Adaptive Image Steganography Using Linear Hash Functions and Chessboard-Partitioned Blocks


Yerimbetova A. Daiyrbayeva E. Merzlyakova E. Sambetbayeva M. Bayekeyeva A. Berzhanova U.
2025Institute of Electrical and Electronics Engineers Inc.

International Conference on Computer Science and Engineering, UBMK
2025Issue 20251362 - 1367 pp.

This paper presents an adaptive image steganography technique that integrates linear hash functions with chessboard-partitioned image blocks to achieve high-capacity data embedding while preserving visual quality. The proposed method operates on 8×8 pixel blocks, which are classified based on local variance into three categories: smooth, moderately complex, and highly textured. Depending on the category, the algorithm adaptively determines the number of least significant bits (LSBs) used for embedding, allowing for a balance between payload and imperceptibility. A key innovation of the approach is the use of staggered partitioning within each block, where one subset of pixels is used for embedding, and the other remains unchanged to enable blind estimation of variance during extraction. This enables the decoder to reconstruct the embedding conditions without requiring access to the original image or auxiliary metadata. The embedding process utilizes a linear hash function based on primitive polynomial division in the Galois Field GF(2). This allows an m-bit message to be embedded into an D =s-1, sN bit sequence with only a single-bit modification, ensuring minimal statistical disruption to the cover image. Experimental validation was conducted using the BOSSBase v1.01 dataset, where the method achieved embedding rates ranging from 0.3 to 0.9 bits per pixel (bpp), with Peak Signal-to-Noise Ratio (PSNR) values consistently exceeding 44 dB. In addition to high fidelity and capacity, the algorithm is computationally efficient, relying on simple binary operations such as XOR and polynomial transformations in GF(2), which makes it suitable for implementation in low-resource environments such as embedded and mobile systems.

adaptive embedding , linear hash function , LSB modification , steganography

Text of the article Перейти на текст статьи

Institute of Information and Computational Technologies, Committee of Science of the Ministry of Science, Higher Education of the Republic of Kazakhstan, Satbayev University, Almaty, Kazakhstan
Siberian State University of Telecommunications and Information Science, Novosibirsk, Russian Federation
Institute of Information and Computational Technologies, Higher Education of the Republic of Kazakhstan, Committee of Science of the Ministry of Science, Almaty, Kazakhstan
L.N. Gumilyov Eurasian National University, Astana, Kazakhstan
Institute of Information and Computational Technologies, Committee of Science of the Ministry of Science, Higher Education of the Republic of Kazakhstan, Maqsut Narikbayev University, Astana, Kazakhstan
Institute of Information and Computational Technologies, Committee of Science of the Ministry of Science, Higher Education of the Republic of Kazakhstan, Al-Farabi Kazakh National University, Almaty, Kazakhstan

Institute of Information and Computational Technologies
Siberian State University of Telecommunications and Information Science
Institute of Information and Computational Technologies
L.N. Gumilyov Eurasian National University
Institute of Information and Computational Technologies
Institute of Information and Computational Technologies

10 лет помогаем публиковать статьи Международный издатель

Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026