Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 55 - Number 2
Year of Publication: 2012
Parisa Gerami
Subariah Ebrahim
Morteza Bashardoost

Parisa Gerami, Subariah Ebrahim and Morteza Bashardoost. Article: Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment. International Journal of Computer Applications 55(2):20-25, October 2012. Full text available. BibTeX

	author = {Parisa Gerami and Subariah Ebrahim and Morteza Bashardoost},
	title = {Article: Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {55},
	number = {2},
	pages = {20-25},
	month = {October},
	note = {Full text available}


Data hiding is a method of concealing secret data into a cover media and preventing a spectator from being aware of the existence of the hidden message. According to the problems of steganography, the main effort is to provide a better imperceptibility of stego-image that can be done by decreasing distortion of image. One of the popular techniques in data hiding is steganography in which the simple method for image hiding is the Least Significant Bit (LSB) substitution method. Wu et al. proposed two image hiding techniques to improve the quality of the stego-image [1]. The first one is to find the best block matching matrix and the other one is to find the optimal substitution matrices. The proposed method utilizes particle Swarm optimization (PSO) for finding the best pixel locations, and then the secret image is transformed to a new secret image. Optimal Pixel Adjustment (OPA) method is applied to further increase the quality of image. Results are then compared with those obtained by Simple LSB, Wang's et al. method, Wu's et al. method. The experimental results confirmed that PSNR of the proposed method is higher than mentioned methods which mean the imperceptibility of the image improves. Also the results illustrate that the proposed approach is robust against chi-square attack.


  • Wu, M. -N. , M. -H. Lin, and C. -C. Chang, A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms Content Computing, 2004, Springer Berlin / Heidelberg. p. 219-229.
  • Mathkour, H. , B. Al-Sadoon, and A. Touir A New Image Steganography Technique, in IEEE. 2008. p. 1-4.
  • Chandramouli, R. , M. Kharrazi, and N. Memon, Image Steganography and Steganalysis: Concepts and Practice Digital Watermarking, T. Kalker, I. Cox, and Y. Ro, Editors. 2004, Springer Berlin / Heidelberg. p. 204-211.
  • Wang, R. -Z. , C. -F. Lin, and J. -C. Lin, Image hiding by optimalLSBsubstitution and genetic algorithm. Pattern Recognition, 2001: p. 671- 683.
  • Zanganeh, O. and S. Ibrahim, Adaptive Image Steganography Based on Optimal Embedding and Robust Against Chi-square Attack. Information Technology Journal, 2011. 10: p. 1285-1294.
  • Walia, E. , P. Jain, and N. Navdeep, An Analysis of LSB & DCT based Steganography. Global Journal of Computer Science and Technology, 2010. 10: p. 4-8.
  • Chan, Y. -K. , Y. -A. Ho, and Y. -P. Chu, Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process, in IEEE. 2008. p. 320-325.
  • Bajaj, R. , P. Bedi, and S. Pal, Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization Swarm, Evolutionary, and Memetic Computing,. 2010, Springer Berlin / Heidelberg. p. 230-237.
  • Westfeld , A. and A. Pfitzmann, Attacks on Steganographic Systems - Breaking the Steganographic Utilities EzStego in Citeseer. 2000. p. 1-4.
  • Stanley, C. A. , Pairs of Values and the Chi-squared Attack, in CiteSteer. 2005. p. 1-45.