• Suryadi Suryadi Suryadi Indonesia University



AbstractData is an asset for all parties. So that it must always be guarded or secured so that it is not misused by irresponsible parties. One of the methods used for data security is steganography. In this paper, efforts to secure data are discussed through the development of steganographic algorithms using the Haar integer wavelet transform (IWT-Haar) and least significant bit (LSB) techniques to hide secret messages in the form of digital text into digital images (cover images) to produce stego images. The results show that the extracting process is much faster than the embedding process. The PSNR values obtained ranged from 55-71,5 dB (far greater than 40 dB). This shows that the resulting stego image is of very good quality. In plain view, the difference between the cover image and the stego image has not changed significantly.Key words: digital image, embedding, extraction, Haar integer wavelet transform, steganography 

Author Biography

Suryadi Suryadi Suryadi, Indonesia University

Match Department, lecturer


Ashok, J, et al. (2010). Steganography: An Overview. International Journal of Engineering Science and Technology. Volume: 2, Issue: 10, Pages: 5985-5992.

Atawneh, S, et al. (2013). Steganography in Digital ImagesL Common Approaches and Tools. IETE Technical Review. Volume: 30, Issue: 4, Pages: 344- 358.

Atawneh, S.; Putra, S. (2015). An Overview of Frequency-based Digital Image Steganography. International Journal of Cryptology Research., Volime 5, Issue 2, page: 15-27.

Bassam J. Mohd, Thaier Hayajneh and Ahmad Nahar Quttoum, (2013). Wavelet-transform steganography: algorithm and hardware implementation., Int. J. Electronic Security and Digital Forensics, Vol. 5, Nos. ¾, page: 241-256.

Calderbank, A.R., et al. (1996). Wavelet Transforms That Map Integers to Integers. Applied and Computational Harmonic Analysis. Volume: 5, Issue: 3, Pages: 332-369.

Cheddad, A., et al (2010). Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing, Volume 90, Issue 3, page: 727-752.

Chen, P.Y., Lin H.J. (2006). A DWT based approach for image steganography. International Journal of Applied Science and Engineering. Volume: 4, Issue: 3, Pages: 275-290.

Chun-Lin, L. (2010). A Tutorial of the Wavelet Transform. Taiwan: Department of Electrical Engineering National Taiwan University.

Chanu, Y. J., et al. (2012). Image Steganography and Steganalysis: A Survey. International Journal of Computer Applications. Volume: 52, No. 2, Pages: 1-11.

Dinca, L. M.. (2011). Survey of the Use of Steganography over the Internet. Information Economica. Volume: 15, No. 2, Pages: 153-164.

Fateh, Mansoor., Rezvani, Mohsen., and Irani, Yasser., (2021). A New Method of Coding for Steganography Based on LSB Matching Revisited., Security and Communication Networks, Volume 2021, Article ID 6610678.

Jamel, Enas Muzaffer., (2020). Image Steganography Based on Wavelet Transform and Histogram Modification., Ibn Al Haitham Journal for Pure and Applied Science, Vol. 33, Issue: 1, page: 173-186.

Jayasudha, S. (2013). Integer Wavelet Transform Based Steganographic Method Using Opa Algorithm. International Journal of Engineering and Science. Volume: 2, Issue: 4, Pages: 31-35.

Kadam, K., Koshti, A., & Dunghav, P. (2012). Steganography Using Least Signicant Bit Algorithm. 2(3), 338–341.

Kamdar, P. Naitik, et al. (2013). Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE. Journal of Information, 52 Universitas Indonesia Knowledge and Research in Electronics and Communication Engineering. Volume: 02, Issue: 02, Pages: 505-509.

Kasana, G.; Singh, K.; Bhatia, S. (2017). Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform. KIPS, Journal of Information Processing Systems., 13, 5, 1331-1344.

Kumar, M.N., & Srividya, S. (2013). Genetic Algorithm based Color Image Steganography using Integer Wavelet Transform and Optimal Pixel Adjusment Process. International Journal of Innovative Technology and Exploring Engineering. Volume: 3, Issue: 5, Pages: 60-65.

Kumar, R. (2016). Audio Steganography using QR Decomposition and Fast Fourier Transform. December 2015.

Nehru, G., & Dhar, P. (2012). A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach. 9(1), 402–406.

Pidato Kenegaraan Presiden Republik Indonesia 16 Agustus 2019, Di Depan Sidang Bersama DPD RI dan DPR RI.,

Sakkara, S., et al. (2012). Integer Wavelet based Secret Data Hiding By Selecting Variable Bit Length. International Journal of Computer Applications. Volume: 48, No. 19, Pages: 7-11.

Singh, Arun Kumar., (2015). Steganography in Images Using LSB Technique., International Journal of Latest Trends in Engineering and Technology, Vol. 5, Issue: 1, page: 426-430.

Thiyagarajan, P. (2012). Stego-Image Generator (SIG) – Building Steganography Image Database. CDBRSE Lab Department of Computer Science, Pondicherry University.

Wiryawan, I Gede., Sariyasa., & Aris Gunadi, I Gede. (2019). Steganografi Berdasarkan Metode Least Significant Bit pada Citra Digital dengan Teknik Kompresi Lossless., Jurnal Ilmu Komputer Indonesia (JIKI), Vol : 4, No. 1, page: 34-40.