Two-Layer Security of Images Using Elliptic Curve Cryptography with Discrete Wavelet Transform

Full Text (PDF, 1208KB), PP.31-47

Views: 0 Downloads: 0


Ganavi M. 1,* Prabhudeva S. 1

1. JNNCE/CSE, Shivamogga, 577204, Karnataka, India

* Corresponding author.


Received: 8 Aug. 2021 / Revised: 3 Nov. 2021 / Accepted: 17 Feb. 2022 / Published: 8 Apr. 2023

Index Terms

Elliptic Curve Cryptography, DWT, Encryption, Decryption, Hiding, Extracting


Information security is an important part of the current interactive world. It is very much essential for the end-user to preserve the confidentiality and integrity of their sensitive data. As such, information encoding is significant to defend against access from the non-authorized user. This paper is presented with an aim to build a system with a fusion of Cryptography and Steganography methods for scrambling the input image and embed into a carrier media by enhancing the security level. Elliptic Curve Cryptography (ECC) is helpful in achieving high security with a smaller key size. In this paper, ECC with modification is used to encrypt and decrypt the input image. Carrier media is transformed into frequency bands by utilizing Discrete Wavelet Transform (DWT). The encrypted hash of the input is hidden in high-frequency bands of carrier media by the process of Least-Significant-Bit (LSB). This approach is successful to achieve data confidentiality along with data integrity. Data integrity is verified by using SHA-256. Simulation outcomes of this method have been analyzed by measuring performance metrics. This method enhances the security of images obtained with 82.7528db of PSNR, 0.0012 of MSE, and SSIM as 1 compared to other existing scrambling methods.

Cite This Paper

Ganavi M., Prabhudeva S., "Two-Layer Security of Images Using Elliptic Curve Cryptography with Discrete Wavelet Transform", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.2, pp.31-47, 2023. DOI:10.5815/ijcnis.2023.02.03


[1]Mahboubeh Nazari, Iman Dorostkar Ahmadi, "A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity", Multimedia Tools and Applications, Vol.79, No.19, pp.13693-13724, 2019. DOI:
[2]Wellia Shinta Sari, Eko Hari Rachmawanto, De Rosal Ignatius Moses Setiadi, Christy Atika Sari, "A good performance OTP encryption image based on DCT-DWT steganography", TELKOMNIKA Telecommunication, Computing, Electronics and Control, Vol.15, No. 4, pp.1987-1995, 2017. DOI: 10.12928/TELKOMNIKA.v15i4.5883
[3]Ali Kadhim Bermani, "High Security Steganography Model Based on DWT, DCT and RSA", Journal of Engineering and Applied Science, Vol.12, Special Issue 10, pp.8875-8881, 2017. DOI: 10.3923/jeasci.2017.8875.8881
[4]Shivanand S Gornale, Nuthan A. C, "Discrete Wavelet Transform (DWT) Based Triple-Stegging with Elliptic Curve Cryptography (ECC)", In International conference on recent trends in Signal Processing, Image Processing and VLSI [ICrtSIV], 2015. DOI:
[5]Adnan Gutub, Faiza Al-Shaarani, "Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons", Arabian Journal for Science and Engineering, Vol.45, No.4, pp.2631-2644, 2020. DOI:
[6]Ayan Chatterjee, Nikhilesh Barik, "A New Data Hiding Scheme Using Laplace Transformation in Frequency Domain Steganography", International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), Vol.4, No.1, pp.1-12, 2020. DOI: 10.4018/IJHIoT.2020010101
[7]Edi Jaya Kusuma, Christy Atika Sari, Eko Hari Rachmawanto, De Rosal Ignatius Moses Setiadi, "A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography", Journal of ICT Research & Applications, Vol.12, No.2, 2018. DOI: 10.5614/itbj.ict.res.appl.2018.12.2.1
[8]Kalpana Sanjay Shete, Mangal Patil, J. S. Chitode,"Least Significant Bit and Discrete Wavelet Transform Algorithm Realization for Image Steganography Employing FPGA", International Journal of Image, Graphics and Signal Processing, Vol.8, No.6, pp.48-56, 2016.
[9]Said E. El-Khamy, Noha O. Korany & Marwa H. El-Sherif, "A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption", Multimedia Tools and Applications, Vol.76, No.22, pp.24091-24106, 2017. DOI 10.1007/s11042-016-4113-8
[10]Sangeeta Dhall, Rinku Sharma, Shailender Gupta, "A multi-level steganography mechanism using quantum chaos encryption", Multimedia Tools and Applications, Vol.79, No.3, pp.1987-2012, 2020. DOI:10.1007/s11042-019-08223-7
[11]Pratik Gupta, Manoj Kumar," A Verifiable Ring Signature Scheme of Anonymous Signcryption Using ECC ", International Journal of Mathematical Sciences and Computing, Vol.7, No.2, pp. 24-30, 2021.
[12]Marwa Saidi, Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith, "A new adaptive image steganography scheme based on DCT and chaotic map", Multimedia Tools and Applications, Vol.76, No.11, pp.13493-13510, 2017. DOI 10.1007/s11042-016-3722-6
[13]Enas Muzaffer Jamel, "Image Steganography Based on Wavelet Transform and Histogram Modification", Ibn AL-Haitham Journal for Pure and Applied Science, Vol.33, No.1, pp.173-186, 2020. DOI: 10.30526/33.1.2365
[14]Aref Miri, Karim Faez, "An image steganography method based on integer wavelet transform", Multimedia Tools and Applications, Vol.77, No.11, pp.13133-13144, 2018. DOI 10.1007/s11042-017-4935-z
[15]Mohammad Fakhredanesh, Mohammad Rahmati, Reza Safabakhsh, "Steganography in discrete wavelet transform based on human visual system and cover model", Multimedia Tools and Applications, Vol.78, No.13, pp.18475-18502, 2018. DOI:
[16]Andik Setyono, De Rosal Ignatius Moses Setiadi, "Imperceptible Improvement of Secure Image Steganography based on Wavelet Transform and OTP Encryption using PN Generator", Journal of Physics: Conference Series, Vol. 1196, 012031, 2019. DOI:10.1088/1742-6596/1196/1/012031
[17]V. Kalaichelvi, P. Meenakshi, P. Vimala Devi, H. Manikandan, P. Venkateswari, S. Swaminathan, "A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique", Journal of Ambient Intelligence and Humanized Computing, Vol.12, pp.7235–7243, 2020. DOI:
[18]Manal K. Oudah, Aqeela N. Abed b, Rula S. Khudhair c, Saad M. Kaleefah, "Improvement of Image Steganography Using Discrete Wavelet Transform", Engineering and Technology Journal, Vol.38, No. 1, pp.83-87, 2020. DOI:
[19]Ahmed Hambouz, Yousef Shaheen, Abdelrahman Manna, Dr. Mustafa Al-Fayoumi, Dr. Sara Tedmori, "Achieving data integrity and confidentiality using image steganography and hashing techniques", 2019 2nd International Conference on New Trends in Computing Sciences (ICTCS), pp.1-6, 2019. DOI: 10.1109/ICTCS.2019.8923060
[20]Harianto Antonio, P. W. C. Prasad, Abeer Alsadoon, "Implementation of cryptography in steganography for enhanced security", Multimedia Tools and Applications, Vol.78, No.23, pp.32721-32734, 2019. DOI:
[21]Vijay Kumar, Dinesh Kumar, "Performance evaluation of modified color image steganography using discrete wavelet transform", Journal of Intelligent Systems, Vol.28, No.5, pp.749-758, 2019. DOI:
[22]Srilekha Mukherjee, Goutam Sanyal, "A multi-level image steganography methodology based on adaptive PMS and block-based pixel swapping", Multimedia Tools and Applications, Vol.78, No.13, pp.17607-17622, 2019. DOI:
[23]Andik Setyono, De Rosal Ignatius Moses Setiadi, Muljono, "StegoCrypt method using wavelet transform and one-time pad for secret image delivery", 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), pp.203-207, 2017. DOI: 10.1109/ICITACEE.2017.8257703
[24]Tamer Rabie, Mohammed Baziyad, Ibrahim Kamel, "Enhanced high-capacity image steganography using discrete wavelet transform and the Laplacian pyramid", Multimedia Tools and Applications, Vol.77, No.18, pp.23673-23698, 2018. DOI:
[25]Inas Jawad Kadhim, Prashan Premaratne, Peter James Vial, "High-capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform", Cognitive Systems Research, Vol.60, pp.20-32, 2020. DOI:
[26]Hongzhu Dai, Jie Cheng, Yafeng Li, "A Novel Steganography Algorithm Based on Quantization Table Modification and Image Scrambling in DCT Domain", International Journal of Pattern Recognition and Artificial Intelligence, Vol.35, No.1, 2154001, 2021. DOI: 10.1142/S021800142154001X
[27]Zuhi Subedar, Ashwini Araballi. " Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication ", International Journal of Mathematical Sciences and Computing, Vol.6, No.4, pp.35-41, 2020.
[28]Osama Fouad Abdel Wahab, Ashraf A. M. Khalaf, Aziza I. Hussein, and Hesham F. A. Hamed, "Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques", IEEE Access, Vol.9, pp.31805-31815, 2021. DOI: 10.1109/ACCESS.2021.3060317
[29]R Shanthakumari, Malliga S, "Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm", Multimedia Tools and Applications, Vol.79, No.5, pp.3975-3991, 2020. DOI:
[30]Supriadi Rustad, De Rosal Ignatius Moses Setiadi, Abdul Syukur, Pulung Nurtantio Andono, "Inverted LSB image steganography using adaptive pattern to improve imperceptibility", Journal of King Saud University-Computer and Information Sciences (2021). Article in press. DOI: https://10.1016/j.jksuci.2020.12.017
[31]USC-SIPI Image Database Website.
[32]KODAK Image Dataset Website.