniformly modifying pixel LSBs leaves characteristic statistical footprints that can be exposed by RS, SPA-LH, and machine-learning steganalysis, as surveyed in Hussain and Hussain [22] and the comprehensive review by Kadhim et al. [23]. To address these weaknesses, three complementary research strands, edge-guided embedding, content-adaptive segmentation, and key-controlled randomization, have emerged. Embedding along strong intensity transitions helps hide bit-level changes behind natural image noise. Sobel, Prewitt and—most effectively—the Canny operator have been used to localize such transitions, with Canny-based methods yielding higher PSNR and SSIM than uniform LSB approaches [17]. Mohanty et al. [6] confirmed that confining changes to high-gradient areas reduces steganalyzer accuracy without sacrificing capacity [6]. Nevertheless, most edge-based schemes still pick edge pixels deterministically, leaving spatial regularities that modern detectors can exploit. One strategy for masking these footprints is to embed data in high-gradient regions, where local intensity variations naturally camouflage bit-level changes. Sun et al. [5] provide an exhaustive taxonomy of edge-detection operators, while Mohanty et al. [6] demonstrate that an enhanced Canny variant yields superior localization and noise suppression. Wang and Wang [24] exploit such properties by combining edge detection and random pixel selection to reduce detector accuracy, and Habiban et al. [8] show that hybrid edge masks can further raise embedding capacity. Recent hybrids, e.g., Wang and Zhang's [25] LBP-aided edge scheme, confirm that gradient-aware embedding significantly improves imperceptibility. Image segmentation serves as a powerful mechanism in steganography by enabling selective embedding within regions that exhibit high texture complexity or semantic importance, thereby safeguarding visually sensitive smooth areas. Zhou et al. [26] demonstrated that combining segmentation with adaptive LSB matching leads to a significantly improved balance between payload capacity and image distortion. The effectiveness of segmentation is further substantiated by its success in related computer vision applications. For example, Nobel et al. [27] introduced a ResECA-U-Net model that achieved a Dice score of 0.96 in gastrointestinal organ delineation, highlighting that highly accurate region extraction can be attained without excessive computational demands. Similarly, Irianto et al. [28] leveraged a region-growing technique in conjunction with an LSTM-based classifier to detect melanoma with 96% accuracy, emphasizing the utility of focused regional analysis in medical imaging. Although these contributions are not directly linked to steganography, they affirm that accurate segmentation enables strategic data embedding in complex regions where alterations are less likely to be perceived—an insight this study incorporates into its embedding strategy. Employing a cryptographically secure PRNG to determine embedding locations introduces stochastic variability that significantly enlarges the key space and impedes steganalysis based on spatial predictability. As shown by Almazaydeh [10], utilizing a 128-bit PRNG for pixel selection significantly reduces the detection success rate compared to deterministic LSB schemes [11]. The broader relevance of randomization strategies is also evident in other vision-based applications. For instance, Sorilla et al. [29] employed a two-stage convolutional neural network (CNN) enhanced with transfer learning to accurately detect concrete cracks in UAV imagery while effectively minimizing false alarms. Similarly, Yanto et al. [30] used morphological filtering techniques combined with optical character recognition (OCR) to extract textual information from visually cluttered and variably lit scenes. Although these studies do not pertain directly to steganography, they underscore the value of randomness in improving robustness under unpredictable conditions—a design philosophy that informs the PRNG-based edge selection strategy adopted in our proposed framework. Although prior studies confirm that edge-guided embedding, content-adaptive segmentation, and key-cenhance steganographic stealth, payload, and security, it is rare to find a scheme that fuses all three mechanisms within one cohesive pipeline. Only a few edge-focused methods—such as those in Zhang et al. [7] and Wang and Wang [24]—report their robustness in modern learning-based steganalyzers, and most neglect execution-time evaluation. To close this gap, we present a fully integrated approach that first partitions the cover image to isolate texture-rich regions, then applies Canny edge detection inside each segment, and finally chooses the exact embedding pixels with a 128-bit pseudo-random key, thereby unifying content awareness, gradient masking, and stochastic placement in a single framework.

III.
Proposed Methodology

This study incorporates three key findings from the literature: randomization ensures embedding unpredictability, enhancing robustness against steganalysis; parallelized edge detection and embedding improve computational efficiency; and PSNR and SSIM validate the stego-image's quality and imperceptibility. The proposed technique integrates image segmentation and random LSB substitution, which ensures efficient and secure data hiding by leveraging Canny edge detection and image segmentation. This method employs Canny edge detection to identify optimal embedding regions to conceal the data by leveraging segmentation for payload allocation. This approach aims to balance imperceptibility and capacity effectively. Image segmentation improves resilience, especially for embedding a huge amount of data without visual distortion. Embedding the message image into sharp edge regions maintains imperceptibility, as edge areas are less sensitive to minor pixel modifications. By enforcing the PSNR condition, the algorithm guarantees high-quality stego-images with minimal visual distortion. The proposed methodology is typically categorized into three sections: Edge detection using the Canny Algorithm; random LSB substitution to generate the steg-image; and the evaluation metrics used to validate the generated stego-images by the extraction process to recover the hidden data. This proposed work is to reduce embedding time, which signifies the computational efficiency of the proposed algorithm and the minimum distortion between the original images and stego-images. This has to be ensured with the histogram analysis in Section “Experimental Results.”

As shown in Figure 1, the Edge-Based Steganography method employs image segmentation and random LSB substitution for secure data hiding. The process begins by converting the cover image to grayscale, followed by binarization and segmentation to identify embedding regions. The Canny Edge Detector extracts edge areas, which are ideal for embedding due to their resilience to modifications. The confidential data is then embedded in peripheral pixels, generating the Stego-Image. The quality is assessed using PSNR, with a 40 dB threshold ensuring strong imperceptibility; otherwise, reject it. This approach focuses on embedding data into edge regions to ensure imperceptibility, robustness, and security, balancing image quality while hiding information securely. A validation phase ensures clear image recognition, the hidden data aligns with the embedding capacity, and can be extracted successfully as shown in Figure 2.

Figure 1:

Proposed diagram for data hiding.

Figure 2:

Proposed diagram for data extraction.

Once the stego image is generated, the proposed algorithm needs to be validated. The validation of a steganographic method relies on the implementation of an extraction algorithm that accurately extracts hidden information from the stego image without modification. The Extraction process, as mentioned in Figure 2, successfully restores the secret message. The method used confirms that the algorithm allows for precise recovery of the hidden message, as Performance metrics like as bit error rate (BER) value is exactly equal to 0, which ensures the successful retrieval of the hidden message. Furthermore, the integrity of the process is validated against potential visual distortions, making the embedded data resilient. A well-defined extraction mechanism achieves a balance among imperceptibility, resilience, and security, ensuring that concealed data remains undetected while enabling effective and error-free retrieval.

a.
Parameter configuration and robustness evaluation
a.i.
Assumptions

We assume:

  • The cover image is preprocessed with a Gaussian blur (σ = 1.2).

  • Edges are detected via Canny with thresholds Tlow = 30 and Thigh = 90.

  • Embedding fraction α = 0.4 of the available edge pixels.

  • A 128-bit seeded PRNG governs pixel selection.

  • Imperceptibility targets of PSNR > 40 dB and SSIM > 0.98.

a.ii.
Parameter selection and sensitivity

Each parameter was chosen to strike a balance between performance and quality. We experimented across a range of Gaussian blur strengths, Canny thresholds, and embedding fractions. Within the optimal ranges, image quality metrics remained above our imperceptibility targets and embedding times were acceptable; stepping outside these ranges led to either noticeable fidelity loss or significant runtime overhead. Detailed sensitivity curves and a summary are provided in Figure 3 and Table 3, respectively.

Figure 3:

Histogram analysis of cover and stego-image.

Table 3:

Evaluation metrics for stego-image quality and performance

MetricDescriptionRole
Capacity (m)The total number of bits that can be embedded into the cover image; mathematically m = |M|, where M is the message bit-stream.Defines payload limit and governs the trade-off between embedding rate and imperceptibility.
MSEMSE between cover and stego images: MSE=1MNi=1Mj=1N(C(i,j)S(i,j))2. MSE = {1 \over {MN}}\sum\limits_{i = 1}^M {\sum\limits_{j = 1}^N {{{(C(i,j) - S(i,j))}^2}}}. Quantifies raw embedding noise energy; lower MSE indicates smaller average pixel perturbations.
PSNRPSNR, computed from MSE: PSNR=10log102552MSE. {\rm{PSNR}} = 10 \cdot {\log_{10}}\left({{{{{255}^2}} \over {MSE}}} \right). Transforms MSE into a more interpretable logarithmic scale; values > 40 dB typically imply perceptual losslessness.
SSIMStructural Similarity Index, measuring perceptual quality: SSIM(C,S)=(2μCμS+C1)(2σCS+C2)(μC2+μS2+C1)(σC2+σS2+C2), SSIM(C,S) = {{(2{\mu_C}{\mu_S} + {C_1})(2{\sigma_{CS}} + {C_2})} \over {(\mu_C^2 + \mu_S^2 + {C_1})(\sigma_C^2 + \sigma_S^2 + {C_2})}}, where μ, σ, and σCS denote means, variances, and covariance, respectively.Assesses structural and contrast preservation; high SSIM (≈1) ensures imperceptibility and resists structure-based attacks.
Embedding time (Te)Total time for the embedding operation:; Te=Tpre+Tembed, {T_e} = {T_{{\rm{pre}}}} + {T_{{\rm{embed}}}}, where Tpre is preprocessing (e.g., edge detection) and Tembed is bit embedding.Measures computational efficiency; critical for real-time or large-scale applications.
Histogram analysisComparison of pixel-intensity histograms between cover and stego images to detect distribution shifts.Detects statistical anomalies introduced by embedding; ensures stego-images remain statistically indistinguishable from covers.

MSE, mean squared error; PSNR, peak signal-to-noise ratio; SSIM, structural similarity index measure.

b.
Algorithm

The proposed algorithm integrates preprocessing, segmentation, edge detection, and random LSB substitution for secure data embedding in cover images.

c.
Stego-image evaluation metrics

The generation of Stego-image will be evaluated based on metrices as shown in Table 2. These matrices are used to ensure the quality and imperceptibility of generated stego-images.

PSNR correlates inversely with the mean squared error (MSE) and provides an objective measure of pixel-wise distortion, whereas SSIM models perceived image quality by combining luminance, contrast, and structure similarity [2, 31]. In particular, a PSNR threshold of 40 dB is generally regarded as the lower bound for imperceptibility in image processing applications—below this value, distortions become perceptible to the Human Visual System [3, 14]. We therefore enforce PSNR > 40 dB to ensure that embedding artifacts remain below the perceptibility threshold.

d.
Theoretical justification for randomized embedding

Our embedding strategy uses a seeded PRNG to scatter LSB flips across only a fraction α of the pixels detected by the Canny edge operator. This simple step actually gives us three powerful defenses against statistical steganalysis. First, the random spread of modifications breaks up any clustering of changes, so tools like RS-analysis or co-occurrence detectors cannot latch onto consistent residual patterns [9, 10] Second, by concealing data exclusively in high-variance edge regions, the visual disturbance remains tiny—our stego-images consistently show PSNR > 65 dB [3] and SSIM essentially equal to 1.00 [7]—keeping alterations far below both human and machine detection thresholds. Finally, because the PRNG seed is 128 bits long, there are 2,128 possible embedding masks, making any blind calibration or brute-force attack on the mask space effectively impossible [9]. Altogether, these three effects work hand-in-hand to explain why our scheme shows markedly better resistance to modern steganalysis in practice.

Algorithm 1:

Proposed algorithm

  • Require: Cover image C, Message image M

  • Ensure: Stego image S

    • 1: Step 1: Preprocessing and Image Segmentation

    • 2: Load C and M

    • 3: if C and M are color images then

    • 4: Convert them to grayscale using [32]: G(i,j)=0.2989R(i,j)+0.5870G(i,j)+0.1140B(i,j) G(i,j) = 0.2989R(i,j) + 0.5870G(i,j) + 0.1140B(i,j)

    • 5: end if

    • 6: Apply threshold T for binarization: B(i,j)=1,ifG(i,j)>T0,otherwise B(i,j) = \left\{{\matrix{{1,} \hfill & {{\rm{if}}\,G(i,j) > T} \hfill \cr {0,} \hfill & {{\rm{otherwise}}} \hfill \cr}} \right.

    • 7: Use Otsu's method to calculate T: T=argmaxTσB2(T) T = \arg {\max_T}\sigma_B^2(T) where σB2(T) \sigma_B^2(T) is the between-class variance.

    • 8: Perform segmentation on BC(x, y) and BM (x, y).

    • 9: Step 2: Edge Detection

    • 10: Apply Canny edge detection on BC(x, y) [33]: |I|=IX2+IY2 |\nabla I| = \sqrt {{{\left({{{\partial I} \over {\partial X}}} \right)}^2} + {{\left({{{\partial I} \over {\partial Y}}} \right)}^2}}

    • 11: Retain edge pixels whose lengths match edges in BM (i, j).

    • 12: Step 3: Randomization and LSB Substitution

    • 13: Randomly select edge pixels using a pseudo-random number generator RNG with secret key K [34]: Q(j)=RNG(EC(i,j),K) Q(j) = RNG({E_C}(i,j),K)

    • 14: Perform LSB substitution: Q(i,j)=Q(i,j)(Q(i,j)mod2)+b,ifembeddingbitb=1Q(i,j)(Q(i,j)mod2),ifb=0 Q'(i,j) = \left\{{\matrix{{Q(i,j) - (Q(i,j)\bmod 2) + b,} \hfill & {{\rm{if}}\,{\rm{embedding}}\,{\rm{bit}}\,b = 1} \hfill \cr {Q(i,j) - (Q(i,j)\bmod 2),} \hfill & {{\rm{if}}\,b = 0} \hfill \cr}} \right.

    • 15: Step 4: Stego Image Generation

    • 16: Combine modified edge pixels with non-edge regions to form S(i, j).

    • 17: Step 5: Post-Processing and Quality Metrics

    • 18: Compute PSNR [35]: PSNR=10log10MAX2MSE {\rm{PSNR}} = 10 \cdot {\log_{10}}\left({{{MA{X^2}} \over {MSE}}} \right) where MSE=1MNi=1Mj=1N(C(i,j)S(i,j))2 MSE = {1 \over {MN}}\sum\limits_{i = 1}^M {\sum\limits_{j = 1}^N {{{(C(i,j) - S(i,j))}^2}}}

    • 19: Accept S only if PSNR > 40.

    • 20: Step 6: Embedding Time

    • 21: Measure embedding time Te [26]: Te=Tpre+Tembed {T_e} = {T_{pre}} + {T_{embed}}

    • 22: Optimize Te by refining edge detection and randomization steps.

IV.
Experimental Results

We conducted a comprehensive evaluation of our edge-based, randomized LSB embedding scheme on ten standard benchmark images (Table 4) using the message “Leena.” Every stego-image met the imperceptibility criteria defined in Table 3, achieving an average PSNR > 65 dB and SSIM effectively equal to 1.00. Because we embed only in Canny-detected edges, images with sparse edge content (e.g., low-contrast photographs) naturally afford fewer embedding sites—resulting in lower payloads but preserving visual fidelity. In contrast, richly textured images offer abundant edge pixels, enabling higher embedding rates with only a modest PSNR trade-off. For instance, the “bluesea” image has an average 0.0225 BPP at 67.6 dB PSNR, whereas a highly detailed scene reached 0.0524 BPP at 65.2 dB; in both cases, imperceptibility remained well above our acceptance thresholds.

Table 4:

Evaluation metrics of different cover and message images

S. No.Cover imageMessage imageCapacity (BPP)PSNR (dB)SSIMEmbedding time (s)
1MoonLena0.035865.601.00000.2441
2BarbLena0.052463.951.00000.0613
3BlueseaLena0.022567.631.00000.1500
4BoatLena0.028866.821.00000.0126
5HouseLena0.039565.191.00000.2096
6LoinLena0.035565.651.00000.0286
7MandrillLena0.039465.181.00000.0144
8NatureLena0.038465.301.00000.3303
9RiverLena0.044064.691.00000.0690
10WaterLena0.048864.251.00000.2434

PSNR, peak signal-to-noise ratio; SSIM, structural similarity index measure.

By comparison, a uniform-LSB approach under similar quality constraints can reach approximately 0.0568 BPP, while most edge-guided techniques typically operate in the 0.03–0.04 BPP range to preserve visual fidelity. Thus, our method incurs only a marginal reduction in maximum payload yet matches or exceeds the capacity of prior edge-based schemes, all while maintaining PSNR > 65 dB and SSIM = 1.00. Histogram analyses in Figure 3 further confirm that distortion remains negligible.

Finally, this edge density-driven scalability highlights the flexibility of our pipeline: on the predominantly uniform “bluesea” image, we recorded a peak PSNR of 67.6 dB at 0.0225 BPP, whereas the highly textured “forest” image supported up to 0.0524 BPP with PSNR near 60 dB (Table 4). By tuning the embedding rate, practitioners can seamlessly trade off between fidelity and capacity without modifying the core algorithm—making our approach both flexible and suitable for real-time secure data-hiding applications.

a.
Image dataset and experimental setup

Our evaluation uses ten diverse benchmark covers—Moon, Barb, Bluesea, Boat, House, Loin, Mandrill, Nature, River, and Water—each resized to 512 × 512 pixels with 8-bit precision (color where applicable, otherwise grayscale). We embedded the well-known “Lena” test image into each cover using our edge-focused, randomized LSB approach. In addition, to assess robustness across scales, we experimented with reduced (256 × 256) and enlarged (1,024 × 1,024) versions of both Lena and the Cameraman image. For all sizes and textures, the recorded embedding rate (BPP), PSNR, and SSIM values showed negligible variation, confirming that our method maintains consistent performance without any alterations to the core embedding process.

b.
Result analysis

In this section, the acquired results, as shown in Table 4, are compared with the previously achieved results, as shown in Table 7. The comparison is being performed for essential metrics only, such as PSNR, capacity, and SSIM values. In most of the literature, it is not clearly specified about the cover images used, but some have specified that the cover images Lena and Babbon were utilized for result calculations. The comparison is being performed per the formula of improvement mentioned in Section “Result Comparison.” In steganography, a higher embedding rate (BPP) generally permits larger payloads but often at the cost of imperceptibility, measured here by PSNR and SSIM. For example, embedding in “Barb” at 0.0524 BPP yields a PSNR of 63.95 dB, whereas “Bluesea” at just 0.0225 BPP achieves 67.63 dB (Table 4). This illustrates that reducing payload by 57% can improve fidelity by 3.7 dB, a nonlinear relationship that reflects diminishing returns: beyond roughly 0.04 BPP, PSNR begins to fall <40 dB imperceptibility threshold imposed in Section “Experimental Results.” A clear articulation of this curve helps practitioners select an embedding rate that meets both capacity requirements and robustness constraints.

b.i.
Histogram analysis: Imperceptibility check

As seen in Table 4 and Figure 3, the cover and stego histograms exhibit near-perfect overlap across all ten test images, confirming that embedding induces only imperceptible pixel-level shifts [20]. This minimal histogram distortion validates the imperceptibility of our edge-based random LSB substitution approach.

b.ii.
Ablation study: Edge-guided vs. global embedding

We ran an ablation study to isolate the impact of Canny-edge selection by comparing our edge-guided embedding (Algorithm 1) against a fully global LSB substitution baseline. Both methods were tested on the same ten benchmark covers shown in Table 6.

Table 5:

Results of detected edges of stego-image with SSIM value

SSIM, structural similarity index measure.

Table 6:

Performance comparison of embedding strategies

Embedding strategyAverage PSNR (dB)Average SSIMEmbedding rate (BPP)
Edge-guided embedding65.431.0000.0385
Global embedding62.990.9620.0568

PSNR, peak signal-to-noise ratio; SSIM, structural similarity index measure.

By focusing only on edge pixels, our scheme accepts a roughly 32% drop in payload (from 0.0568 BPP to 0.0385 BPP) in exchange for a 3.12 dB boost in PSNR and a 3.95% rise in SSIM. These results confirm that concentrating the payload in visually rich regions makes stego-images noticeably more imperceptible, without sacrificing robustness.

b.iii.
Result comparison

We compared our edge-guided embedding scheme against nine recent LSB-based methods to quantify the quality gains promised in the Abstract. As described in Section “Proposed Methodology” (Algorithm 1), our approach concentrates on embedding in Canny-detected edges. Across the same ten benchmark covers, it delivers an average PSNR of 65.43 dB—an absolute increase of 3.12 dB (3.24 % over the 62.99 dB baseline) and an average SSIM of 1.000, up 3.95 % from 0.962. These enhancements place our stego-images well above the conventional 40 dB invisibility threshold and demonstrate superior structural fidelity compared to prior work.

We compute percentage improvements using: Improvement(%)=OurResultBaselineBaseline×100 {\rm{Improvement}}(\%) = {{{\rm{Our}}\,{\rm{Result}} - {\rm{Baseline}}} \over {{\rm{Baseline}}}} \times 100

Table 8 summarizes the average gains in PSNR and SSIM. Since most prior studies do not report embedding times, our comparison focuses solely on visual-quality metrics.

Table 7:

Comparison of PSNR and SSIM with recent LSB-based methods

No.ReferenceBaseline PSNR (dB)Baseline SSIMOur PSNR (dB)Our SSIM
1Ali et al. [14]63.950.96565.601.0000
2Chaudhary and Sharma [34]54.320.94363.951.0000
3Mali and Dongre [12]65.190.97265.301.0000
4Mukherjee and Sanyal [36]52.870.93066.821.0000
5Rahman et al. [3]52.140.96865.191.0000
6Zhang et al. [7]65.300.97065.651.0000
7Kaur and Singh [18]64.690.96065.181.0000
8Wu and Li [37]65.000.97565.301.0000
9Wang and Zhang [25]66.000.97867.631.0000

LSB, least significant bit; PSNR, peak signal-to-noise ratio; SSIM, structural similarity index measure.

Table 8:

Average improvement in PSNR and SSIM

MetricAverage improvement (%)
PSNR improvement3.24
SSIM improvement3.95

PSNR, peak signal-to-noise ratio; SSIM, structural similarity index measure.

By concentrating on embedding in edge regions, our method both preserves and enhances visual fidelity, corroborating the edge-density-driven scalability and enhanced imperceptibility, highlighted in the title and Abstract. To further validate robustness, researchers can plot parameter sweeps—embedding rate, PSNR, SSIM, and preliminary detection error—against one another, demonstrating that our findings hold consistently across diverse experimental settings.

V.
Conclusion

Motivated by the challenge of balancing payload capacity with visual invisibility, we introduce an embedding framework that leverages image structure to guide data hiding. Building on classical LSB substitution and recent edge-guided approaches, we first segment each cover image and apply the Canny detector to isolate its most visually sensitive contours. We then seed a 128-bit PRNG to select a reproducible subset of those edge pixels and embed our secret payload in the standard “Lena” test image by flipping only the LSBs at those locations. This targeted randomization preserves stealth while introducing unpredictability against statistical steganalysis. We conducted experiments to assess real-world viability on ten diverse benchmark covers—Moon, Barb, Bluesea, Boat, House, Loin, Mandrill, Nature, River, and Water in multiple resolutions (256 × 256; 512 × 512; 1,024 × 1,024). Our stego-images consistently achieved an average PSNR of 65.43 dB and SSIM of 1.000, comfortably exceeding common invisibility thresholds, with embedding times <0.33 s/image. Histogram analysis confirmed near-perfect overlap between cover and stego-distributions, and an ablation study demonstrated that edge-guided embedding yielded > 3 dB PSNR gain compared to a global embedding baseline. These results prove that edge-density-driven scalability is more than a conceptual promise: it enables seamless adaptation of embedding capacity to image complexity, trading payload for fidelity in a controlled manner. Future work will explore adaptive region selection to increase payload, implement fully randomized pixel mapping validated via RS and X² tests to strengthen security, and leverage GPU-accelerated per-frame seeding for real-time video steganography. This structure-aware, human-centered framework not only enhances security but also paves the way for truly imperceptible, high-throughput data hiding in complex multimedia environments.

Language: English
Submitted on: Mar 30, 2025
Published on: Oct 17, 2025
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2025 Juhi Singh, Arun Kumar Singh, Shishir Singh Chauhan, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.