Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering, Engineering, Electrical & Electronic


eISSN: 1178-5608



VOLUME 6 , ISSUE 5 (December 2013) > List of articles


Jasril * / Ismail Marzuki * / Faisal Rahmat *

Keywords : Capacity Steganography Enhancement, Image and Audio Steganography, LSB Method, Least Significant Bit, Steganography.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 6, Issue 5, Pages 1,970-1,985, DOI:

License : (CC BY-NC-ND 4.0)

Received Date : 10-July-2013 / Accepted: 01-November-2013 / Published Online: 16-December-2013



Basically, a steganography indicates two of the principal requirements such the messages and the carrier file. Besides, it should have three aspects: capacity, imperceptibility, and robustness. This paper will show how to enhance the capacity of two types of carrier files for embedding message. By using Least Significant Bit method and modifying the four last bits of carrier files, bitmap and wav files could show the increasing of message size to be inserted to the carrier than only modifying the last 1 bit of carrier files. Particularly bitmap file which still had good quality visual showed PSNR value in 31.5460 dB, but wav file was only 3.8929 dB.

Content not available PDF Share



[1] Prasad. M. Sitaram, Naganjaneyulu. S, Krishna. CH. Gopi, Nagaraju. C. “A Novel
Information Hiding Technique for Security by Using Image Steganography,” Journal of
Theoretical and Applied Information Technology (JATIT), vol. 8, no. 6, pp. 35-39, 2005 -
[2] YANG. Hengfu, SUN. Xingming, SUN. Guang. “A High-Capacity Image Data Hiding
Scheme Using Adaptive LSB Substitution,” Radioengineering, vol. 18, no. 4, pp. 509-516,
December 2009.
[3] Bender. W, Gruhl. D, Morimoto. N, Aiguo. LU. “Techniques for data hiding,” IBM
Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.
[4] Jasril, Marzuki. Ismail, Rahmat. Faisal. “Modification Four Bits of Uncompressed
Steganography Using Least Significant Bit (LSB) Method”. International Conference of
Advance Computer and Information Systems (ICACSIS), pp. 287-292, Universitas
Indonesia, Depok (Indonesia), 2013.
[5] YIP. Shu-Kei, AU. Oscar. C, WONG. Hoi-Ming, HO. Chi Wang. “Block-Based Lossless
Data Hiding in Delta Domain,” Multimedia and Expo, IEEE International Conference,
Toronto, Ontario (Canada), pp. 857-860, 2006.
[6] YANG. Ching-Yu. “Based Upon RBTC and LSB Substitution to Hide Data,” In Proc. First
International Conference on Innovative Computing, Information and Control (ICICIC’06),
Beijing (China), vol. 1, pp. 476-479, 2006.
[7] CHANG. Chin-Chen, LIN. Chia-Chen, TSENG. Chun-Sen, TAI. Wei-Liang. “Reversible Hiding in DCT-Based Compressed Images,” Information Sciences, vol. 177, no. 13, pp. 2768-2786, 2007.
[8] YANG. You, YU. Ping, XU. Jiangfeng. “An Improved LSB Algorithm Based on Multi-Transformation,” In Proc. International Symposium on Information Science and Engineering (ISISE’08). Shanghai (China), vol. 1, pp. 487-49, Dec. 20-22, 2008.
[9] Singh. Pradeep Kumar, Aggrawal. R.K. “Enhancement of LSB Based Steganography for Hiding Image in Audio,” International Journal on Computer Science and Engineering (IJCSE), vol. 02, no.05, pp. 1652-1658, 2010.
[10] THIEN. C. C, LIN. J. C. “A Simple and High-Hiding Capacity Method For Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, December 2003.
[11] CHANG. Chin-Chen, LIN. Min-Hui, HU. Yu-Chen. “A Fast and Secure Image Hiding Scheme Based on LSB Substitution,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, pp. 399-416, 2002.
[12] Sathisha. N, et al “Embedding Information in DCT Coefficients Based on Average Covariance”. International Journal of Engineering Science and Technology (IJEST), vol. 3 no. 4, pp. 3184-3194, April 2011.
[13] Hussain. Hanizan Shanker, et al. “A Novel Hybrid Fuzzy SVM Image Steganographic Model,” International Symposium in Information Technology, vol. 1, pp. 1-6, June 2010.
[14] Jasril, Marzuki. Ismail. “Application Design to Embed Text and File to Uncompressed File with Least Significant Bit”. Journal of Computer Science, vol. 8 no. 2 pp. 137-151, Univeristas Pelita Harapan, Tangerang, (Indonesia), 2012.
[15] Habes. Alkhraisat. “Information Hiding in BMP Image Implementation, Analysis and Evaluation,” Saint Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, Saint Petersburg, Russia, vol. 6, no. 1, pp. 1-10, February 2006.
[16] Saroha. Kriti, Singh. Pradeep Kumar. “A Variant of LSB Steganography for Hiding Images in Audio,” International Journal of Computer Applications, vol. 11, no.6, pp. 12-16, December 2010.
[17] Narayana. Sujay, Prasad. Gaurav. “Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions,” Signal & Image Processing: An International Journal (SIPIJ), vol.1, no.2, pp. 60-73, December 2010.
[18] Singh. Saurabh, Agarwal. Gaurav. “Hiding image to video: A new approach of LSB replacement,” International Journal of Engineering Science and Technology, vol. 2, no. 12, pp. 6999-7003, December 2010.
[19] Rahul. Rishi, Sudhir. Batra, Rajkumar. “Mode and Multiple Technique: A New Image Steganography Method for Capacity Enhancement of Message in Image,” International Journal of Computer Applications, vol. 13, no. 4, pp. 10-16, January 2011.
[20] Abu-Marie. Walaa, Gutub. Adnan, and Abu-Mansour. Hussein. “Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator”. International Journal of Signal and Image Processing, vol. 1, no. 3, pp. 196-204, 2010.
[21] Eric. Cole. “Hiding in Plain Sight: Steganography and the Art of Covert Communication,” Published by Wiley Publishing, Inc., Indianapolis, Indiana, Published simultaneously in Canada. 2003.