Steganography on Digital Color Image Using Modulo Function and Pseudo-Random Number Generator

Septia Rani, Arrie Kurniawardhani, Yosa Angela Widya Rendani


In this era, many people exchange data digitally either through the internet or other communication channels. However, data sent digitally can be seen by unauthorized people. Therefore, data security is essential. One of the data security techniques is steganography. This study employs steganography based on Pixel Value Modification (PVM) method using the modulo function. This technique will be implemented to insert a text message in digital images in RGB color space. Besides, we use the Pseudo-Random Number Generator with a secret key to enhance the inserted messages’ security. To measure the performance of the proposed method, testing is carried out by comparing the stego image to cover image based on three criteria, namely imperceptibility, fidelity, and recovery. PVM method using modulo function successfully hides text that the length is less than 200 characters into 255×255-pixel color images. Imperceptibility testing is done by distributing a questionnaire to six people randomly. The results showed that all respondents answered that each test image's stego image and cover image had no difference. At the same time, the results of the fidelity test show that the MSE value is close to zero, and the PSNR value is above 40 dB. Furthermore, recovery testing will check whether the extracted message is the same as the secret message inserted in the cover image. The results showed that all messages inserted were extracted correctly for recovery criteria if given the correct secret key.


Digital image; modulo; Pixel Value Modification; Pseudo-Random Number Generator; steganography.

Full Text:



O. R. Shahin, A. Ben Aissa, Y. Fouad, H. Al-Mahdi, and M. Alsmarah, “A New Method of Data Encryption based on One to One Functions,†vol. 10, no. 3, pp. 1169–1175, 2020.

J. Katz and Y. Lindell, Introduction to Modern Cryptography. 2014.

A. S. Ansari, M. S. Mohammadi, and M. T. Parvez, “A multiple-format steganography algorithm for color images,†IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.2991130.

J. R. Jayapandiyan, C. Kavitha, and K. Sakthivel, “Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization,†IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3009234.

K. Wang and Q. Gao, “A Coverless Plain Text Steganography Based on Character Features,†IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2929123.

A. A. Alsabhany, F. Ridzuan, and A. H. Azni, “The Adaptive Multi-Level Phase Coding Method in Audio Steganography,†IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2940640.

X. Yi, K. Yang, X. Zhao, Y. Wang, and H. Yu, “Ahcm: Adaptive huffman code mapping for audio steganography based on psychoacoustic model,†IEEE Trans. Inf. Forensics Secur., vol. 14, no. 8, 2019, doi: 10.1109/TIFS.2019.2895200.

X. Duan et al., “High-Capacity Image Steganography Based on Improved FC-DenseNet,†IEEE Access, vol. 8, 2020, doi: 10.1109/access.2020.3024193.

X. Zhang, F. Peng, and M. Long, “Robust Coverless Image Steganography Based on DCT and LDA Topic Classification,†IEEE Trans. Multimed., vol. 20, no. 12, 2018, doi: 10.1109/TMM.2018.2838334.

O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, A. A. M. Khalaf, and H. M. Ali, “Hiding data in images using steganography techniques with compression algorithms,†Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 3, pp. 1168–1175, 2019, doi: 10.12928/TELKOMNIKA.V17I3.12230.

Z. Yahya, M. Hassan, S. Younis, and M. Shafique, “Probabilistic Analysis of Targeted Attacks Using Transform-Domain Adversarial Examples,†IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.2974525.

C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,†J. Syst. Softw., 2008, doi: 10.1016/j.jss.2007.01.049.

M. Asikuzzaman and M. R. Pickering, “An Overview of Digital Video Watermarking,†IEEE Transactions on Circuits and Systems for Video Technology. 2018, doi: 10.1109/TCSVT.2017.2712162.

J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Cryptanalytic attacks on pseudorandom number generators,†1998, doi: 10.1007/3-540-69710-1_12.

M. Aljohani, I. Ahmad, M. Basheri, and M. O. Alassafi, “Performance Analysis of Cryptographic Pseudorandom Number Generators,†IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2907079.

G. Marsaglia, “Xorshift RNGs,†J. Stat. Softw., 2003, doi: 10.18637/jss.v008.i14.

S. Deshmukh, K. Doshi, and Y. Borse, “Securing Images Using Layered Morphing,†2018, doi: 10.1109/ICCUBEA.2018.8697888.

R. Munir, “Pengantar Ilmu Kriptografi,†Penerbit Andi, 2008, doi: 10.1017/CBO9781107415324.004.

I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, “Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research,†Neurocomputing, vol. 335, 2019, doi: 10.1016/j.neucom.2018.06.075.

E. Emad, A. Safey, A. Refaat, Z. Osama, E. Sayed, and E. Mohamed, “A secure image steganography algorithm based on least significant bit and integer wavelet transform,†J. Syst. Eng. Electron., vol. 29, no. 3, 2018, doi: 10.21629/JSEE.2018.03.21.



  • There are currently no refbacks.

Published by INSIGHT - Indonesian Society for Knowledge and Human Development