Optimizing Digital Image Steganography through Hybridization of LSB and Zstandard Compression
DOI:
10.33395/sinkron.v9i1.13187Keywords:
Secure Digital Communication; Steganography; LSB; Zstd; Data ConcealmentAbstract
In response to the growing need for secure digital communication globally, this research delves into an innovative strategy for enhancing data transmission security through steganography. This inventive approach involves the integration of the conventional Least Significant Bit (LSB) method with Zstandard (Zstd) compression to elevate the quality of stego images. The study carefully explores how the synergistic use of LSB and Zstd contributes to an improved equilibrium between embedding capacity and visual quality in stego images. This hybrid methodology capitalizes on the efficiency of Zstd in reducing file size, thereby facilitating more effective data concealment using LSB. The experimental outcomes showcase a notable 51.2% increase in embedding capacity, a 4.70% elevation in PSNR value, accompanied by a substantial 51.03% decrease in MSE value. Additionally, SSIM values hover around 0.007%, indicating a perceptually minimal difference between the original and steganographically modified images. These compelling results underscore the efficacy of the proposed method, highlighting its proficiency in preserving and enhancing the quality of stego images generated through the embedding process. This research signifies a significant stride in the realm of secure digital communication, demonstrating a promising fusion of traditional LSB with advanced Zstd compression for optimizing digital image steganographic.
Downloads
References
AbdelWahab, O. F., Hussein, A. I., Hamed, H. F. A., Kelash, H. M., Khalaf, A. A. M., & Ali, H. M. (2019). Hiding data in images using steganography techniques with compression algorithms. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1168–1175. https://doi.org/10.12928/TELKOMNIKA.V17I3.12230
Al-Azzeh, J., Alqadi, Z., Ayyoub, B., & Sharadqh, A. (2019). Improving the Security of LSB Image Steganography.
Hussain, M., Wahab, A. W. A., Idris, Y. I. Bin, Ho, A. T. S., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66. https://doi.org/10.1016/j.image.2018.03.012
Ibrahim Almazaydeh, el A., Sheshadri, H. S., & Padma, S. (2018). A Novel Method to Hide a Text in an Image Using a Dynamic Symmetric Key and Huffman Coding. IJRECE, 6(3), 1095–1101.
Jayapandiyan, J. R., Kavitha, C., & Sakthivel, K. (2020). Optimal Secret Text Compression Technique for Steganographic Encoding by Dynamic Ranking Algorithm. Journal of Physics: Conference Series, 1427(1). https://doi.org/10.1088/1742-6596/1427/1/012005
Nashat, D., & Mamdouh, L. (2019). An efficient steganographic technique for hiding data. Journal of the Egyptian Mathematical Society, 27(1). https://doi.org/10.1186/s42787-019-0061-6
Rahman, S., Uddin, J., Hussain, H., Ahmed, A., Khan, A. A., Zakarya, M., Rahman, A., & Haleem, M. (2023). A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image. Scientific Reports, 13(1). https://doi.org/10.1038/s41598-023-41303-1
Rustad, S., Setiadi, D. R. I. M., Syukur, A., & Andono, P. N. (2022). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University - Computer and Information Sciences, 34(6), 3559–3568. https://doi.org/10.1016/j.jksuci.2020.12.017
S, S., Karanth, S., & Kumar, S. (2021). Protection of data using image watermarking technique. Global Transitions Proceedings, 2(2), 386–391. https://doi.org/10.1016/j.gltp.2021.08.035
Sethi, N., & Patel, P. (2019). Steganography Technique with Huffman Code. International Journal of Recent Technology and Engineering, 8(2S4), 867–870. https://doi.org/10.35940/ijrte.b1173.0782s419
Tayyeh, H. K., & Al-Jumaili, A. S. A. (2022). A combination of least significant bit and deflate compression for image steganography. International Journal of Electrical and Computer Engineering, 12(1), 358–364. https://doi.org/10.11591/ijece.v12i1.pp358-364
Venkatesh, M. K., Sailaja, G., Tapaswi, C., Chandramani, G., & Rohith, C. (2023). DIGITAL WATERMARKING TECHNIQUES USING LSB.
Walia, G. S., Makhija, S., Singh, K., & Sharma, K. (2018). Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map. Optik, 170, 106–124. https://doi.org/10.1016/j.ijleo.2018.04.135
Walker, L. A., Li, Y., Mcglothlin, M., & Cai, D. (2023). A Comparison of Lossless Compression Methods in Microscopy Data Storage Applications. Proceedings of The 6th International Conference on Software Engineering and Information Management. (ICSIM ’23), 14(7), 129–137. https://doi.org/10.1101/2023.01.24.525380
Wang, Y., Tang, M., & Wang, Z. (2020). High-capacity adaptive steganography based on LSB and Hamming code. Optik, 213. https://doi.org/10.1016/j.ijleo.2020.164685
Zakaria, A. A., Hussain, M., Wahab, A. W. A., Idris, M. Y. I., Abdullah, N. A., & Jung, K. H. (2018). High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Applied Sciences (Switzerland), 10(11). https://doi.org/10.3390/app8112199
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2023 Fandy Novanto , Adhitya Nugraha, Joshua Calvin Kurniawan, Ariel Immanuel Prayogo
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.