A Modified Least Significant Bit Replacement
A Modified Least Significant Bit Replacement
1 Research article
How to cite this paper: Usman, M. and Yusuf, B. (2022). A Modified Least Significant Bit Replacement: Steganography Method for Handling Random Noise
Effect. IPS Journal of Physical Sciences, 1(1), 1–5. https://doi.org/10.54117/ijps.v1i1.1.
This work is published open access under the Creative Commons Attribution License 4.0, which permits free reuse, remix, redistribution and transformation provided due credit is given.
1
Available: https://doi.org/10.54117/ijps.v1i1.1 Research article
image that draw intruder’s attention to easily sense a secret message is hidden Emam, Ali and Omara (2016) proposed a random pixel replacement method
in the stego image. The method also accommodates only 15 bytes or less of to hide bits of the secret message. This method pays attention to hiding a
message. message only in blue and green components of the cover image pixels,
neglecting red colour component. This method achieved a high PSNR of
40.434 dB however; the appearance of the stego-image after embedding
considerably changes. The method also has a good message hiding capacity as
it can wrap up to 50 bytes of message length.
Ali and Saad (2019) proposed Secret Message Matching (SMM) method if the
embedded bit does not match the LSB of the cover image, then the pixel value
of the corresponding pixel is randomly added by ±1. The original image and
the stego image looks identical to the Human Visual System and this help
reduces suspicion of secret communication. The method achieved 40.1132 dB
PSNR but designed to hide only 20 bytes long message.
Abdul-Sada (2017) method is based on LSB-3. The paper exploits the third
Least Significant Bit instead of first or second Least Significant Bit and it has
achieved great capacity of hiding up to 45 bytes of message and 30.087 dB of
PSNR. The original and stego looks a bit different as noise is slightly
noticeable to the human eye.
Korothan, Kishor and Butey (2016) proposed a technique that involves hiding Figure 3: Combined Approach (Manikandan et al., 2021).
secret in an RGB image. In this technique, embedding is done through
replacing the noisy bit of the image with bits of the secret message. From Identified Research Gap
Human Visual System angle, the stego image looks a bit distorted thereby Some of the visited literatures achieved low image quality after hiding
drawing intruder’s attention. The PSNR value achieved by this method is message, low Peak Signal to Noise Ratio value or low message holding
41.131 dB and the method capacity depends on the amount of noisy bits found capacity. This research has come to fill these gaps found in these previous
in the cover to be replaced with message. researches.
2
Available: https://doi.org/10.54117/ijps.v1i1.1 Research article
Practical of M-LSBR
The method converts the message characters into ASCII binary
representations. Table 1 indicates how a secret message ‘HELLO’ was
encoded and hidden in sixteen (16) pixels of a 24 bit bitmap image.
Experimentations
Experiments were carried out using Matlab software and observation of the
image quality using Human Visual System (HVS) were the tools used in the
experimentations. The factors considered in assessing the effectiveness and
efficiency of the proposed method during the experiments were:
1. Image Quality
2. Peak Signal to Noise Ratio (PSNR) value and
3. Message Capacity
Peak Signal to Noise Ratio (PSNR): is a visual quality estimator for stego
images. It is used to measure the perceptible quality of the modified
Steganography image in decibels (dB). A high value for PSNR indicates
higher quality of an image.
Mean Square Error (MSE): is an estimate for error between the original cover
image and the output stego (reconstructed) images.
3
Available: https://doi.org/10.54117/ijps.v1i1.1 Research article
The 3rd experimental result of the proposed method is compared with the
Emam, Ali and Omara (2016) method discussed in the literature review
section. The proposed method shows no difference in appearance of both
original and after hiding image as shown in figure 11. The method is
capable of holding 51 bytes message size and achieved 54.8254 dB PSNR
value, hence it is more effective.
Figure 6: Cover image and stego image (Champakamala, Padmini &
Radhika, 2009).
Figure 10: Cover image and stego image (Emam Ali & Omara, 2016).
When the 2nd experiment was done with the proposed method, the image (a) Before hiding (b) After Hiding
hides a message of 53 bytes and there is no difference in the appearance Figure 11: Experiment 3 (Proposed Method).
of both the cover image and the stego image as shown in figure 9 and the
PSNR achieved was 53.0805 dB.
The Secret Message Matching (SMM) method by Ali and Saad (2019)
achieved 40.1132 dB PSNR and is limited to hide only 20 bytes long
message with relatively higher image quality that one may not notice any
difference between the original and stego image as shown in figure 12.
The result of the 4th experiment carried out by the method proposed by
this research is compared with the Ali and Saad (2019) method which
yielded almost the same outcome when it comes to image quality as
shown in figure 13. However, the message capacity of the Modified Least
Bit Replacement method of this research is higher than that of Ali and
Saad (2019) method.
Figure 8: Cover image and stego image (Korothan, Kishor & Butey,
2016)
Figure 12: Cover image and stego image (Ali & Saad, 2019).
The random pixel replacement method by Emam, Ali and Omara (2016)
hides bits of secret message in blue and green components of the cover (a) Before hiding (b) After Hiding
image pixels. The method achieved high PSNR of 40.434 dB however; Figure 13: Experiment 4 (Proposed Method).
4
Available: https://doi.org/10.54117/ijps.v1i1.1 Research article
The results of the proposed and LSB hiding methods were discussed and
analyzed based on the Peak Signal to noise ratio metric. It is concluded
that the proposed method is more efficient, simple, appropriate and
accurate than the reviewed methods because it embed uniformly, no over
exploitation of one particular component neglecting the other. Thus, each
component gives equal contribution of intensity when hiding data; hence
the change in the image resolution is quite low and this makes the secret
message more secure.
Thank you for publishing with us.