Steganography with Digital Image Technique On Integer Wavelet Transform Cielab

Alhaziyah R M, Rizal U


Remarkable progress in the field of information technology and telecommunications led to the emergence of demand for secure communication environment and have privacy. Steganography is a method used to disguise the presence of confidential information, making it difficult to detect its presence by people who do not
have the authority for the information. Additionally, steganography can be applied to multimedia such as text, images, audio / video and protocols. Problems often arise in research on steganography, among others, the low capacity of concealment, less pharmaceutics stego-image, as well as the poor quality of stego-image is generated. This study aims to create a digital image steganography safe, sturdy, has a high masking capacity and has good imperceptibility, so the fidelity and recovery capabilities will be good anyway. The method proposed in this study manggabungkan Integer Wavelet Transform technique that aims to increase the capacity of concealment Furthermore this research is done on the CIELAB color space, where CIELAB can produce digital images with high compression range and a small color deviations on wavelet transform. In the watermarking technique in wavelet domain, CIELAB has the most excellent robustness compared with other color spaces. For security measures, used steganalyzer's ROC performance and PSNR of the quality of stego-image is generated


Steganography, Integer Wavelet Transform, CIELAB colorspace

Full Text:



Hamsah A. Ghaleb Al-Jbara, Laiha Binti Mat Kiah, Hamid A. Jalab, Increased Capacity of Image

Based Steganography Using Artificial Neural Network, Proc. International Conference on

Fundamental and Applied Sciences in 2012.

GJ Simmons. The Prisoner's Problem and the Subliminal Channel, Proc. From CRYPTO'83, pp.

-67, 1983.

Bin Li, Junhui He, Jiwu and Yun Qing Shi Huang, A Survey on Image Steganography and

steganalysis, Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2,

Farhan Khan Muhammad Rafat and Sher, Survey Report - State Of The Art In Digital

Steganography Focusing Ascii Text Documents, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 7, No. 2, 2010

Jessica Fridrich and Miroslav Goljan, Practical steganalysis of Digital Images - State of the Art,

Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, 2002

Emmy Poentarie, Communication Strategy Implementation In PLIKs Nanggulan 2, Journal of

Communication and Media Studies, Hal: 163-172, Vol. 17 No. 2, 2013

Adnan Mohsin Abdulazeez Brifcani and Wafaa Mustafa Abduallah Brifcani, Stego-Crypto-Based

Technique for HighSecurity Applications, International Journal of Computer Theory and

Engineering, Vol.2, No.6, 2010.

Sharma and D. Sharmas, Research on Analysis of Different Image Steganography Techniques,

International Journal of Engineering Sciences & Research Technology, 2014

Abdul Gabbar TA and Abdulmalek Abduljabbar A., Image Steganography Using Least Significant

Bits (LSBs): A Novel Algorithm, (IJCSIS) International Journal of Computer Science and

Information Security, Vol. 13, No. 1, 2015.

M. Wu, E. Tang, and B. Lin, hiding data in digital binary image, Proc. of 2000 IEEE

InternationalConference on Multimedia and Expo, vol. 1, pp. 393-396, 2000.

Liang, S. Wang, and X. Zhang, Steganography in binary image by checking the data-carrying

eligibility of boundary pixels, Journal of Shanghai University, vol. 11, no. 3, pp. 272-277,

Cayre and B. Macq, hiding data on 3-D triangle meshes, IEEE Trans. Signal Processing, vol. 51,

no. 4, pp. 939-949, 2003.

Jessica Fridrich, Miroslav Goljan, and Rui Du, Reliable detection of lsb andgrayscale steganography in color images. Proc. of 2001 ACM Workshop on Multimedia and security:

new challenges, pp.27-30, ACM Press, 2001.

W. Bender, D. Gruhl, Morimoto N., and A. Lu, Techniques for the data hiding, IBM Systems

Journal, vol. 35, no. 3, pp. 313-336, 1996.

Eiji Kawaguchi and Richard O. Eason, Principle and applications of BPCS steganography, In

Multimedia Systems and Applications, vol. 3528, pp. 464-473, SPIE, 1998.

Zacharias, A and Munir, R, Steganography digital image using Discrete Wavelet Transform

technique on the CIELAB color space, proceedings KNSI-ISSN: 1906-9613, 2015.

Jayasudha, S., Integer Wavelet Transform Based Method Steganographic using OPA algorithm,

the International Journal of Engineering and Science-ISSN: 2278-4721, Vol. 2, pp. 31-35,

Roy, R., Changder, S., Sarkar, A., Debnath, NC Evaluating image steganography techniques:

Future research challenges, IEEE Conference on Computing, Management and

Telecommunications, 309-314, 2013.

Harmsen, J. and Pearlman, W.: Statistical highorder of Palette Images, in Proc. SPIE Security

Watermarking of Multimedia Contents, 5020, 131-142., 2003.

Hemalatha, S., Acharya, UD, Renuka, A.: Comparison of Secure and High Capacity Color Image

Steganography Techniques in RGB YCbCr And Domains, International Journal of Advanced

Information Technology, 3, 1-9. 2013.

Khalili, M. and D. Asatryan: Color Spaces Effects on Improved Discrete Wavelet TransformBased


Image Watermarking using Arnold Transform Map, IET Signal Processing, 7,

- 187, 2013.

Mandal, JK and Das, D.: Color Image Steganography Based on Pixel Value differencing in

Spatial Domain, International Journal of Information Sciences and Technique, 2, 83 - 93,

Hamid, N., Yahya, A. Ahmad, RB, Alqershi, OM, Image Steganography Technique: an overview,

International Journal of Computer Science and Security (IJCSS), Vol. 6. Pp. 168-187, 2012.

János Schanda, COLORIMETRY - Chapter 9 of the book OSA / AIP Handbook of Applied

Photometry (ed .: Dr. Casimer DeCusatis IBM, Poughkeepsie, NY US


  • There are currently no refbacks.

International Conference on Engineering and Technology Development (ICETD)
Bandar Lampung University
ISSN: 2301-5690