Optimizing Data Security with Hybrid Scheme Based on LSB and DWT
Main Article Content
Abstract
One of the most popular techniques in image steganography is the Least Significant Bit (LSB) operation, which involves inserting secret data into the cover image's pixels' least significant bit. However, the amount of secret data that can be concealed in the cover image depends on the number of bits used for embedding. In this paper, a novel hybrid steganographic system based on Discrete Wavelet Transform (DWT) and Least Significant Bit (LSB) for image steganography is proposed. The proposed scheme aims to optimize data security by utilizing LSB and DWT techniques to embed secret data into an image robustly and efficiently. The present paper focuses on evaluating the algorithm performance by comparing the encrypted image quality using metrics such as PSNR, RMSE, and SSIM. The experimental results showed that the suggested method outperforms the existing LSB-based in terms of security performance. These results indicated that the proposed method consistently outperforms the conventional LSB-based method across all bit depths tested, with an overall improvement of 14.12% in PSNR, 41.87% in RMSE, and 4.02% in SSIM over the traditional LSB. The proposed method enhanced the PSNR values, reduced the RMSE values, and increased the SSIM values for all bit depths tested, indicating higher image fidelity, less distortion, and better preservation of structural similarity of the original image.
Metrics
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
THIS IS AN OPEN ACCESS ARTICLE UNDER THE CC BY LICENSE http://creativecommons.org/licenses/by/4.0/
Plaudit
References
Gulati S, Bashir A, Mir AH. Comparative Study of LSB and DWT Based Steganography Combined with Arnold Transformation for Image Security. Journal of Information System Security 2022;18(1):63-80.
Kadhim IJ, Premaratne P, Vial PJ, Halloran B. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. Neurocomputing 2019; 335 :299-326. DOI: https://doi.org/10.1016/j.neucom.2018.06.075
Douglas M, Bailey K, Leeney M, Curran K. An Overview of Steganography Techniques Applied to the Protection of Biometric Data. Multimedia Tools and Applications 2018; 77(13):17333-17373. DOI: https://doi.org/10.1007/s11042-017-5308-3
Rajendran S, Doraipandian M. Chaotic Map Based Random Image Steganography Using LSB Technique. International Journal of Network Security 2017;19(4):593-598.
Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H. Image Steganography in Spatial Domain: A Survey. Signal Processing: Image Communication 2018; 65:46-66. DOI: https://doi.org/10.1016/j.image.2018.03.012
Hameed AS. High Capacity Audio Steganography Based on Contourlet Transform. Tikrit Journal of Engineering Sciences 2018;25(1):1-7. DOI: https://doi.org/10.25130/tjes.25.1.01
Kini NG, Kini VG, Gautam. A Secured Steganography Algorithm for Hiding an Image in an Image. Integrated Intelligent Computing, Communication and Security 2019; 771 :539-546. DOI: https://doi.org/10.1007/978-981-10-8797-4_54
Gutub A, Al-Shaarani F. Efficient Implementation of Multi-Image Secret Hiding Based on LSB and DWT Steganography Comparisons. Arabian Journal for Science and Engineering 2020;45(4):2631-2644. DOI: https://doi.org/10.1007/s13369-020-04413-w
Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A. Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination. Journal of Information Security and Cybercrimes Research 2019;2(1):73-82. DOI: https://doi.org/10.26735/16587790.2019.001
Astuti YP, Rachmawanto EH, Sari CA. Simple and Secure Image Steganography Using LSB and Triple XOR Operation on MSB. 2018 International Conference on Information and Communications Technology (ICOIACT): IEEE; 2018. pp. 191-195. DOI: https://doi.org/10.1109/ICOIACT.2018.8350661
Islam MR, Tanni T, Parvin S, Sultana M, Siddiqa A. A Modified LSB Image Steganography Method Using Filtering Algorithm and Stream of Password. Information Security Journal: A Global Perspective 2021; 30(6):359-370. DOI: https://doi.org/10.1080/19393555.2020.1854902
Salih AM, Mahmood AF. Design and Implementation of Gray Scale JPEG CODEC on Spartan-3E. Tikrit Journal of Engineering Sciences 2017;24(3):18-25. DOI: https://doi.org/10.25130/tjes.24.2017.27
Pujiono IP, Rachmawanto EH, Nugroho DA. The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images. Journal of Applied Intelligent System 2023;8(1):69-80. DOI: https://doi.org/10.33633/jais.v8i1.7324
Joseph H, Rajan BK. Image Security Enhancement Using DCT & DWT Watermarking Technique. 2020 International Conference on Communication and Signal Processing (ICCSP): IEEE; 2020. pp. 0940-0945. DOI: https://doi.org/10.1109/ICCSP48568.2020.9182052
Taha NA, Qasim Z, Al-Saffar A, Abdullatif AA. Steganography Using Dual Tree Complex Wavelet Transform with LSB Indicator Technique. Periodicals of Engineering and Natural Sciences 2021;9(2):1106-1114. DOI: https://doi.org/10.21533/pen.v9i2.2060
Wang J, Cheng M, Wu P, Chen B. A Survey on Digital Image Steganography. Journal of Information Hiding and Privacy Protection 2019; 1(2):87-93. DOI: https://doi.org/10.32604/jihpp.2019.07189
Singh A, Singh H. An Improved LSB Based Image Steganography Technique for RGB Images. 2015 IEEE International Conference on electrical, computer and communication technologies (ICECCT): IEEE; 2015. pp. 1-4. DOI: https://doi.org/10.1109/ICECCT.2015.7226122
Al-Shaarani F, Gutub A. Securing Matrix Counting-Based Secret-Sharing Involving Crypto Steganography. Journal of King Saud University-Computer and Information Sciences 2022;34(9):6909-6924. DOI: https://doi.org/10.1016/j.jksuci.2021.09.009
Mistry D, Banerjee A. Discrete Wavelet Transform Using Matlab. International Journal of Computer Engineering & Technology (IJCET) 2013;4(2):252-259.
Fadhil AF. Formulation of Detection Strategies in Images: Southern Illinois University at Carbondale; 2014.
Hashim MM, Rahim MSM, Johi FA, Taha MS, Hamad HS. Performance Evaluation Measurement of Image Steganography Techniques with Analysis of LSB Based on Variation Image Formats. International Journal of Engineering & Technology 2018; 7(4) :3505-3514.
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing 2004;13(4):600-612. DOI: https://doi.org/10.1109/TIP.2003.819861
Hodson TO. Root-Mean-Square Error (RMSE) or Mean Absolute Error (MAE): When to Use Them or Not. Geoscientific Model Development 2022; 15(14):5481-5487. DOI: https://doi.org/10.5194/gmd-15-5481-2022
Dalal M, Juneja M. Evaluation of Orthogonal and Biorthogonal Wavelets for Video Steganography. Information Security Journal: A Global Perspective 2020;29(1):40-50. DOI: https://doi.org/10.1080/19393555.2020.1714822
Bakurov I, Buzzelli M, Schettini R, Castelli M, Vanneschi L. Structural Similarity Index (SSIM) Revisited: A Data-Driven Approach. Expert Systems with Applications 2022; 189:116087. DOI: https://doi.org/10.1016/j.eswa.2021.116087