International Journal of Mathematical Sciences and Computing(IJMSC)

ISSN: 2310-9025 (Print), ISSN: 2310-9033 (Online)

Published By: MECS Press

IJMSC Vol.7, No.3, Aug. 2021

A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload

Full Text (PDF, 626KB), PP.24-31

Views:3   Downloads:0


U. A. Md. Ehsan Ali, Emran Ali, Md. Sohrawordi, Md. Nahid Sultan

Index Terms

Steganography, LSB substitution, data hiding, embedded message, retrieved message, PRNG


Security in digital communication is becoming more important as the number of systems is connected to the internet day by day. It is necessary to protect secret message during transmission over insecure channels of the internet. Thus, data security becomes an important research issue. Steganography is a technique that embeds secret information into a carrier such as images, audio files, text files, and video files so that it cannot be observed.  In this paper, based on spatial domain, a new image steganography method is proposed to ensure the privacy of the digital data during transmission over the internet. In this method, least significant bit substitution is proposed where the information embedded in the random bit position of a random pixel location of the cover image using Pseudo Random Number Generator (PRNG). The proposed method used a 3-3-2 approach to hide a byte in a pixel of a 24 bit color image. The method uses Pseudo Random Number Generator (PRNG) in two different stages of embedding process. The first one is used to select random pixels and the second PRNG is used select random bit position into the R, G and B values of a pixel to embed one byte of information. Due to this randomization, the security of the system is expected to increase and the method achieves a very high maximum hiding capacity which signifies the importance of the proposed method.

Cite This Paper

U. A. Md. Ehsan Ali, Emran Ali, Md. Sohrawordi, Md. Nahid Sultan," A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload ", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.7, No.3, pp. 24-31, 2021. DOI: 10.5815/ijmsc.2021.03.03


[1]N. Chowdhury and P. Manna, “An Efficient Method of Steganography using Matrix Approach”, Copyright © 2012 MECS I.J. Intelligent Systems and Applications, vol. 1, pp. 32-38, 2012. ( DOI: 10.5815/ijisa.2012.01.04.

[2]M. R. Islam, A. Siddiqa, M. P. Uddin, A. K. Mandal and M. D. Hossain, “An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography”, 3rd IEEE International Conference on Informatics, Electronics & Vision, Dhaka, Bangladesh, May 23-24, 2014.

[3]M. H. Moon, A. K. M. T. I. Tanim, M. Z. Shoykot, M. N. Sultan, U. A. M. E. Ali and E. Ali, “Mapping Character Position Based Cryptographic algorithm with Numerical Conversions”, International Journal of Computer Science and Software Engineering (IJCSSE), vol. 9, issue 3, pp. 56-59, 2020.

[4]M. P. Uddin, M. Saha, S. J. Ferdousi,M. I. Afjal and M. A. Marjan, “Developing an Efficient Solution to Information Hiding through Text Steganography along with Cryptography”, 9th IEEE International Forum on Strategic Technology, CUET, Bangladesh, October 21-23, 2014.

[5]Phad Vitthal S., Bhosale Rajkumar S., Panhalkar Archana R., “A Novel Security Scheme for Secret Data using Cryptography and Steganography”, Copyright © 2012 MECS I.J. Computer Network and Information Security,  vol. 2, pp. 36-42, 2012. ( 

[6]P. Basak, L. Arjuman, A. M. Nitu, M. I. Afjal, M. P. Uddin, M. F. Rabbi, and M. R. Islam, “A Modified Blind Steganalysis Method Based on the Moments of Characteristic Function”, HBRP Advancement in Software Engineering and Testing, vol 1 issue 2, pp. 1-9, 2018. 

[7]S. Sultana, A. Khanam, M.R. Islam, A. M. Nitu, M. P. Uddin, M. I. Afjal, and M. F. Rabbi, “A Modified Filtering Approach of LSB Image Steganography Using Stream Builder along with AES Encryption”, HBRP Recent Trends in Information Technology and its Applications, vol 1 issue 2, pp. 1-10, 2018.

[8]Manish Mahajan, Dr. Navdeep Kaur, “Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques”, Copyright © 2012 MECS I.J. Computer Network and Information Security, vol. 10, pp. 76-92, 2012. ( DOI: 10.5815/ijcnis.2012.10.08.

[9]Shailender Gupta, Ankur Goyal, Bharat Bhushan, “Information Hiding Using Least Significant Bit Steganography and Cryptography”, Copyright © 2012 MECS I.J. Modern Education and Computer Science, 6, pp27-34, 2012. ( DOI: 10.5815/ijmecs.2012.06.04.

[10]S. M. M. Karim, M. S. Rahman and M. I. Hossain, “A New Approach for LSB Based Image Steganography using Secret Key”, Proceedings of 14th IEEE International Conference on Computer and Information Technology, pp. 286 – 291, 2011. 

[11]U. A. M. E. Ali, M. Sohrawordi and M. P. Uddin, “A Robust and Secured Image Steganography using LSB and Random Bit Substitution”, American Journal of Engineering Research (AJER), vol. 8, issue 2, pp. 39-44, 2019.

[12]G. R. Manjula and A. Danti, “A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography in Spatial Domain”, International Journal of Security, Privacy and Trust Management (IJSPTM),  vol. 4, issue 1, pp. 11-20, 2015.

[13]B. Zaidan, A. A. Zaidan, and F. Othman, “Quality of Image vs. Quantity of Data Hidden in the Image”, International Conference Image Processing, Computer Vision and Pattern Recognition, pp. 343-347, 2009.

[14]S. Alam, S. M. Zakariya and N. Akhtar, “Analysis of Modified Triple-A Steganography Technique using Fisher Yates Algorithm”, 14th International Conference on Hybrid Intelligent Systems, Kuwait, 2014.

[15]H. Sharma, S. Chauhan and K. Sharma, “Improved Spatial Domain Image Steganography using LSB & MSB”, International Journal of Innovative Research in Science, Engineering and Technology, vol. 4, issue 10, pp. 10001-10007, 2015.

[16]M. M. Emam, A. A. Aly and F. A. Omara, “An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection”, International Journal of Advanced Computer Science and Applications, vol. 7, issue 3, pp. 361-366, 2016.