LSB-2 Steganography with Brotli Compression and base64 Encoding for Improving Data Embedding Capacity

Authors

  • Muhammad Yiko Satriyawibawa Universitas Dian Nuswantoro
  • Pulung Nurtantio Andono Universitas Dian Nuswantoro
  • Lim Way Soong Multimedia University, Malaysia
  • Ng Poh Kiat Multimedia University, Malaysia

DOI:

10.33395/sinkron.v8i2.13264

Keywords:

Brotli, Compression, LSB-2, Least Significant Bit, Steganography

Abstract

Steganography functions as a technique for embedding messages or data in various forms of media, such as images, audio, video, or text, with the aim of avoiding detection by unauthorized parties. Steganography techniques can be used as a solution to hide and protect data. In this research, steganography will be carried out using images as the transmission object. This research was conducted to offer a modification of the Least Significant Bit (LSB) steganography technique using the LSB-2 method with Brotli compression and base64 encoding. Modification and use of Brotli compression and base64 coding aims to increase the message capacity that can be embedded in a transmission object while maintaining the quality of the transmission object. Experiments using small data and big data. The experimental results will be presented in tabular form by comparing the original image with the steganographically processed image using metrics such as Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index (SSIM) as a comparison. The experiments carried out resulted in an increase in image capacity by reducing capacity usage with an average of 47.13% for small data and an average of 71.34%. The big data experiment resulted in an increase in the PSNR value of around 3.49%, accompanied by a decrease in the average MSE value of 33.85%, and a constant SSIM value of 0.9999, thus proving that the proposed method was successful in increasing image capacity and improving stego-image quality. when embedding big data.

GS Cited Analysis

Downloads

Download data is not yet available.

References

Saxena A. K., Sinha S., & Shukla P.(2018). Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach. International Journal of Image, Graphics and Signal Processing, 10(4), 13-21. https://doi.org/10.5815/ijigsp.2018.04.02

AbdelWahab, O. F., Hussein, A. I., Hamed, H. F. A., Kelash, H. M., Khalaf, A. A. M., & Ali, H. M. (2019). Hiding data in images using steganography techniques with compression algorithms. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1168–1175. https://doi.org/10.12928/TELKOMNIKA.V17I3.12230

Jayapandiyan, J. R., Kavitha, C., & Sakthivel, K. (2020). Optimal Secret Text Compression Technique for Steganographic Encoding by Dynamic Ranking Algorithm. Journal of Physics: Conference Series, 1427(1). https://doi.org/10.1088/1742-6596/1427/1/012005

Zubair A. S., & Soomro T. R (2018). Compression Algorithms: Brotli, Gzip and Zopfli Perspective. Indian Journal of Science and Technology, 11(45), 1-4. https://doi.org/10.17485/ijst/2018/v11i45/117921

Nilizadeh, A., Nilizadeh, S., Mazurczyk, W., Zou, C., & Leavens, G. T. (2022). Adaptive Matrix Pattern Steganography on RGB Images. Journal of Cyber Security and Mobility, 11(1), 1–28. https://doi.org/10.13052/jcsm2245-1439.1111

Tayyeh, H. K., & Al-Jumaili, A. S. A. (2022). A combination of least significant bit and deflate compression for image steganography. International Journal of Electrical and Computer Engineering, 12(1), 358–364. https://doi.org/10.11591/ijece.v12i1.pp358-364

Rustad, S., Setiadi, D. R. I. M., Syukur, A., & Andono, P. N. (2022). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University - Computer and Information Sciences, 34(6), 3559–3568. https://doi.org/10.1016/j.jksuci.2020.12.017

Ehsan Ali, U. A. Md., Ali, E., Sohrawordi, Md., & Sultan, Md. N. (2021). A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload. International Journal of Mathematical Sciences and Computing, 7(3), 24–31. https://doi.org/10.5815/ijmsc.2021.03.03

Nashat, D., & Mamdouh, L. (2019). An efficient steganographic technique for hiding data. Journal of the Egyptian Mathematical Society, 27(1). https://doi.org/10.1186/s42787-019-0061-6

Wang, Y., Tang, M., & Wang, Z. (2020). High-capacity adaptive steganography based on LSB and Hamming code. Optik, 213. https://doi.org/10.1016/j.ijleo.2020.164685

Md, U. A., Ali, E., Mohammad, H., Sohrawordi, M., Uddin, P., Ali, U. A. M. E., & Palash Uddin, M. (2019). A Robust and Secured Image Steganography using LSB and Random Bit Substitution. 2, 39–44. www.ajer.org

Aldabagh, G. M. T. K. (2019). Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm. Journal of Southwest Jiaotong University, 54(6). https://doi.org/10.35741/issn.0258-2724.54.6.28

Hussain, M., Wahab, A. W. A., Idris, Y. I. Bin, Ho, A. T. S., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66. https://doi.org/10.1016/j.image.2018.03.012

Solak, S., Altinisik, U., & Altinişik, U. (2018). The Least Significant Two-bit Substitution Algorithm for Image Steganography. Article in International Journal of Computer. http://ijcjournal.org/

Walia, G. S., Makhija, S., Singh, K., & Sharma, K. (2018). Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map. Optik, 170, 106–124. https://doi.org/10.1016/j.ijleo.2018.04.135

Zakaria, A. A., Hussain, M., Wahab, A. W. A., Idris, M. Y. I., Abdullah, N. A., & Jung, K. H. (2018). High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Applied Sciences (Switzerland), 10(11). https://doi.org/10.3390/app8112199

Jadav, Y. (2013). Comparison of LSB and Subband DCT Technique for Image Watermarking.

Downloads


Crossmark Updates

How to Cite

Satriyawibawa, M. Y. ., Andono, P. N. ., Soong, L. W. ., & Kiat, N. P. . (2024). LSB-2 Steganography with Brotli Compression and base64 Encoding for Improving Data Embedding Capacity. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(2), 878-884. https://doi.org/10.33395/sinkron.v8i2.13264