Image Steganography Using the Least Significant Bit (LSB) Method and the Linear Congruential Generator (LCG)

  • Andre Hernandes Universitas Indo Global Mandiri Palembang
  • Hartini Hartini AMIK Sigma Palembang
  • Dewi Sartika Universitas Indo Global Mandiri
Keywords: LCG, LSB, PSNR, Steganography


Steganography is a method used to hide secret messages from people who are not entitled to know it. In this study the author uses one of the steganography methods, the least significant bit method (LSB) to insert bits of secret message in the form of text into digital images RGB bitmap file extension, by combining the LSB method and linear congruential generator (LCG) to generate random numbers from the position of the pixel that will be inserted a secret message. The results of this study the authors managed to build steganography applications with the Java programming language and test the quality of stego image that produces an average value Peak Signal to Noise Ratio (PSNR) that reach 51 dB. From this assessment, it was concluded that stego image produced in good quality and did not experience significant changes.


[1] S. Sembiring. 2013, “Perancangan Aplikasi Steganografi untuk Menyisipkan Pesan Teks pada Gambar Dengan Metode End of File,” Pelita Informatik, Budi Darma, Vol. IV.

[2] R. Munir. 2006, Pengolahan Citra Digital, Informatika, Bandung.

[3] H. Nando Winata and R. Nasrul Fuad, 2017. “Konses Penyandian File JPEG Menggunakan Metode LSB,” Jurnal Nasional Informatika dan Teknologi. Jaringan, Vol. 1, No. 2.

[4] E. R. Djuwitaningrum and M. Apriyani, 2016. “Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit dan Algoritma Linear Congruential Generator (Text Message Steganography Using Least Significant Bit Method and Linear Congruential Generator Algorithm ),” Vol. IV, No. November, pp. 79–85.

[5] Rosa A.S dan M.Shalahuddin, 2015. Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek, Informatika, Bandung.

[6] S. . Park and K. . Miller, 1988. “Random Number Generators: Goods One Are Hard To Find, Communication of The ACM,” Vol. 31, No. 10, pp. 1192–1201.
[7] A. Cheddad, J. Condell, K. Curran, and P. M. Kevvit, 2010. “Digital Image Steganography Survey and Analysis of Current Methods,” Vol. 90.

[8] D. Sartika, “Pengembangan Perangkat Lunak Penyembunyian Pesan Terenkripsi Menggunakan Algoritma Mars pada Citra Digital Dengan Metode Adaptif,” Jurnal Ilmiah Informatika Global, vol. 7, No. 1, pp. 1–6, 2016.