Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Enhancing the Least Significant Bit (LSB) Algorithm for Steganography

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
O. Osunade, I. A. Ganiyu

O Osunade and I A Ganiyu. Enhancing the Least Significant Bit (LSB) Algorithm for Steganography. International Journal of Computer Applications 149(3):1-8, September 2016. BibTeX

	author = {O. Osunade and I. A. Ganiyu},
	title = {Enhancing the Least Significant Bit (LSB) Algorithm for Steganography},
	journal = {International Journal of Computer Applications},
	issue_date = {September 2016},
	volume = {149},
	number = {3},
	month = {Sep},
	year = {2016},
	issn = {0975-8887},
	pages = {1-8},
	numpages = {8},
	url = {},
	doi = {10.5120/ijca2016911363},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Various Steganography algorithms have been proposed and implemented for hiding the existence of data in a cover object starting from the algorithms that work in transform domain to the ones that work in spatial domain, such as Least Significant Bit (LSB), which uses the three colours (RED, GREEN and BLUE) present in an image. Three colours are present in the pixel of an image, therefore, this project proposed a new algorithm that chooses only the two colours (GREEN and BLUE) out of the three colours (RED, GREEN and BLUE) that made up of a pixel present in an image to hide data. This proposed algorithm successfully hides the data with the two colours (GREEN and BLUE) present in an image with no significant changes in the resulting colours of the image. The result of this experiment has shown the effectiveness of the proposed algorithm. This experimental result has shown that the algorithm strikes a balance between the security and the quality of the image. It should be noted that this research work only considers image as the cover object, other forms of cover object are not considered here. It should also be noted that the algorithm only hides data from 8 bytes to 1024 bytes using two different images of different size, which shows no effect on the effectiveness of the algorithm.


  1. Arvind K. and Kim P. (2010). “Steganography- A Data Hiding Technique” International Journal of Computer Applications ISSN 0975 – 8887, Volume 9– No.7, November 2010.
  2. Chen P. and Wu W. (2009). A modified side match scheme for image steganography, International Journal of Applied Science & Engineering 7 (2009) 53-60.
  3. Divya S.S and Ram M. (2012). Hiding text in audio using multiple lsb steganography and provide security using cryptography. International journal of scientific & technology research volume 1, issue 6, July 2012.
  4. El-Emam N. (2007) Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science 3 (2007) 223-232.
  5. Fridrich J, Du R and Meng L. (2000) “Steganalysis of LSB Encoding in Color Images,” Proc. IEEE Int’l Conf. Multimedia and Expo, CD-ROM, IEEE Press, Piscataway, N.J., 2000.
  6. Gandharba S. and Saroj K.L. (2012). A Technique for Secret Communication Using a New Block Cipherwith Dynamic Steganograph. International Journal of Security and Its Applications Vol. 6, No. 2, April, 2012
  7. Hecht, E. 2006. Optics. Delhi, India: Pearson Education.
  8. John M. and Manimurugan S. (2012).A Survey on Various Encryption Techniques. International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, 2(1), March 2012.
  9. Juan J. and Jesus M. (2009). SLSB: Improving the Steganographic Algorithm LSB. Universidad Nacional de Educación a Distancia (Spain).
  10. Lokeswara V., Subramanyam A. and Chenna P. (2011). Implementation of LSB Steganography and its Evaluation for Various File Formats. Int. Journal Advanced Networking and Application, 2(5), Pages: 868-872
  11. Lou D., Liu J. and Tso H. (2008)Evolution of information – hiding technology, in H. Nemati (Ed.), Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450.
  12. Mauro B., Franco B., Vito .C and Alessandro P. (1999). A DCT-domain system for robust image watermarking. Dipartimento di Ingegneria Elettronica, Universita di Firenze,via di S. Marta, 3, 50139 Firenze, Italy
  13. Morkel T., Eloff J. and Olivier M. (2005). An overview of image steganography.Information and Computer Security Architecture (ICSA) Research Group.Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa.
  14. Roque, Juan J., and Jesús M. M., (2009) "SLSB: Improving the Steganographic Algorithm LSB." WOSIS.
  15. Roziati I. and Teoh (2011). Steganography Algorithm to Hide Secret Message inside an Image. Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia (UTHM), Batu Pahat 86400, Johor, Malaysia
  16. Stefan K. and Fabien A. (2000) “Information HidingTechniques for Steganography and Digital Watermarking”. Boston,Artech House, pp. 43 – 82. 2000.
  17. Thomas A. (2005). Implementing Steganographic Algorithms: An Analysis and Comparison of Data Saturation
  18. Vijay k. and vishal S. (2005). A steganography algorithm for hiding image in image by improved lsb substitution by minimize detection .Journal of Theoretical and Applied Information Technology
  19. Wu P and Tsai W. (2003). A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003) 1613-1626.3.


Steganography, least significant bit, colour, data, algorithm