Enhancing Image Security through PCA-IWT-Based Nil Steganography \\under Distortion Scenarios

  • Areej M. Abduldaim
  • Nadia M. G. Al-Saidi
  • Anwar Khaleel Faraj
  • Saja A. Alameer

Abstract

Security has become a paramount concern across various fields of study today, with particular emphasis on steganography mechanisms as sought-after and promising research areas aimed at safeguarding multimedia data from unauthorized access. This study introduces a robust nil steganography technique that enhances its undetectable nature and resilience to various image processing attacks by combining Principal Component Analysis (PCA) with the Integer Wavelet Transform (IWT). The host image is converted to grayscale, the LL band is extracted using IWT, and the image is divided into non-overlapping $4 \times 4$ blocks as part of the concealment process. Principal features are then extracted from each block using PCA, and these are then XORed with the binary emblem to produce the confidential share. To produce the confidential share, three emblems are tested, and the XOR operation is performed to combine each emblem with the extracted features. According to experimental results, the system performs well in terms of Peak Signal-to-Noise Ratio (PSNR), Normalized Correlation (NC), and Bit Error Rate (BER) across various attack scenarios, including histogram equalization, Gaussian noise, and JPEG compression. In contrast to current techniques, the suggested method exhibits better imperceptibility and robustness. The algorithm can be considered suitable for real-world applications in secure image processing because it maintains a computational complexity of $\mathrm{O}\left(\mathrm{N}^{2}\right)$.

Downloads

Download data is not yet available.

References

\bibitem{1}
M. H. Khudhur, J. Waleed, H. Hatem, A. M. Abduldaim, and D. A. Abdullah,
{An Efficient and Fast Digital Image Copy–Move Forensic Technique,}
in \textit{Proc. 2nd Int. Conf. for Engineering, Technology and Sciences of Al-Kitab (ICETS)},
Kirkuk, Iraq, 2018, pp. 78–82.
% doi: \href{https://doi.org/10.1109/ICETS.2018.8724611}{10.1109/ICETS.2018.8724611}.

\bibitem{2}
Wajdi Elhamzi,
{Enhancing Medical Image Security with FPGA-Accelerated LED Cryptography and LSB Watermarking,}
\textit{Traitement du Signal}, vol. 41, no. 1, pp. 85–97, Feb. 2024.

\bibitem{3}
Purnima, Rakesh Ahuja, and Nidhi Gautam,
{Motion–Frames Based Video Watermarking Scheme for Copyright Protection Using Guided Filtering in Wavelet Domain,}
\textit{Traitement du Signal}, vol. 40, no. 1, pp. 187–197, Feb. 2023.

\bibitem{4}
A. Riyaduddin and A. Padmanabha Reddy,
{Countermeasures Against Image Processing Attacks for Image Watermarking in the Wavelet Domain Using Singular Value Decomposition and Discrete Cosine Transform,}
\textit{Review of Computer Engineering Studies}, vol. 10, no. 2, pp. 51–57, 2023.

\bibitem{5}
Z. Pan, W. C. Yang, and B. Zhao,
{Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi–Region Coverage, Entropy,}
\textit{Entropy}, vol. 24, no. 246, pp. 1–21, 2022.

\bibitem{6}
H. Nazir, I. S. Bajwa, M. Samidullah, A. Anwar, and M. Moosa,
{Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm,}
\textit{Hindawi: Security and Communication Networks}, 2021.

\bibitem{7}
V. Kumar, V. Laddha, S. Aniket, and D. Yadav,
{Image and Text Steganography Using Convolutional Neural Network,}
\textit{TECNICA ITALIANA–Italian Journal of Engineering Science}, vol. 65, no. 1, pp. 26–32, 2022.
% doi: \href{https://doi.org/10.18280/ti-ijes.650104}{10.18280/ti-ijes.650104}.

\bibitem{8}
Tongyuan Huang, Jia Xu, Yuling Yang, and Zhenyu Han,
{Robust Zero–Watermarking Algorithm for Medical Images Using Double–Tree Complex Wavelet Transform and Hessenberg Decomposition,}
\textit{Mathematics}, vol. 10, no. 7, 1154, 2022.
% doi: \href{https://doi.org/10.3390/math10071154}{10.3390/math10071154}.

\bibitem{9}
N. S. Mohammed and A. M. Abduldaim,
{Algebraic Hessenberg Decomposition Method Optimized by Genetic Algorithm for Zero Watermarking Technique,}
\textit{International Journal of Mathematics and Computer Science}, vol. 16, no. 4, pp. 1497–1514, 2021.

\bibitem{10}
K. U. Singh, S. Y. Hsieh, C. Swarup, and C. Singh,
{Authentication of NIFTI Neuroimages Using Lifting Wavelet Transform, Arnold Cat Map, Z–Transform, and Hessenberg Decomposition,}
\textit{Traitement du Signal}, vol. 39, no. 1, pp. 265–274, 2022.
% doi: \href{https://doi.org/10.18280/ts.390127}{10.18280/ts.390127}.

\bibitem{11}
Xiaochao Wang, Qiangian Du, Ling Du, Huayan Deng, and Jianping Hu,
{Robust Zero–Watermarking Algorithm via Multi–Scale Feature Analysis for Medical Images,}
\textit{Journal of Information Security and Applications}, vol. 89, 2025, 103937. \\
% doi: \href{https://doi.org/10.1016/j.jisa.2024.103937}{10.1016/j.jisa.2024.103937}.

\bibitem{12}
Ali, Musrrat, and Sanoj Kumar,
{A Robust Zero–Watermarking Scheme in Spatial Domain by Achieving Features Similar to Frequency Domain,}
\textit{Electronics}, vol. 13, no. 2, p. 435, 2024.
% doi: \href{https://doi.org/10.3390/electronics13020435}{10.3390/electronics13020435}.

\bibitem{13}
Yong Chen, Zhigang Jia, Hao Peng, and Yaxin Peng,
{Interpretable Feature Modeling for Robust Color Watermarking in the Quaternion Framework,}
\textit{Expert Systems with Applications}, vol. 295, 2026, 128901. \\
% doi: \href{https://doi.org/10.1016/j.eswa.2025.128901}{10.1016/j.eswa.2025.128901}.

\bibitem{14}
W. H. Alshoura, Z. Zainol, and J. M. Alawida,
{An FPP–Resistant SVD–Based Image Watermarking Scheme Based on Chaotic Control,}
\textit{Alexandria Engineering Journal}, vol. 61, no. 7, pp. 5713–5734, Jul. 2022.

\bibitem{15}
A. Alzahrani,
{Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT–SVD,}
\textit{Applied Bionics and Biomechanics}, 2022.

\bibitem{16}
N. S. Mohammed and A. M. Abduldaim,
{Algebraic Decomposition Method Utilized in Optimized Zero Watermarking Technique,}
\textit{Proc. 1st Babylon Int. Conf. on Information Technology and Science}, 2021.

\bibitem{17}
W. H. Alshoura and J. M. Alawida,
{Secure and Flexible Image Watermarking Using IWT, SVD, and Chaos Models for Robustness and Imperceptibility,}
\textit{Scientific Reports}, vol. 15, p. 7231, 2025.
% doi: \href{https://doi.org/10.1038/s41598-025-91876-2}{10.1038/s41598-025-91876-2}.

\bibitem{18}
A. M. Abduldaim and A. K. Fara,
{`Combining Algebraic GSVD and Gravitational Search Algorithm for Optimizing Secret Image Watermark Sharing Technique,}
\textit{International Journal of Mathematics and Computer Science}, vol. 17, no. 2, pp. 753–774, 2022.

\bibitem{19}
R. Thomas and M. Sucharitha,
{Reversible Color Image Watermarking Scheme Based on Contourlet Transform and Principal Component Analysis,}
\textit{International Conference on Electrical Energy Systems}, 2021, pp. 641–644.

\bibitem{20}
O. P. Singh, A. K. Singh, A. K. Agrawal, and K. SecDH,
{Security of COVID–19 Images Based on Data Hiding with PCA,}
\textit{Computer Communications}, pp. 191.368–377, 2022.

\bibitem{21}
X. Leng, J. Xiao, and Y. Yang,
{A Robust Image Zero–Watermarking Algorithm Based on DWT and PCA,}
in \textit{Communications in Computer and Information Science}, Springer, Berlin, Heidelberg, vol. 289, 2024.

\bibitem{22}
Lu Yu, Lu Xh., Yang Gy., et al.,
{Double Watermarking Algorithms Based on Fractional–Order Jacobi–Fourier Moments and FFST–Schur,}
\textit{Circuits, Systems, and Signal Processing}, vol. 44, pp. 4796–4827, 2025.
% doi: \href{https://doi.org/10.1007/s00034-025-03014-y}{10.1007/s00034-025-03014-y}.

\bibitem{23}
Altay S. Y., Uluatag G., and Dogan N.,
{Dual Watermarking Schemes Based on QR Decomposition and Schur Decomposition in the RIDWT Domain,}
\textit{SiViP}, vol. 18, pp. 2783–2798, 2024.
% doi: \href{https://doi.org/10.1007/s11760-023-02949-6}{10.1007/s11760-023-02949-6}.

\bibitem{24}
R. I. Sabri and A. M. Abduldaim,
{Mamdani FIS Combined with LU Decomposition Method and Two–Level LWT for Image Watermarking Technique,}
\textit{Proc. 3rd Int. Conf. on Engineering Applications}, 2022.

\bibitem{25}
Yu Lu, Xinhui Lu, Guangyun Yang, Xiangqian He,
{A Robust Zero–Watermarking Algorithm for Multi–Medical Images Based on FFST–Schur and Tent Mapping,}
\textit{Biomedical Signal Processing and Control}, vol. 96, 2024, 106557.
% doi: \href{https://doi.org/10.1016/j.bspc.2024.106557}{10.1016/j.bspc.2024.106557}.

\bibitem{26}
S. A. Kahdim and A. M. Abduldaim,
{Arbitrary Component Analysis for Zero Watermarking Technique,}
\textit{International Journal of Mathematics and Computer Science}, vol. 18, no. 1, pp. 85–97, 2023.
\end{thebibliography}
Published
2025-10-17
Section
Mathematics and Computing - Innovations and Applications (ICMSC-2025)