Optimasi Steganografi Video Berbasis LSB Multi-Bit dengan Penentuan Posisi dan Jumlah Bit Adaptif Berdasarkan Analisis Kecerahan dan Tekstur Frame
DOI:
https://doi.org/10.62951/modem.v4i1.725Keywords:
Adaptive Embedding, LSB, PSNR, Steganografi, VideoAbstract
Steganography is a method to hide confidential messages in digital media so that they are not detected by unauthorized parties. Unlike cryptography which protects the content of messages through encryption, steganography hides the message itself. One popular technique is the Least Significant Bit (LSB), which replaces the least important bit on the pixel with a secret message bit. However, conventional LSB methods such as 1-bit or 3-bit have limitations due to the compromise between insertion capacity and visual quality of the media. This study proposes an LSB-based video steganography method with an adaptive multi-bit embedding approach. This technique determines the number and position of bits that are dynamically inserted based on the local brightness and texture levels of each video frame, with Laplacian operators used to analyze both high and low textured areas. The process includes frame and audio extraction, frame-by-frame embedding, inserted video reconstruction, and decoding using video cover references. The evaluation was carried out quantitatively using the Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) metrics, as well as qualitatively through visual comparison. The results showed that the adaptive multi-bit method was able to maintain visual quality with a PSNR of 45.23 dB and SSIM of 0.9424, and increased the insertion capacity by up to 2–3 times compared to the 1-bit adaptive method. Thus, this approach effectively balances imperceptibility and insertion capacity on dynamic video steganography systems.
Downloads
References
Chandramouli, R., & Memon, N. D. (2001). Analysis of LSB-based image steganography techniques. In Proceedings of the IEEE International Conference on Image Processing (ICIP) (Vol. 3, pp. 1019–1022). IEEE. https://doi.org/10.1109/ICIP.2001.958299
Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752. https://doi.org/10.1016/j.sigpro.2009.08.010
Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. (2008). Digital watermarking and steganography (2nd ed.). Morgan Kaufmann.
Faraj, B. S., & Siddiq, A. (2024). A review on image steganography. Lecture Notes in Networks and Systems, 1004, 1–10. https://doi.org/10.1007/978-981-97-3305-7_1
Feregrino, C. (2014). Adaptive steganography based on textures (Doctoral dissertation). (Original work published 2007).
Fridrich, J. (2009). Steganography in digital media: Principles, algorithms, and applications. Cambridge University Press.
Johnson, N. F., Duric, Z., & Jajodia, S. (2001). Information hiding: Steganography and watermarking—Attacks and countermeasures. Information Security Technical Report, 6(3), 1–11. https://doi.org/10.1016/S1363-4127(01)00042-4
Katzenbeisser, S., & Petitcolas, F. A. P. (2000). Information hiding techniques for steganography and digital watermarking. Artech House.
Khuzaifi, A., Fauziah, F., & Fitri, I. (2022). Teknik steganography untuk menyisipkan pesan pada sebuah citra menggunakan metode least significant bit (LSB). JTIK (Jurnal Teknologi Informasi dan Komunikasi), 6(3), 417–423. https://doi.org/10.35870/jtik.v6i3.461
Kunhoth, J., Subramanian, N., Al-Maadeed, S., & Bouridane, A. (2023). Video steganography: Recent advances and challenges. Multimedia Tools and Applications, 82(27), 41943–41985. https://doi.org/10.1007/s11042-023-14844-w
Morkel, T., Eloff, J. H. P., & Olivier, M. S. (2005). An overview of image steganography. Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA), 1–11.
Rahman, S., Uddin, J., Hussain, H., Ahmed, A., Khan, A. A., Zakarya, M., Rahman, A., & Haleem, M. (2023). A Huffman code LSB-based image steganography technique using multi-level encryption and achromatic component of an image. Scientific Reports, 13(1), 1–19. https://doi.org/10.1038/s41598-023-41303-1
Singh, K., & Singh, K. (2017). Image steganography techniques: A survey. International Journal of Computer Science and Information Security, 15(4), 426–438.
Susanto, A., Sinaga, D., & Mulyono, I. U. W. (2024). PSNR and SSIM performance analysis of Schur decomposition for imperceptible steganography. Scientific Journal of Informatics, 11(3), 803–810. https://doi.org/10.15294/sji.v11i3.9561
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Modem : Jurnal Informatika dan Sains Teknologi.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


