Enhancement of a Spatial Domain Data Hiding Algorithm Using Weighted Vector Filtering and Singular Spectrum Analysis
Keywords:
steganography, two-dimensional singular spectrum analysis, weighted median filter, noise, compressionAbstract
The current state of information technology development necessitates the implementation of highly effective methods and tools to ensure the integrity and confidentiality of digital data. Today, alongside with the traditional cryptographic methods of information protection, steganographic approaches are gaining particular importance, as their main advantage lies in the ability to conceal not only the content of the data but also the very fact of its transmission. Among steganographic methods, the most widely used are techniques for embedding data in the spatial domain of raster images, which is explained by their relative ease of implementation and low computational complexity. At the same time, spatial steganographic methods are vulnerable to various distortions such as filtering, noise attacks, compression, or other image processing operations, which can reduce the robustness of hidden information and increase the risk of data loss. This highlights the need to improve existing methods to enhance their reliability and resilience against malicious impacts.
In this regard, the present work proposes a modified steganographic algorithm for information hiding in the spatial domain using Weighted Median Filtering (WMF) and Two-Dimensional Singular Spectrum Analysis (2D-SSA). This approach allows effective extraction of structural components of the image and improves the robustness of embedded data without significantly degrading the visual quality of the cover image. Furthermore, the proposed method has been extended by incorporating algorithms aimed at reducing the effects of noise (Gaussian, Salt & Pepper) and enhancing robustness against JPEG compression. To assess the quality of the embedded information, PSNR and SSIM metrics were applied, enabling quantitative comparison of the efficiency of different steganographic approaches, including methods based on Discrete Cosine Transform (DCT) and Least Significant Bit (LSB) substitution. Additionally, an adaptive watermark embedding mechanism has been implemented, which further enhances the reliability of hidden data preservation under real-world conditions.
References
Ю. І. Журавель, і Л. З. Мичуда, «Методи підвищення непомітності та стійкості стеганоповідомлень із застосування фрактальних розмірностей,» Сучасний захист інформації, № 1, с. 74-81, 2025. https://doi.org/10.31673/2409-7292.2025.011576 .
R. Shmueli, et al., “A novel technique for image steganography based on maximum energy seam,” Multimed Tools and Applications 83, no. 28, pp. 70907-70920, 2024. https://doi.org/10.1007/s11042-024-18476-6 .
F. Li, Z. Yu, and C. Qin, “GAN-based spatial image steganography with cross feedback mechanism,” Signal Processing, no. 190, pp. 108341, 2022. https://doi.org/10.1016/j.sigpro.2021.108341 .
B. Pan, et al., “Novel hidden bit location method towards JPEG steganography,” Security and Communication Networks, vol. 2022, no. 1, pp. 8230263, 2022. https://doi.org/10.1155/2022/8230263 .
D. Raghuvanshi, et al., “Advancing image steganography: PRISMA-ScR based analysis of spatial domain techniques,” Multimedia Tools and Applications, рр. 1-35, 2025. https://doi.org/10.1007/s11042-025-21040-5 .
P. Milosav, M. Milosavljevic, and Z. Banjac, “Steganographic method in selected areas of the stego-carrier in the spatial domain,” Symmetry, vol. 15, no. 5, pp. 1015, 2023. https://doi.org/10.3390/sym15051015.
A. M. Alhomoud, “Image steganography in spatial domain: Current status, techniques, and trends,” Intell. Autom. Soft. Comput., vol. 27, no. 1, pp. 2213-2224, 2021. https://doi.org/10.32604/iasc.2021.014773 .
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).