Ki-Hyun Jung



Performance Analysis of LSB-based Data Hiding Techniques

pdf PDF


In data hiding methods, least significant bits replacement has been used broadly by combining with other embedding techniques. In this study, performance and comparison of data hiding techniques based on least significant bits modification are analyzed. In experimental results, visual image quality of each pixel layer is tested to show the effect on the embedding layer in each pixel. The embedding capacity and histogram analysis are compared with previous works.


data hiding, steganography, least significant bit, information hiding, steganalysis


[1] Khan, A., Siddiqa, A., Munib, S., and Malik, S.A., A recent survey of reversible watermarking techniques, Information Sciences, Vol. 279, 2014, pp. 251-272.

[2] Subhedar, M.S., Mankar, V.H., Current status and key issues in image steganography: A survey, Computer Science Review, Vol.13, No.14, 2014, pp. 95-113.

[3] Jung, K.H., Yoo, K.Y. Steganographic method based on interpolation and LSB substitution of digital images, Multimedia Tools and Applications, Vol.74, No.6, 2015, pp. 2143-2155.

[4] Khodaei, M., Faez, K., New adaptive steganographic method using least-significant-bit substation and pixel-value differencing, IET Image Processing, Vol.6, No.5, 2012, pp. 677–686.

[5] Chang, C.C., Lin, M.H., Hu, Y.C., A fast and secure image hiding scheme based on LSB substitution. International Journal of Pattern Recognition, Vol.16, 2002, pp. 399–416.

[6] Sharp, T. An implementation of key-based digital signal steganography, Information Hiding Workshop, Vol.2137, 2001, pp. 13-26.

[7] Mielikainen, J., LSB matching revisited. IEEE Signal Processing Letters, Vol.13, 2006, pp. 285–287.

[8] Chan, C.K., Cheng, L.M., Hiding data in images by simple LSB substitution, Pattern Recognition, Vol.37, 2004, pp. 469–474.

[9] Ker, A., Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, Vol.12, 2005, pp. 441–444.

[10] Wang, R.Z., Lin, C.F., Lin, J.C., Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, Vol.34, 2001, pp. 671–683.

[11] Lin, C.C., An information hiding scheme with minimal image distortion, Computer Standards & Interfaces, Vol.33, 2011, pp. 477-484.

[12] Xu, W.L., Chang, C.C., Chen, T.S., and Wang, L.M., An improved least-significant-bit substitution method using the modulo three strategy, Displays, Vol.42, 2016, pp. 36-42.

[13] Wu, N.I., Hwang, M.S., A novel LSB data hiding scheme with the lowest distortion, The Imaging Science Journal, Vol.65, No.6, 2017, pp. 371-378.

[14] Joshi, K. Yadav, R. Chawla. G., An enhanced method for data hiding using 2-bit XOR in image steganography, International Journal of Engineering and Technology, Vol.8, No.6, 2017, pp. 3043-3055.

[15] The USC-SIPI Image Database, http://sipi.usc.edu/database/ (access on November 2017)

Cite this paper

Ki-Hyun Jung. (2017) Performance Analysis of LSB-based Data Hiding Techniques. International Journal of Signal Processing, 2, 129-132


Copyright © 2017 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0