Open Access iconOpen Access

ARTICLE

Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security

Hanan Hardan1,*, Osama A. Khashan2,*, Mohammad Alshinwan1

1 Faculty of Information Technology, Applied Science Private University, Amman, 11931, Jordan
2 Research and Innovation Centers, Rabdan Academy, Abu Dhabi, 114646, United Arab Emirates

* Corresponding Authors: Hanan Hardan. Email: email; Osama A. Khashan. Email: email

Computers, Materials & Continua 2025, 84(1), 1681-1710. https://doi.org/10.32604/cmc.2025.061659

Abstract

This study introduces an Edge-Based Data Hiding and Extraction Algorithm (EBDHEA) to address the problem of data embedding in images while preserving robust security and high image quality. The algorithm produces three classes of pixels from the pixels in the cover image: edges found by the Canny edge detection method, pixels arising from the expansion of neighboring edge pixels, and pixels that are neither edges nor components of the neighboring edge pixels. The number of Least Significant Bits (LSBs) that are used to hide data depends on these classifications. Furthermore, the lossless compression method, Huffman coding, improves image data capacity. To increase the security of the steganographic process, secret messages are encrypted using the XOR encryption technique before being embedded. Metrics such as the Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index Measure (SSIM) are used to assess the efficacy of this algorithm and are compared to previous methods. The findings demonstrate that the suggested approach achieves high similarity between the original and modified images with a maximum PSNR of 60.7 dB for a payload of 18,750 bytes, a maximum SSIM of 0.999 for a payload of 314,572.8 bytes, and a maximum Video Information Fidelity (VIF) of 0.95 for a payload of 23,592 bytes. Normalized Cross-Correlation (NCC) values are very close to 1. In addition, the performance of EBDHEA is implemented on Secure Medical Image Transmission as a real-world example, and the performance is tested against three types of attacks: RS Steganalysis, Chi-square attack, and visual attack, and compared with two deep learning models, such as SRNet and XuNet.

Keywords

Steganography; least significant bit (LSB); edge detection; stego-image; data hiding

Cite This Article

APA Style
Hardan, H., Khashan, O.A., Alshinwan, M. (2025). Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security. Computers, Materials & Continua, 84(1), 1681–1710. https://doi.org/10.32604/cmc.2025.061659
Vancouver Style
Hardan H, Khashan OA, Alshinwan M. Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security. Comput Mater Contin. 2025;84(1):1681–1710. https://doi.org/10.32604/cmc.2025.061659
IEEE Style
H. Hardan, O. A. Khashan, and M. Alshinwan, “Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security,” Comput. Mater. Contin., vol. 84, no. 1, pp. 1681–1710, 2025. https://doi.org/10.32604/cmc.2025.061659



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 134

    View

  • 94

    Download

  • 0

    Like

Share Link