Improving Data Embedding Capacity in LSB Steganography Utilizing LSB2 and Zlib Compression

Authors

  • Joshua Calvin Kurniawan Universitas Dian Nuswantoro
  • Adhitya Nugraha Universitas Dian Nuswantoro
  • Ariel Immanuel Prayogo Universitas Dian Nuswantoro
  • The, Fandy Novanto Universitas Dian Nuswantoro

DOI:

10.33395/sinkron.v9i1.13185

Keywords:

Compression; Least Significant Bit; LSB-2; Steganography; Zlib

Abstract

In an increasingly advanced era, the exchange of information through digital tools has become a common practice. With easy access and advancing facilities, securely and covertly exchanging data has become a challenging task. Therefore, the technique of steganography can be used as a solution for data hiding and protection, enabling safer data exchanges. Steganography is a method to conceal data within a transmission object, which can be an image, video, audio, and more. In this research, steganography will be performed using images as the transmission object. This study is done to offer a modification of the Least Significant Bit (LSB) steganography technique by utilizing the LSB-2 method, along with the utilization of the Zlib compression algorithm. The modification and use of the Zlib compression algorithm aim to increase the message capacity that can be embedded in the transmission object while preserving the image quality. The results of the experiments will be presented in tabular form by comparing the original image with the steganography-processed image using metrics such as Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index (SSIM) as measures of image quality. The experiments conducted results in an increase of capacity of approximately 36.54%, an increase in PSNR value of approximately 4.72%, accompanied by a decrease in MSE value in average of 49.19%, and SSIM values constantly at 0,99999 thus proving the proposed method successfully increased the embedded massage capacity while preserving even enhance the quality of the stego image produced by the embedding process

GS Cited Analysis

Downloads

Download data is not yet available.

References

AbdelWahab, O. F., Hussein, A. I., Hamed, H. F. A., Kelash, H. M., Khalaf, A. A. M., & Ali, H. M. (2019). Hiding data in images using steganography techniques with compression algorithms. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1168–1175. https://doi.org/10.12928/TELKOMNIKA.V17I3.12230

Aldabagh, G. M. T. K. (2019). Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm. Journal of Southwest Jiaotong University, 54(6). https://doi.org/10.35741/issn.0258-2724.54.6.28

Ehsan Ali, U. A. Md., Ali, E., Sohrawordi, Md., & Sultan, Md. N. (2021). A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload. International Journal of Mathematical Sciences and Computing, 7(3), 24–31. https://doi.org/10.5815/ijmsc.2021.03.03

Hussain, M., Wahab, A. W. A., Idris, Y. I. Bin, Ho, A. T. S., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66. https://doi.org/10.1016/j.image.2018.03.012

Jadav, Y. (2013). Comparison of LSB and Subband DCT Technique for Image Watermarking.

Jayapandiyan, J. R., Kavitha, C., & Sakthivel, K. (2020). Optimal Secret Text Compression Technique for Steganographic Encoding by Dynamic Ranking Algorithm. Journal of Physics: Conference Series, 1427(1). https://doi.org/10.1088/1742-6596/1427/1/012005

Md, U. A., Ali, E., Mohammad, H., Sohrawordi, M., Uddin, P., Ali, U. A. M. E., & Palash Uddin, M. (2019). A Robust and Secured Image Steganography using LSB and Random Bit Substitution. 2, 39–44. www.ajer.org

Nashat, D., & Mamdouh, L. (2019). An efficient steganographic technique for hiding data. Journal of the Egyptian Mathematical Society, 27(1). https://doi.org/10.1186/s42787-019-0061-6

Nilizadeh, A., Nilizadeh, S., Mazurczyk, W., Zou, C., & Leavens, G. T. (2022). Adaptive Matrix Pattern Steganography on RGB Images. Journal of Cyber Security and Mobility, 11(1), 1–28. https://doi.org/10.13052/jcsm2245-1439.1111

Rustad, S., Setiadi, D. R. I. M., Syukur, A., & Andono, P. N. (2022). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University - Computer and Information Sciences, 34(6), 3559–3568. https://doi.org/10.1016/j.jksuci.2020.12.017

Solak, S., Altinisik, U., & Altinişik, U. (2018). The Least Significant Two-bit Substitution Algorithm for Image Steganography. Article in International Journal of Computer. http://ijcjournal.org/

Tayyeh, H. K., & Al-Jumaili, A. S. A. (2022). A combination of least significant bit and deflate compression for image steganography. International Journal of Electrical and Computer Engineering, 12(1), 358–364. https://doi.org/10.11591/ijece.v12i1.pp358-364

Walia, G. S., Makhija, S., Singh, K., & Sharma, K. (2018). Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map. Optik, 170, 106–124. https://doi.org/10.1016/j.ijleo.2018.04.135

Wang, Y., Tang, M., & Wang, Z. (2020). High-capacity adaptive steganography based on LSB and Hamming code. Optik, 213. https://doi.org/10.1016/j.ijleo.2020.164685

Zakaria, A. A., Hussain, M., Wahab, A. W. A., Idris, M. Y. I., Abdullah, N. A., & Jung, K. H. (2018). High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Applied Sciences (Switzerland), 10(11). https://doi.org/10.3390/app8112199

Downloads


Crossmark Updates

How to Cite

Kurniawan, J. C. ., Nugraha, A. ., Prayogo , A. I. ., & Novanto , T. F. . (2024). Improving Data Embedding Capacity in LSB Steganography Utilizing LSB2 and Zlib Compression. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(1), 174-181. https://doi.org/10.33395/sinkron.v9i1.13185