Steganographic Techniques using Modified Least Significant Bit and Modification Reshape Transposition Methods

Guntoro Barovih(1); Fadhila Tangguh Admojo(2*); Yoda Hersaputra(3);

(1) STMIK PalComTech
(2) STMIK PalComTech
(3) STMIK PalComTech
(*) Corresponding Author



A message is a form of conveying information. Various ways are used to secure the information conveyed in the form of messages either in encrypted form or in the form of applying a password in the message. Messages can also be encrypted and embedded in other media such as images (steganography). This research aimed to insert a message into the form of an image by combining the Modified Least Significant Bit (MLSB) method in encrypting messages and reshape modification technique to determine at which position the message encryption will be embedded in the image. Tests were carried out to obtain the quality of the encryption process using the parameters of Fidelity, mean square error, peak signal to noise ratio, testing on file type, robustness, and comparison of message contents. The results of the tests showed that the files that can be used are files with the image file type in the lossless compression category, the rotation can be done is 90,180,270 without destroying the message in it, and changing the pixel in the image file will destroy the message inside.


Steganography; Modified Least Significant Bit; Reshape; Rewrapping; Encryption


Article Metrics

Abstract view: 31 times

Digital Object Identifier




S. Agrawal and M. Chase, “FAME: Fast Attribute-based Message Encryption,” CCS ’17 Proc. 2017 ACM SIGSAC Conf. Comput. Commun. Secur., pp. 665–682, 2017.

M. Bellare and S. Keelveedhi, “Message-Locked Encryption and Secure Deduplication,” Int. Conf. Theory Appl. Cryptogr. Tech. Adv. Cryptol. – EUROCRYPT 2013, vol. 32, pp. 296–312, 2013.

N. Döttling, S. Garg, M. Hajiabadi, and D. Masny, “New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes,” IACR Int. Work. Public Key Cryptogr., vol. 1, pp. 3–31, 2018.

W. . Luo, F. . Huang, and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” IEEE Trans. Inf. Forensics Secur., vol. 5, no. 2, pp. 201–214, 2010.

C. Irawan, D. R. I. M. ; Setiadi, C. A. ; Sari, and E. H. ; Rachmawanto, “Hiding and securing message on edge areas of image using LSB steganography and OTP encryption,” in 1st International Conference on Informatics and Computational Sciences (ICICoS), 2017, pp. 1–6.

S. M. M. Karim, M. S. . Rahman, and M. I. . Hossain, “A new approach for LSB based image steganography using secret key,” in 14th International Conference on Computer and Information Technology (ICCIT 2011), 2011, pp. 286–291.

N. . Voloshina, T. Minaeva, and S. Bezzateev, “MLSB optimal effective weighted container construction for WF5 embedding algorithm,” in 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2018, pp. 1–6.

N. Voloshina, S. Bezzateev, A. Prudanov, M. Vasilev, and A. Gorbunov, “Effectiveness of LSB and MLSB information embedding for BMP images,” in 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT), 2016, pp. 378–384.

W. Sipayung, “Perancangan Citra Watermaking Pada Citra Digital Menggunakan Metode Discrete Cosine Transform ( DCT ),” Pelita Inform. Budi Darma, vol. 7, no. 3, 2014.

M. Ricky, F. A. Setyaningsih, and M. Dipenogoro, “Analisis Kompresi Steganography Pada Citra Digital Dengan Menggunakan Metode Least Significant Bit Berbasis Mobile Android,” J. Coding, vol. 06, no. 03, 2018.

P. N. Andono, T. Sutojo, and Muljono, Pengolahan Citra Digital. Yogyakarta: ANDI (Anggota IKAPI), 2017.

S. N. Kishor, G. N. K. Ramaiah, and S. A. K. Jilani, “A review on steganography through multimedia,” in 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), 2016, pp. 1–6.

M. A. Zaher, “Modified Least Significant Bit (MLSB),” Comput. Inf. Sci., vol. 4, no. 1, 2011.

A. A. Lubis, N. P. Wong, I. Arfiandi, V. I. Damanik, and A. Maulana, “Steganografi pada Citra dengan Metode MLSB dan Enkripsi Triple Transposition Vigenere Cipher,” JSM STMIK Mikroskil, vol. 16, no. 2, 2015.

Mulyanto, R. V. Febriyana, and B. W. P. Arief, “Penyisipan Pesan Teks pada Citra Menggunakan Metode LSB dan 2-Wrap Length,” Semin. Nas. APTIKOM, 2019.

A. Supriyanto and E. Ardhianto, “Penyandian File Gambar dengan Metode Substitusi dan Transposisi,” J. Teknol. Inf., vol. 8, no. 2, 2008.

M. P. Singh and H. Singh, “An Efficient Modified LSB technique for Video Steganography,” Int. J. Adv. Res. Electr. Electron. Instrum. Eng., vol. 4, no. 6, pp. 5253–5259, 2015.

A. B. Nasution, S. Efendi, and S. Suwilo, “Image Steganography in Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB),” J. Phys. Conf. Ser., vol. 1007, no. 1, pp. 1–6, 2018.

P. Yadav and M. Dutta, “3-Level security based spread spectrum image steganography with enhanced peak signal to noise ratio,” in Fourth International Conference on Image Information Processing (ICIIP), 2017, pp. 1–5.

S. Esakkirajan, T. Veerakumar, A. N. Subramanyam, and C. H. PremChand, “Removal of High Density Salt and Pepper Noise Through Modified Decision Based Unsymmetric Trimmed Median Filter,” IEEE Signal Process. Lett., vol. 18, no. 5, pp. 287–290, 2011.

S. Gupta, J. Saxena, and S. Singh, “Design of Random Scan Algorithm in Video Steganography for Security Purposes,” IOSR J. Electron. Commun. Eng. Ver. I, vol. 10, no. 5, pp. 2278–2834, 2015.

E. Y. Hidayat and K. Hastuti, “Analisis Steganografi Metode Least Significant Bit (LSB) dengan Penyisipan Sekuensial dan Acak Secara Kuantitatif dan Visual,” Techno.COM, vol. 12, no. 3, 2013.

A. A. Abdulla, S. A. Jassim, and H. Sellahewa, “Secure Steganography Technique Based on Bitplane Indexes,” in IEEE International Symposium on Multimedia, Anaheim, 2013, pp. 287–291.

N. Farid, B. Nurhadiyono, and Y. Rahayu, “Implementasi Metode Steganografi Least Significant Bit Dengan Algoritma Hill Cipher Pada Citra Bitmap,” J. Techno.COM, vol. 15, no. 2, pp. 109–116, 2016.


  • There are currently no refbacks.

Copyright (c) 2021 Guntoro Barovih, Fadhila Tangguh Admojoa, Yoda Hersaputra

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 ILKOM Jurnal Ilmiah indexed by


ILKOM Jurnal Ilmiah
ISSN 2548-7779
Published by Teknik Informatika Fakultas Ilmu Komputer Universitas Muslim Indonesia
W :
E :

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0