Enhancing Data Security through Digital Image Steganography: An Implementation of the Two Least Significant Bits (2LSB) Method

Authors

DOI:

https://doi.org/10.51903/ijgd.v2i2.2124

Keywords:

Steganography, 2LSB, data security, PSNR, digital communication

Abstract

The rapid advancement of digital communication technologies has heightened the demand for robust data security methods, particularly for safeguarding sensitive information against cyber threats. Steganography, the art of concealing data within digital media, offers an effective means of securing communication by masking the very existence of hidden messages. This study evaluates the Two Least Significant Bits (2LSB) method as an enhancement to the conventional Least Significant Bit (LSB) technique, focusing on improving storage capacity and resistance to detection. The research employs a quantitative methodology, conducting experiments to analyze the impact of data embedding on image quality using metrics such as Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). Data embedding was tested on images of varying sizes and resolutions, with results compared before and after embedding. The study also evaluates the system’s tolerance to compression and robustness against steganalysis attacks, such as histogram analysis and noise detection. The results demonstrate that the 2LSB method significantly enhances storage capacity while maintaining high image quality. For instance, PSNR values remained above 40 dB across all tested images, indicating minimal visual distortion. The method also showed resilience to lossless compression formats such as PNG, with minimal impact on data integrity. However, lossy compression formats like JPEG posed challenges in maintaining the embedded data. The MSE values before and after embedding were minor, ensuring that the hidden data remained undetectable under standard analysis. This research contributes to developing more efficient and secure steganography techniques, providing practical applications in protecting sensitive data during transmission. The findings underline the 2LSB method's potential as a viable solution for digital security, balancing enhanced storage capacity with robust resistance to detection. Future work should further explore integrating advanced encryption with 2LSB to strengthen data protection in diverse digital environments

References

Abduljaleel, I. Q., Abduljabbar, Z. A., Al Sibahee, M. A., Ghrabat, M. J. J., Ma, J., & Nyangaresi, V. O. (2022). A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques. Journal of Sensor and Actuator Networks, 11(4), 66. https://doi.org/10.3390/jsan11040066

Alabaichi, A., Al-Dabbas, M. A. A. K., & Salih, A. (2020). Image Steganography Using Least Significant Bit and Secret Map Techniques. International Journal of Electrical and Computer Engineering, 10(1), 935–946. https://doi.org/10.11591/ijece.v10i1.pp935-946

Alexan, W., El Beheiry, M., & Gamal–Eldin, O. (2020). A Comparative Study Among Different Mathematical Sequences in 3D Image Steganography. International Journal of Computing and Digital Systems, 90(4), 545–552. https://doi.org/10.12785/ijcds/090403

Bansal, K., Agrawal, A., & Bansal, N. (2020). A Survey on Steganography Using Least Significant Bit (LSB) Embedding Approach. Proceedings of the 4th International Conference on Trends in Electronics and Informatics, ICOEI 2020, 64–69. https://doi.org/10.1109/icoei48184.2020.9142896

Berdich, A., & Groza, B. (2022). Smartphone Camera Identification from Low-Mid Frequency DCT Coefficients of Dark Images. Entropy, 24(8), 1158. https://doi.org/10.3390/e24081158

Gilkarov, D., & Dubin, R. (2024). Steganalysis of AI Models LSB Attacks. IEEE Transactions on Information Forensics and Security, 19, 4767–4779. https://doi.org/10.1109/tifs.2024.3383770

Gutub, A., & Al-Shaarani, F. (2020). Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons. Arabian Journal for Science and Engineering, 45(4), 2631–2644. https://doi.org/10.1007/s13369-020-04413-w

Hacimurtazaoglu, M., & Tutuncu, K. (2022). LSB-Based Pre-Embedding Video Steganography with Rotating & Shifting Poly-Pattern Block Matrix. PeerJ Computer Science, 8, 843. https://doi.org/10.7717/peerj-cs.843

Halboos, E. H. J., & Albakry, A. M. (2022). Hiding Text Using the Least Significant Bit Technique to Improve Cover Image in the Steganography System. Bulletin of Electrical Engineering and Informatics, 11(6), 3258–3271. https://doi.org/10.11591/eei.v11i6.4337

Hussain, M., Riaz, Q., Saleem, S., Ghafoor, A., & Jung, K. H. (2021). Enhanced Adaptive Data Hiding Method Using LSB and Pixel Value Differencing. Multimedia Tools and Applications, 80(13), 20381–20401. https://doi.org/10.1007/s11042-021-10652-2

Ince, I. F., Bulut, F., Kilic, I., Yildirim, M. E., & Ince, O. F. (2022). Low Dynamic Range Discrete Cosine Transform (LDR-DCT) for High-Performance JPEG Image Compression. Visual Computer, 38(5), 1845–1870. https://doi.org/10.1007/s00371-022-02418-0

Islam, M. R., Tanni, T. R., Parvin, S., Sultana, M. J., & Siddiqa, A. (2021). A Modified LSB Image Steganography Method Using Filtering Algorithm and Stream of Password. Information Security Journal, 30(6), 359–370. https://doi.org/10.1080/19393555.2020.1854902

Jabbar, K. K., Tuieb, M. B., & Thajeel, S. A. (2022). Digital Watermarking by Utilizing the Properties of Self-Organization Map Based on Least Significant and Most Significant Bit. International Journal of Electrical and Computer Engineering, 12(6), 6545–6558. https://doi.org/10.11591/ijece.v12i6.pp6545-6558

Jamel, E. M. (2020). Image Steganography Based on Wavelet Transform and Histogram Modification. Ibn AL- Haitham Journal For Pure and Applied Sciences, 33(1), 173. https://doi.org/10.30526/33.1.2365

Jelušić, P. B., Poljičak, A., Donevski, D., & Cigula, T. (2022). Low-Frequency Data Embedding for DFT-Based Image Steganography. International Journal of Software Science and Computational Intelligence, 14(1), 1–11. https://doi.org/10.4018/ijssci.312558

Kaur, S., Singh, S., Kaur, M., & Lee, H. N. (2022). A Systematic Review of Computational Image Steganography Approaches. Archives of Computational Methods in Engineering, 29(7), 4775–4797. https://doi.org/10.1007/s11831-022-09749-0

Kholiavko, N., Popelo, O., Bazhenkov, I., Shaposhnykova, I., & Sheremet, O. (2021). Information and Communication Technologies as a Tool of Strategy for Ensuring Higher Education Adaptability to the Digital Economy Challenges. International Journal of Computer Science and Network Security, 21(8), 187–195. https://doi.org/10.22937/ijcsns.2021.21.8.25

Laimeche, L., Meraoumia, A., & Bendjenna, H. (2020). Enhancing LSB Embedding Schemes Using Chaotic Maps Systems. Neural Computing and Applications, 32(21), 16605–16623. https://doi.org/10.1007/s00521-019-04523-z

Majeed, M. A., Sulaiman, R., Shukur, Z., & Hasan, M. K. (2021). A Review on Text Steganography Techniques. Mathematics, 9(21), 2829. https://doi.org/10.3390/math9212829

Mawla, N. A., & Khafaji, H. K. (2023). Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography. Computers, 12(8), 166. https://doi.org/10.3390/computers12080166

Modupe, A. Oluwaseun., Adedoyin, A. E., & Titilayo, A. O. (2021). A Comparative Analysis of LSB, MSB and PVD Based Image Steganography. International Journal of Research and Review, 8(9), 373–377. https://doi.org/10.52403/ijrr.20210948

Prasanalakshmi, B., Murugan, K., Srinivasan, K., Shridevi, S., Shamsudheen, S., & Hu, Y. C. (2022). Improved Authentication and Computation of Medical Data Transmission in The Secure IoT Using Hyperelliptic Curve Cryptography. Journal of Supercomputing, 78(1), 361–378. https://doi.org/10.1007/s11227-021-03861-x

Rinki, K., Verma, P., & Singh, R. K. (2022). A Novel Matrix Multiplication Based LSB Substitution Mechanism for Data Security and Authentication. Journal of King Saud University - Computer and Information Sciences, 34(8), 5510–5524. https://doi.org/10.1016/j.jksuci.2021.01.013

Sahu, A. K., & Swain, G. (2022). High Fidelity Based Reversible Data Hiding Using Modified LSB Matching and Pixel Difference. Journal of King Saud University - Computer and Information Sciences, 34(4), 1395–1409. https://doi.org/10.1016/j.jksuci.2019.07.004

Shah, A., Bangash, J. I., Khan, A. W., Ahmed, I., Khan, A., Khan, A., & Khan, A. (2022). Comparative Analysis of Median Filter and Its Variants for Removal of Impulse Noise from Gray Scale Images. Journal of King Saud University - Computer and Information Sciences, 34(3), 505–519. https://doi.org/10.1016/j.jksuci.2020.03.007

Shekhawat, V. S., Tiwari, M., & Patel, M. (2021). A Secured Steganography Algorithm for Hiding an Image and Data in an Image Using LSB Technique. Advances in Intelligent Systems and Computing, 1257, 455–468. https://doi.org/10.1007/978-981-15-7907-3_35

Tiwari, K., & Gangurde, S. J. (2021). LSB Steganography Using Pixel Locator Sequence with AES. ICSCCC 2021 - International Conference on Secure Cyber Computing and Communications, 302–307. https://doi.org/10.1109/icsccc51823.2021.9478162

Varghese, F., & Sasikala, P. (2023). A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography. Wireless Personal Communications, 129(4), 2291–2318. https://doi.org/10.1007/s11277-023-10183-z

Yadahalli, S. S., Rege, S., & Sonkusare, R. (2020). Implementation and Analysis of Image Steganography Using Least Significant Bit and Discrete Wavelet Transform Techniques. Proceedings of the 5th International Conference on Communication and Electronics Systems, ICCES 2020, 1325–1330. https://doi.org/10.1109/icces48766.2020.9137887

Zhang, Q., Xu, Z., Yang, Z., Ren, Z., Yuan, S., & Cheng, J. (2024). Enhancing Visual Place Recognition Using Discrete Cosine Transform and Difference-Based Descriptors. IEEE Transactions on Circuits and Systems II: Express Briefs, 71(7), 3368–3372. https://doi.org/10.1109/tcsii.2024.3358982

Published

2024-11-25

How to Cite

Hakim, F. N., & Sholikhan, M. (2024). Enhancing Data Security through Digital Image Steganography: An Implementation of the Two Least Significant Bits (2LSB) Method. International Journal of Graphic Design, 2(2), 222–235. https://doi.org/10.51903/ijgd.v2i2.2124