LSB-2 Steganography with Brotli Compression and base64 Encoding for Improving Data Embedding Capacity


  • Muhammad Yiko Satriyawibawa Universitas Dian Nuswantoro
  • Pulung Nurtantio Andono Universitas Dian Nuswantoro
  • Lim Way Soong Multimedia University, Malaysia
  • Ng Poh Kiat Multimedia University, Malaysia




Brotli, Compression, LSB-2, Least Significant Bit, Steganography


Steganography functions as a technique for embedding messages or data in various forms of media, such as images, audio, video, or text, with the aim of avoiding detection by unauthorized parties. Steganography techniques can be used as a solution to hide and protect data. In this research, steganography will be carried out using images as the transmission object. This research was conducted to offer a modification of the Least Significant Bit (LSB) steganography technique using the LSB-2 method with Brotli compression and base64 encoding. Modification and use of Brotli compression and base64 coding aims to increase the message capacity that can be embedded in a transmission object while maintaining the quality of the transmission object. Experiments using small data and big data. The experimental results will be presented in tabular form by comparing the original image with the steganographically processed image using metrics such as Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index (SSIM) as a comparison. The experiments carried out resulted in an increase in image capacity by reducing capacity usage with an average of 47.13% for small data and an average of 71.34%. The big data experiment resulted in an increase in the PSNR value of around 3.49%, accompanied by a decrease in the average MSE value of 33.85%, and a constant SSIM value of 0.9999, thus proving that the proposed method was successful in increasing image capacity and improving stego-image quality. when embedding big data.

GS Cited Analysis


Download data is not yet available.


Saxena A. K., Sinha S., & Shukla P.(2018). Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach. International Journal of Image, Graphics and Signal Processing, 10(4), 13-21.

AbdelWahab, O. F., Hussein, A. I., Hamed, H. F. A., Kelash, H. M., Khalaf, A. A. M., & Ali, H. M. (2019). Hiding data in images using steganography techniques with compression algorithms. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1168–1175.

Jayapandiyan, J. R., Kavitha, C., & Sakthivel, K. (2020). Optimal Secret Text Compression Technique for Steganographic Encoding by Dynamic Ranking Algorithm. Journal of Physics: Conference Series, 1427(1).

Zubair A. S., & Soomro T. R (2018). Compression Algorithms: Brotli, Gzip and Zopfli Perspective. Indian Journal of Science and Technology, 11(45), 1-4.

Nilizadeh, A., Nilizadeh, S., Mazurczyk, W., Zou, C., & Leavens, G. T. (2022). Adaptive Matrix Pattern Steganography on RGB Images. Journal of Cyber Security and Mobility, 11(1), 1–28.

Tayyeh, H. K., & Al-Jumaili, A. S. A. (2022). A combination of least significant bit and deflate compression for image steganography. International Journal of Electrical and Computer Engineering, 12(1), 358–364.

Rustad, S., Setiadi, D. R. I. M., Syukur, A., & Andono, P. N. (2022). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University - Computer and Information Sciences, 34(6), 3559–3568.

Ehsan Ali, U. A. Md., Ali, E., Sohrawordi, Md., & Sultan, Md. N. (2021). A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload. International Journal of Mathematical Sciences and Computing, 7(3), 24–31.

Nashat, D., & Mamdouh, L. (2019). An efficient steganographic technique for hiding data. Journal of the Egyptian Mathematical Society, 27(1).

Wang, Y., Tang, M., & Wang, Z. (2020). High-capacity adaptive steganography based on LSB and Hamming code. Optik, 213.

Md, U. A., Ali, E., Mohammad, H., Sohrawordi, M., Uddin, P., Ali, U. A. M. E., & Palash Uddin, M. (2019). A Robust and Secured Image Steganography using LSB and Random Bit Substitution. 2, 39–44.

Aldabagh, G. M. T. K. (2019). Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm. Journal of Southwest Jiaotong University, 54(6).

Hussain, M., Wahab, A. W. A., Idris, Y. I. Bin, Ho, A. T. S., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66.

Solak, S., Altinisik, U., & Altinişik, U. (2018). The Least Significant Two-bit Substitution Algorithm for Image Steganography. Article in International Journal of Computer.

Walia, G. S., Makhija, S., Singh, K., & Sharma, K. (2018). Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map. Optik, 170, 106–124.

Zakaria, A. A., Hussain, M., Wahab, A. W. A., Idris, M. Y. I., Abdullah, N. A., & Jung, K. H. (2018). High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Applied Sciences (Switzerland), 10(11).

Jadav, Y. (2013). Comparison of LSB and Subband DCT Technique for Image Watermarking.


Crossmark Updates

How to Cite

Satriyawibawa, M. Y. ., Andono, P. N. ., Soong, L. W. ., & Kiat, N. P. . (2024). LSB-2 Steganography with Brotli Compression and base64 Encoding for Improving Data Embedding Capacity. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(2), 878-884.