You are here: Home Contents V18 N1 V18N1_Gulati.html
Personal tools

Comparative Study of LSB and DWT based Steganography combined with Arnold Transformation for Image Security



Full text

Journal of Information Systems Security
Volume 18, Number 1 (2022)
Pages 6380
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Shruti Gulati — Kali Charan Nigam Institute of Technology, India
Adil Bashir — Islamic University of Science and Technology, Kashmir, India
Ajaz Hussain Mir — National Institute of Technology Srinagar, India
Information Institute Publishing, Washington DC, USA




The transfer of images over the internet has led to a security concern where confidential images need to be protected from unauthorized access. In the growing technological era, almost everyone shares his/her personal information including images over the internet with other users or to a database repository which attract hackers to take undue advantage from this information. Security offered to images like blue print of organization projects, confidential images to the Army or of organization’s interest using image processing techniques has proven to be beneficial. In this paper, two steganographic methods i.e. LSB and DWT are combined with Arnold Transformation. The results of Arnold transformed LSB and DWT images are analyzed and compared on the basis of image quality parameters. It has been found that Arnold-DWT take 11.10% and 11.81% more encryption and decryption time respectively than Arnold-LSB. Our focus is to scramble the image information to a level where it becomes difficult for an intruder to obtain actual transferred images.




Image Steganography, Arnold Transformation, LSB Technique, DWT Technique.




Abdul-Majeed, A. O. (2014). "Chaotic Scheme for Image Encryption Based on Arnold Cat's Map." International Journal of Computer Science and Information Security 12, no. 3 (2014): 26.

Ahmad, S. S. (2016). "Steganography for inserting message on digital image using least significant bit and AES cryptographic algorithm." In Cyber and IT Service Management,International Conference on, pp. 16. IEEE, 2016.

Anderson, R. J. and Petitcolas F. AP. (1998). "On the limits of steganography." IEEE Journal on selected areas in communications 16, no. 4 (1998): 474-481.

Banik, B. G. and Bandyopadhyay S. K. (2015). "Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography." In Computational Intelligence and Communication Networks (CICN), 2015 International Conference on, pp. 1147-1152. IEEE, 2015.

Bhardwaj, R. and Divya K. (2015). "Enhanced the security of image steganography through image encryption." In 2015 Annual IEEE India Conference (INDICON), pp. 1-4. IEEE, 2015.

Devi, K. J. (2013). "A Secure Image Steganography Using LSB Technique and Random Pseudo Random Encoding Technique." PhD diss., 2013.

Devi, A. and Shiva, K. B. (2015). "Protection of confidential color image information based on Reversible Data Hiding technique (PCCIRT)." In 2015 International Conference on Computing and Network Communications (CoCoNet), pp. 742-747. IEEE, 2015.

Ding, M. and Jing, F. (2010). "Digital Image Encryption Algorithm Based on Improved Arnold Transform," 2010 International Forum on Information Technology and Applications, Kunming, 2010, pp. 174-176.

Divya, V. V., Sudha S. K., and Resmy V. R. (2012). "Simple and secure image encryption." International Journal of Computer Science 9, no. 6 (2012): 286.

Gaur, S. and Srivastava, V. K. (2017). "A hybrid RDWT-DCT and SVD based digital image watermarking scheme using Arnold transform," 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, 2017, pp. 399-404.

Houssein, E. H., Ali, Mona AS., and Hassanien A. E. (2016). "An image steganography algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System." In Computer Science and Information Systems (FedCSIS), 2016 Federated Conference on, pp. 641-644. IEEE, 2016.

Khalili, M. and Asatryan, D. (2013). "Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map," in IET Signal Processing, vol. 7, no. 3, pp. 177-187, May 2013.

Lin, K. T. (2013). "Image Encryption Using Arnold Transform Technique and Hartley Transform Domain," 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Beijing, 2013, pp. 84-87.

Mandal, P. C. (2014). "A Study of Steganography Technique using Discrete Wavelet Transform." Journal of Global Research in Computer Science 5, no. 5 (2014).

Nandur D. (2018). "Visually Meaningful Encrypted Images using Arnold Transform and Other Transforms," 2018 International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, Uttar Pradesh, India, 2018, pp. 322-326.

Nikishova, A., Umnitsyn, M., and Omelchenko T. (2019). "Quality Evaluation of Steganographic Embedding in Video Traffic", Industrial Engineering Applications and Manufacturing (ICIEAM) 2019 International Conference on, pp. 1-5, 2019.

Saini, J. K. and Verma H. K. (2013). "A hybrid approach for image security by combining encryption and steganography." In Image Information Processing (ICIIP), 2013 IEEE Second International Conference on, pp. 607-611. IEEE, 2013.

Sharma, V. K., Srivastava, D. K., Mathur P. (2018). "Efficient image steganography using graph signal processing", Image Processing IET, vol. 12, no. 6, pp. 1065-1071, 2018.

Xianzhen Jin, (2011). "A digital watermarking algorithm based on wavelet transform and Arnold." 2011 International Conference on Computer Science and Service System (CSSS), Nanjing, 2011, pp. 3806-3809.

Zhang, X., Peng. F., and Long M. (2018). "Robust Coverless Image Steganography Based on DCT and LDA Topic Classification," in IEEE Transactions on Multimedia, vol. 20, no. 12, pp. 3223-3238, Dec. 2018. doi: 10.1109/TMM.2018.2838334