This system uses three stages to hide the secret letter. The first stage uses the summation of two images and applies a 2D wavelet packet at level one (L1), level two (L2), and level three (L3). In the second stage, Haar filters are applied at L1, L2, and L3, and the third stage conceals the binary secret letter using AS CII to convert each symbol in the secret letter to a binary number to hide it in the 2D image wavelet packet. It can hide each bit in one location using the least significant bit (LSB). The secret key is used to select the location, which depends on the equation 2n2 + 1 to find the position of the hidden bits of the secret letter in the 2D wavelet packet. The outcome of the algorithm is efficient, robust, transparent, and highly secure. The system hides the secret letter well in the stego image without being sensed by attackers.

1.
A.
Girdhar
and
A.
Kaur
,
Secret Image Sharing Schema with Steganography and Architecture Based on Discrete Wavelet Transform
,
International Conference on Innovations in Engineering and Technology (ICIET2013
) Dec. 25-26,
2013
, pp.
58
61
.
2.
E.H.
Houssein
,
M.A.S.
Ali
, and
A.E.
Hassanien
,
An Image Steganography Algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System
,
Proceedings of the Federated Conference on Computer Science and Information Systems
,
ACSIS
, Vol.
8
,
2016
, pp.
641
644
. DOI: .
3.
J.A.
Mazumder
and
K.
Hemachandran
,
Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method
,
International Journal of Computer Sciences and Engineering
, Vol.
2
, No.
7
, Published July
2014
, pp.
90
100
.
4.
U.
Manikpuri
,
Image Decomposition Through Wavelet Decomposition
,
International Journal of Innovative Research in Computer and Communication Engineering
, Vol.
2
, No.
9
. September
2014
, pp.
5693
5700
.
5.
J.
Sethi
,
S.
Mishra
,
P.P.
Dash
,
S.K.
Mishra
, and
S.
Meher
,
Image Compression Using Wavelet Packet Tree
,
ACEEE International Journal on Signal and Image Processing
, Vol.
2
, No.
1
, Jan
2011
.
6.
M.
Varsha
,
M.
Rashmi
, and
S.S.
Sannakki
,
2D Image Compression Using Wavelet Compression Technique by Analysis
,
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA
),
Elsevier Publications
2013
, pp.
652
655
.
7.
R., and
M. Tauheed
Khan
,
Data Hiding in Digital Image Processing Using Steganography: A Review
,
International Journal of Engineering Development and Research (IJEDR)
, Vol.
2
, No.
3
,
2014
, pp.
2994
2996
.
8.
M. A.
Khodher
,
Hiding Secret Messages in Raster Images for Transmission to Satellites Using a 2D Wavelet Packet
,
Iraqi Journal of Science
,
2018
, Vol.
59
, No.
2B
, pp.
922
933
. DOI:
9.
Z.K.
AL-Ani
,
A.A.
Zaidan
,
B.B.
Zaidan
, and
H.O.
Alanazi
,
Overview: Main Fundamentals for Steganography
,
Journal of Computing
, Vol.
2
, No.
3
, March
2010
, pp.
159
165
.
10.
H.A.
Jalab
,
A.A.
Zaidan
, and
B.B.
Zaidan
,
New Design for Information Hiding with in Steganography Using Distortion Techniques
,
IACSIT International Journal of Engineering and Technology
, Vol.
2
, No.
1
, February
2010
, pp.
75
77
.
11.
T.
Bhattacharya
,
N.
Dey
, and
S.R.B.
Chaudhuri
,
A Session Based Multiple Image Hiding Technique Using DWT and DCT
,
International Journal of Computer Applications
, Vol.
38
, No.
5
, January
2012
, pp.
0975
8887
.
12.
P.
Arora
and
A.
Agarwal
,
A Steganographic Method Based on Integer Wavelet Transform & Genetic Algorithm
,
International Journal of Engineering Research and Applications
, Vol.
4
, No.
5
, May
2014
, pp.
34
40
.
This content is only available via PDF.