LSB-2 Steganography with Brotli Compression and base64 Encoding for Improving Data Embedding Capacity
DOI:
10.33395/sinkron.v8i2.13264Keywords:
Brotli, Compression, LSB-2, Least Significant Bit, SteganographyAbstract
Steganography functions as a technique for embedding messages or data in various forms of media, such as images, audio, video, or text, with the aim of avoiding detection by unauthorized parties. Steganography techniques can be used as a solution to hide and protect data. In this research, steganography will be carried out using images as the transmission object. This research was conducted to offer a modification of the Least Significant Bit (LSB) steganography technique using the LSB-2 method with Brotli compression and base64 encoding. Modification and use of Brotli compression and base64 coding aims to increase the message capacity that can be embedded in a transmission object while maintaining the quality of the transmission object. Experiments using small data and big data. The experimental results will be presented in tabular form by comparing the original image with the steganographically processed image using metrics such as Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index (SSIM) as a comparison. The experiments carried out resulted in an increase in image capacity by reducing capacity usage with an average of 47.13% for small data and an average of 71.34%. The big data experiment resulted in an increase in the PSNR value of around 3.49%, accompanied by a decrease in the average MSE value of 33.85%, and a constant SSIM value of 0.9999, thus proving that the proposed method was successful in increasing image capacity and improving stego-image quality. when embedding big data.
Downloads
References
Saxena A. K., Sinha S., & Shukla P.(2018). Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach. International Journal of Image, Graphics and Signal Processing, 10(4), 13-21. https://doi.org/10.5815/ijigsp.2018.04.02
AbdelWahab, O. F., Hussein, A. I., Hamed, H. F. A., Kelash, H. M., Khalaf, A. A. M., & Ali, H. M. (2019). Hiding data in images using steganography techniques with compression algorithms. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1168–1175. https://doi.org/10.12928/TELKOMNIKA.V17I3.12230
Jayapandiyan, J. R., Kavitha, C., & Sakthivel, K. (2020). Optimal Secret Text Compression Technique for Steganographic Encoding by Dynamic Ranking Algorithm. Journal of Physics: Conference Series, 1427(1). https://doi.org/10.1088/1742-6596/1427/1/012005
Zubair A. S., & Soomro T. R (2018). Compression Algorithms: Brotli, Gzip and Zopfli Perspective. Indian Journal of Science and Technology, 11(45), 1-4. https://doi.org/10.17485/ijst/2018/v11i45/117921
Nilizadeh, A., Nilizadeh, S., Mazurczyk, W., Zou, C., & Leavens, G. T. (2022). Adaptive Matrix Pattern Steganography on RGB Images. Journal of Cyber Security and Mobility, 11(1), 1–28. https://doi.org/10.13052/jcsm2245-1439.1111
Tayyeh, H. K., & Al-Jumaili, A. S. A. (2022). A combination of least significant bit and deflate compression for image steganography. International Journal of Electrical and Computer Engineering, 12(1), 358–364. https://doi.org/10.11591/ijece.v12i1.pp358-364
Rustad, S., Setiadi, D. R. I. M., Syukur, A., & Andono, P. N. (2022). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University - Computer and Information Sciences, 34(6), 3559–3568. https://doi.org/10.1016/j.jksuci.2020.12.017
Ehsan Ali, U. A. Md., Ali, E., Sohrawordi, Md., & Sultan, Md. N. (2021). A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload. International Journal of Mathematical Sciences and Computing, 7(3), 24–31. https://doi.org/10.5815/ijmsc.2021.03.03
Nashat, D., & Mamdouh, L. (2019). An efficient steganographic technique for hiding data. Journal of the Egyptian Mathematical Society, 27(1). https://doi.org/10.1186/s42787-019-0061-6
Wang, Y., Tang, M., & Wang, Z. (2020). High-capacity adaptive steganography based on LSB and Hamming code. Optik, 213. https://doi.org/10.1016/j.ijleo.2020.164685
Md, U. A., Ali, E., Mohammad, H., Sohrawordi, M., Uddin, P., Ali, U. A. M. E., & Palash Uddin, M. (2019). A Robust and Secured Image Steganography using LSB and Random Bit Substitution. 2, 39–44. www.ajer.org
Aldabagh, G. M. T. K. (2019). Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm. Journal of Southwest Jiaotong University, 54(6). https://doi.org/10.35741/issn.0258-2724.54.6.28
Hussain, M., Wahab, A. W. A., Idris, Y. I. Bin, Ho, A. T. S., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66. https://doi.org/10.1016/j.image.2018.03.012
Solak, S., Altinisik, U., & Altinişik, U. (2018). The Least Significant Two-bit Substitution Algorithm for Image Steganography. Article in International Journal of Computer. http://ijcjournal.org/
Walia, G. S., Makhija, S., Singh, K., & Sharma, K. (2018). Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map. Optik, 170, 106–124. https://doi.org/10.1016/j.ijleo.2018.04.135
Zakaria, A. A., Hussain, M., Wahab, A. W. A., Idris, M. Y. I., Abdullah, N. A., & Jung, K. H. (2018). High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Applied Sciences (Switzerland), 10(11). https://doi.org/10.3390/app8112199
Jadav, Y. (2013). Comparison of LSB and Subband DCT Technique for Image Watermarking.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2024 Muhammad Yiko Satriyawibawa, Pulung Nurtantio Andono, Lim Way Soong, Ng Poh Kiat
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.