Beyond the Achilles Heel: Securing Spatial Domain Reversible LSB Image Steganography
Discuss this preprint
Start a discussion What are Sciety discussions?Listed in
This article is not in any list yet, why not save it to one of your lists.Abstract
The rapid evolution of digital communication demands a paradigm shift in image steganography, moving beyond conventional data embedding to fully reversible concealment that ensures seamless integration while preserving the original cover. However, spatial-domain techniques remain inherently flawed—repetitive carrier image usage exposes hidden data to statistical detection, while deterministic extraction mechanisms violate Kerckhoff’s principle, enabling unauthorized recovery. Reliance on encryption, flawed key management, and misplaced emphasis on imperceptibility metrics further compromise true undetectability. This research introduces a provably robust steganographic framework that advances spatial-domain security through three foundational innovations: (1) Cryptographic reversibility—unlike conventional LSB methods that permanently alter cover media, our SHA-256–modulated entropy embedding enables lossless payload extraction and perfect cover recovery without auxiliary data; (2) Statistical undetectability—by integrating inverse modulo-5 arithmetic (E(x, k) = (x + k) mod 5) with dual-channel pixel diffusion, we eliminate detectable artifacts in co-occurrence matrices and histograms, achieving zero discriminability (AUC = 0.5) against ML-based steganalysis; and (3) Adaptive capacity hardening—a dynamic payload distribution system that simultaneously maximizes embedding density (1–100% pixel utilization) while resisting known-cover attacks through key-driven randomization. These mechanisms collectively establish mathematically verifiable robustness: reversibility is guaranteed by the bijective properties of our modular transformations (E−1(y, k) = (y−k) mod 5), undetectability is proven via entropy preservation (ΔH < 0.02), and security is enforced through Kerckhoffs-compliant key derivation. Empirical validation confirms superiority over existing methods in PSNR (> 53 dB), structural fidelity (SSIM > 0.999), and attack resilience—redefining the theoretical limits of secure data hiding.