LSB Algorithm based on Support Vector Machine in Digital Image Steganography


  • Hanizan Shaker Hussain Kuliyah Teknologi dan Multimedia Kreatif, Kolej Univerisiti Insaniah, 09300, Kuala Ketil, Kedah, Malaysia
  • Roshidi Din School of Computing, UUM College of Arts and Sciences, Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia
  • Aida Musthapa Faculty of Computer Science and Information Technology, Universisti Tun Hussein Onn Malaysia, 86400 Parit Raja, Batu Pahat, Johor Malaysia
  • Fawwaz Zamir Mansor Faculty of Computer Science and Information Technology, Universisti Tun Hussein Onn Malaysia, 86400 Parit Raja, Batu Pahat, Johor Malaysia


Discrete Consine Transformation, Image Steganography, Support Vector Machine,


The importance of information security in protecting data and information has increased due to the increased use of computers and the Internet. It similar with the one of exciting subfields of information security called information hiding. Information hiding is a technology where the secret-messages are hidden inside other files (e.g image files). One of the areas that are popular now applying this technology is digital image steganography (image steganography). In this paper proposed StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance. This can be seen when PSNR record high value, where it displays a good quality cover-image.


T. Moerland. “Leiden Institute of Advanced Computing Science”,.Retrieved January 23, 2009, from Steganography and Steganalysis: 2009.

M. T. Siponen and H. Oinas-Kukkonen, “A Review of Information Security Issues and Respective Research Contributions”. Database for Advances in Information Systems , pp. 60-80. 2007

K. Rabah. “Steganography-The Art of Hiding Data”. Information Technology Journal , pp. 245-269. 2003.

S. Lau, “SANS Security Essentials GSEC”, Retrieved May 13, 2010, from An Analysis of Terrorist Groups’ Potential Use of Electronic Steganography. 2003

A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt. “ Review: Digital Image Steganography: Survey and Analysis of Current Methods”. Journal Signal Processing, pp. 727-752. 2010.

P. M. Santi, M. K. Undu. “Genetic Algorithms for Optimality of Data Hiding in Digital Images”. Bio-Inspired Information Hiding, pp.361-373. 2009.

M. A. Younes and A. Jantan. “ A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion”. International Journal of Computer Science and Network Security , pp. 247-254. 2008.

N. Jiang. “A Novel Analysis Method of Information Hiding”. International Congress on Image and Signal Processing, pp. 621-625. 2009.

L. Bin, H. Junhui, H. Jiwu, and Q. S. Yun. “ A Survey on Image Steganography and Steganalysis”. Journal of Information Hiding and Multimedia Signal Processing , pp. 142-172. 2011.

J. He, S. Tan, & T. Wu. “On the Security of Steganographic Techniques”. International Congress on Image and Signal Processing, pp. 716-719. 2008.

R. Din and A. Shamsudin.” Digital Steganalysis: Computational Intelligence Approach”. International Journal of Computers , pp. 161-16. 2009.

S. Trivedi and R. Chandramouli. “ Active Steganalysis of Sequential Steganography”. SPIE Conference, 2003 pp. 123-130.

C. Cachin. “ An Information-Theoretic Model for Steganography”. Information and Computation ,2004, pp. 41-56.

Y. K. Lee and L. H. Chen. “A Secure Robust Image Steganographic Model”. The Conference on Information Security, 2008, pp. 275-284. Hualien, Taiwan

T. Morkel, J. H. Eloff, J. and M.S. Olivier, M. “An Overview of Image Steganography”. Annual Information Security South Africa Conference. 2005.

Z. Duric, D. Richards, and Y. Kim. “Minimizing the Statistical Impact of LSB Steganography”. International Conference on Image Analysis and Recognition, 2005 pp. 1175–1183). Toronto: Springer

S. Ramly, S.A. Aljunid and H.S. Hussain. “SVM-SS Watermarking Model for Medical Images”.Digital Enterprise and Information Systems, 2011, pp. 372-386.

J. Fridrich. “Featured-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes”. International Workshop on Information Hiding, 2006, pp. 67-81.

R. W. Lucky, “Automatic equalization for digital communication,” Bell Syst. Tech. J., vol. 44, no. 4, pp. 547–588, Apr. 1965.

S. P. Bingulac, “On the compatibility of adaptive controllers (Published Conference Proceedings style),” in Proc. 4th Annu. Allerton Conf. Circuits and Systems Theory, New York, 1994, pp. 8–16.

A. Almohammad, R. M. Hierons, and G. Ghinea. “ High Capacity Steganographic Method Based Upon JPEG”. The Third International Conference on Availability, Reliability and Security , 2008, pp. 544-549.

M. A. Zaher. “Modified Least Significant Bit (MLSB)”. Computer and Information Science , 2011, pp.60-67.

E. Walia, P. Jain, and P. Navdeep. “ An Analysis of LSB and DCT Based Steganography”. Global Journal of Computer Science and Technology , 2010 pp.4-8.

L. Por, W. K Lai, Z. Alireza, T. F. Ang, M. Su, B. Delina. “StegCure: A Comprehensive Steganographic Tool using Enhanced LSB”. WSEAS Transactions of Computers Journal , 2008 pp. 1309-1318.

V. Kecman. Learning and Soft Computing. London: The MIT Press. 2001

L. Li, W.Y. Ding, and J.Y Li. “A Novel Robustness Image Watermarking Scheme Based on Fuzzy Support Vector Machine”. The 3rd IEEE International Conference on Computer Science and Information Technology, 2010, pp. 533 – 537.

F. Meng, H. Peng, Z. Pei, J. Wang, J.” A Novel Blind Image Watermarking Scheme Based on Support Vector Machine in DCT Domain”. International Conference on Computational Intelligence and Security, 2008, pp. 16 - 20.

H. H. Tsai, H.C. Tseng, Y.S. Lai.” Robust Lossless Image Watermarking Based on A-Trimmed Mean Algorithm and Support Vector Machine”. The Journal of Systems and Software, 2008 pp. 1015–1028.

H. Peng, J. Wang, W. Wang. “Image Watermarking Method in Multiwavelet Domain Based on Support Vector Machines”. The Journal of Systems and Software, 2010, pp. 1470–1477.

C. Schneider, W. Rasband, and K. Eliceiri. “ NIH Image to ImageJ: 25 years of image analysis. Nature Methods, 2012, pp. 671–675




How to Cite

Hussain, H. S., Din, R., Musthapa, A., & Mansor, F. Z. (2017). LSB Algorithm based on Support Vector Machine in Digital Image Steganography. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-12), 13–18. Retrieved from