Securing Medical Images Using Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) for Image Steganography
DOI:
https://doi.org/10.52436/1.jutif.2025.6.2.4426Keywords:
Data Hiding, Discrete Wavelet Transform, Image Steganography, Singular Value DecompositionAbstract
Steganography is a technique for embedding secret information into digital media, such as medical images, without significantly affecting their visual quality. The primary challenge in medical image steganography is preserving the quality of the cover image while ensuring robustness against distortions such as compression or data manipulation attacks, which may impact diagnostic accuracy. This study proposes an enhanced steganographic method based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) to improve the security and robustness of medical image embedding. DWT decomposes the medical image into four frequency sub-bands (LL, LH, HL, HH), while SVD is applied to embed the secret image while maintaining essential medical features. Experimental results show that the proposed method achieves a PSNR value of up to 78 dB and an SSIM value approaching 1, indicating that the stego image quality is nearly identical to the original cover image. Compared to previous DCT-SVD and IWT-SVD-based approaches, the DWT-SVD method offers superior robustness and imperceptibility, particularly in preserving image quality in complex-textured medical images. This method contributes to enhancing data security in telemedicine and AI-based medical imaging applications by ensuring that sensitive medical data remains protected while preserving image integrity for diagnostic use.
Downloads
References
[2] M. S. Abdalzaher, M. M. Fouda, and M. I. Ibrahem, “Data Privacy Preservation and Security in Smart Metering Systems,” Oct. 01, 2022, MDPI. doi: 10.3390/en15197419.
[3] E. R. Pramudya et al., “Optimation of image encryption using fractal Tromino and polynomial Chebyshev based on chaotic matrix,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 22, no. 6, p. 1529, Aug. 2024, doi: 10.12928/telkomnika.v22i6.26080.
[4] B. S. Reddy, I. A. Babu, and S. Bachu, “Implementation of Medical Image Watermarking using RDWT and SVD for Secure Medical Data Transmission in Healthcare Systems,” in 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), 2022, pp. 1–6. doi: 10.1109/ICEEICT53079.2022.9768429.
[5] S. T. Ahmed, D. A. Hammood, R. F. Chisab, A. Al-Naji, and J. Chahl, “Medical Image Encryption: A Comprehensive Review,” Aug. 01, 2023, Multidisciplinary Digital Publishing Institute (MDPI). doi: 10.3390/computers12080160.
[6] W. S. Admass, Y. Y. Munaye, and A. A. Diro, “Cyber security: State of the art, challenges and future directions,” Cyber Security and Applications, vol. 2, p. 100031, 2024, doi: 10.1016/j.csa.2023.100031.
[7] T. Alsuwian, A. Shahid Butt, and A. A. Amin, “Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review,” Nov. 01, 2022, MDPI. doi: 10.3390/su142114226.
[8] M. J. Altalqani and Z. J. Jaber, “Improving The Security Of Steganography In Video Using Genetic Algorithm,” 2021.
[9] B. Abd-El-Atty, M. A. El-Affendi, S. A. Chelloug, and A. A. A. El-Latif, “Double Medical Image Cryptosystem Based on Quantum Walk,” IEEE Access, vol. 11, pp. 69164–69176, 2023, doi: 10.1109/ACCESS.2023.3289932.
[10] A. Shafique, J. Ahmed, M. U. Rehman, and M. M. Hazzazi, “Noise-Resistant Image Encryption Scheme for Medical Images in the Chaos and Wavelet Domain,” IEEE Access, vol. 9, pp. 59108–59130, 2021, doi: 10.1109/ACCESS.2021.3071535.
[11] A. Alzahrani, “Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT-SVD,” Appl Bionics Biomech, vol. 2022, 2022, doi: 10.1155/2022/5271600.
[12] Mohammed Hassan Abd and Osamah Waleed Allawi, “Secured Mechanism Towards Integrity of Digital Images Using DWT, DCT, LSB and Watermarking Integrations,” Ibn AL-Haitham Journal For Pure and Applied Sciences, vol. 36, no. 2, pp. 454–468, Apr. 2023, doi: 10.30526/36.2.3088.
[13] N. S. Awarayi, O. Appiah, B. A. Weyori, and C. B. Ninfaakang, “A Digital Image Watermarking Using Dwt and L-shaped Tromino Fractal Encryption,” International Journal of Image, Graphics and Signal Processing, vol. 13, no. 3, pp. 33–43, Jun. 2021, doi: 10.5815/ijigsp.2021.03.03.
[14] A. O. Mohammed, H. I. Hussein, R. J. Mstafa, and A. M. Abdulazeez, “A blind and robust color image watermarking scheme based on DCT and DWT domains,” Multimed Tools Appl, vol. 82, no. 21, pp. 32855–32881, Sep. 2023, doi: 10.1007/s11042-023-14797-0.
[15] J. Khandelwal, V. K. Sharma, D. Singh, and A. Zaguia, “Dwt-svd based image steganography using threshold value encryption method,” Computers, Materials and Continua, vol. 72, no. 2, pp. 3299–3312, 2022, doi: 10.32604/cmc.2022.023116.
[16] X. Song, C. Yang, K. Han, and S. Ding, “Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain,” Multimed Tools Appl, vol. 81, no. 25, pp. 36453–36472, Oct. 2022, doi: 10.1007/s11042-022-13525-4.
[17] R. A. El-Shahed, M. N. Al-Berry, H. M. Ebeid, and H. A. Shedeed, “Multi-resolution Video Steganography Technique Based on Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD),” in International Conference on Innovative Computing and Communications, A. Khanna, D. Gupta, S. Bhattacharyya, A. E. Hassanien, S. Anand, and A. Jaiswal, Eds., Singapore: Springer Singapore, 2022, pp. 157–169. doi: 10.1007/978-981-16-3071-2_15.
[18] A. Durafe and V. Patidar, “Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 7, pp. 4483–4498, Jul. 2022, doi: 10.1016/j.jksuci.2020.10.008.
[19] A. Alzahrani, “Enhanced invisibility and robustness of digital image watermarking based on DWT-SVD,” Appl Bionics Biomech, vol. 2022, 2022.
[20] F. Yasmeen and M. S. Uddin, “An Efficient Watermarking Approach Based on LL and HH Edges of DWT–SVD,” SN Comput Sci, vol. 2, no. 2, pp. 1–16, Apr. 2021, doi: 10.1007/s42979-021-00478-y.
[21] E. E. D. Hemdan, “An efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images,” Multimed Tools Appl, vol. 80, no. 2, pp. 1749–1777, Jan. 2021, doi: 10.1007/s11042-020-09769-7.
[22] Y. Xue, K. Mu, Y. Wang, Y. Chen, P. Zhong, and J. Wen, “Robust Speech Steganography Using Differential SVD,” IEEE Access, vol. 7, pp. 153724–153733, 2019, doi: 10.1109/ACCESS.2019.2948946.
[23] E. A. Sofyan, C. A. Sari, H. Rachmawanto, and R. D. Cahyo, “High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD),” Advance Sustainable Science, Engineering and Technology (ASSET), vol. 6, no. 1, 2024, doi: 10.26877/asset.v6i1.17186.
[24] U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,” Journal of Computer and Communications, vol. 07, no. 03, pp. 8–18, 2019, doi: 10.4236/jcc.2019.73002.
[25] C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023, doi: 10.22266/ijies2023.0831.46.
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Elkaf Rahmawan Pramudya, L. Budi Handoko, Budi Harjo, Ramadhan Rakhmat Sani, Christy Atika Sari, Guruh Fajar Shidik, Pulung Nurtantio Andono, Md. Kamruzzaman Sarker

This work is licensed under a Creative Commons Attribution 4.0 International License.