A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography

Edi Jaya Kusuma, Christy Atika Sari, Eko Hari Rachmawanto, De Rosal Ignatius Moses Setiadi


Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold’s transformation (ACM) is used to encrypt an image by randomizing the image pixels. However, applying only a transformation algorithm is not secure enough to protect the image. In this study, ACM was combined with RSA, another encryption technique, which has an exponential process that uses large numbers. This can confuse attackers when they try to decrypt the cipher images. Furthermore, this paper also proposes combing ACM with RSA and subsequently embedding the result in a cover image with inverted two-bit LSB steganography, which replaces two bits in the bit plane of the cover image with message bits. This modified steganography technique can provide twice the capacity of the previous method. The experimental result was evaluated using PSNR and entropy as the parameters to obtain the quality of the stego images and the cipher images. The proposed method produced a highest PSNR of 57.8493 dB and entropy equal to 7.9948.


Arnold’s transformation; cryptography; inverted 2-bit LSB; RSA; steganography

Full Text:



Irfan, P., Prayudi, Y. & Riadi, I., Image Encryption Using Combination of Chaotic System and Rivers Shamir Adleman (RSA), Int. J. Comput. Appl., 123(6), pp. 11-16, 2015.

Osman, B., Yasin, A. & Omar, M.N., An Analysis of Alphabet-based Techniques in Text Steganography, J. Telecommun. Electron. Comput. Eng., 8(10), pp. 109-115, 2016.

El Deen, A.E.T., El-Badawy, E-S.A. & Gobran, S.N., Digital Image Encryption Based on RSA Algorithm, IOSR J. Electron. Commun. Eng., 9(1), pp. 69-73, 2014.

Stallings, W., Cryptography and Network Security: Principles and Practice, Sixth Edition, 6th ed. 2014.

Bhardwaj, R. & Sharma, V., Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution, Procedia Comput. Sci., 93, September, pp. 832-838, 2016.

Chandra, S., Paira, S., Alam, S.S. & Sanyal, G., A Comparative Survey of Symmetric and Asymmetric Key Cryptography, in 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), 2014, pp. 83-93, May 2015.

Wang, X-Y., Zhang, Y-Q. & Bao, X-M., A Colour Image Encryption Scheme Using Permutation-Substitution Based on Chaos, Entropy, 17(6), pp. 3877-3897, 2015.

Rehman, A.U., Liao, X., Kulsoom, A. & Abbas, S.A., Selective Encryption for Gray Images Based on Chaos and DNA Complementary Rules, Multimed. Tools Appl., 74(13), pp. 4655-4677, Jul. 2015.

Abbas, N.A., Image Encryption Based on Independent Component Analysis and Arnold’s Cat Map, Egypt. Informatics J., 17(1), pp. 139-146, 2016.

Hariyanto, E. & Rahim, R., Arnold’s Cat Map Algorithm in Digital Image Encryption, Int. J. Sci. Res., 5(10), pp. 1363-1365, 2016.

Saha, B.J., Pradhan, C., Kabi, K.K. & Bisoi, A.K., Robust Watermarking Technique Using Arnold’s Transformation and RSA in Discrete Wavelets, in International Conference on Information Systems and Computer Networks (ISCON), pp. 83-87, 2014.

Xu, L., Li, Z., Li, J. & Hua, W., A Novel Bit-Level Image Encryption Algorithm Based on Chaotic Maps, Opt. Lasers Eng, 78, pp. 17-25, 2016.

Irawan, C., Setiadi, D.R.I.M., Sari, C.A. & Rachmawanto, E.H., Hiding and securing message on edge areas of image using LSB steganography and OTP encryption, International Conference on Informatics and Computational Sciences, pp. 1-6, 2017.

Reddy, M.I.S. & Kumar, A.P.S., Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm, Procedia Comput. Sci, 85, Cms, pp. 62-69, 2016.

Charan, G.S., Nithin Kumar, S.S.V., Karthikeyan, B., Vaithiyanathan, V. & Divya Lakshmi, K., A Novel LSB Based Image Steganography With Multi-Level Encryption, in 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1-5, 2015

Bai, J., Chang, C.C., Nguyen, T.S., Zhu, C. & Liu, Y., A High Payload Steganographic Algorithm Based on Edge Detection, Displays, 46, pp. 42-51, 2017.

Kaur, N.I., A Hybrid Technique for Image Steganography Using LSB & Bi-orthogonal Wavelet Transform, International Journal of Computer Science and Information Security (IJCSIS), 14(9), pp. 5500, 2016.

Kusuma, E.J., Indriani, O.R., Sari, C.A., Rachmawanto, E.H. & Setiadi, D.R.I.M, An Imperceptible LSB image Hiding on Edge Region using DES Encryption, International Conference on Innovative and Creative Information Technology, pp. 1-6, 2017.

Akhtar, N., Khan, S. & Johri, P., An Improved Inverted LSB Image Steganography, Int. Conf. Issues Challenges Intelligent Comput. Tech., pp. 749-755, 2014.

Setiadi, D.R.I.M, Santoso, H.A., Rachmawanto, E.H. & Sari, C.A., An Improved Message Capacity and Security using Divide and Modulus Function in Spatial Domain Steganography, International Conference on Information and Communications Technology, pp. 186 - 190, 2018.

DOI: http://dx.doi.org/10.5614%2Fitbj.ict.res.appl.2018.12.2.1


  • There are currently no refbacks.

Contact Information:

ITB Journal Publisher, LPPM – ITB, 

Center for Research and Community Services (CRCS) Building Floor 7th, 
Jl. Ganesha No. 10 Bandung 40132, Indonesia,

Tel. +62-22-86010080,

Fax.: +62-22-86010051;

e-mail: jictra@lppm.itb.ac.id.