Optimasi Keamanan Watermarking pada Daubechies Transform Berbasis Arnold Cat Map

Abdussalam Abdussalam, Eko Hari Rachmawanto, Noor Ageng Setiyanto, De Rosal Ignatius Moses Setiadi, Christy Atika Sari


Digital image security using Transform Domain algorithms such as Discrete Wavelet Transform (DWT) has been widely used. To improve the security of the DWT algorithm needs to randomize the pixel coefficient, namely Arnold Cat Map (ACM). Computing ACM as one of the chaos functions is known to be fast and fits with Transform Domain. DWT has been implemented in the Daubechies filter which is the development of the Haar filer. In this paper, we proposed the message insertion model using a combination of DWT and ACM on a 512x512 piskel grayscale image and a 64x64 pixel message on the LL subband. The experiments were performed on 2 different images to determine the ability produced by the combined algroithm. The ability test for message insertion process is done through Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and comparation between original image histogram and image insertion histogram. While in the process of message extraction, algorithmic capability test is done by calculating Normalized Cross Correlation (NCC) and its correlation. The highest MSE result is 2.9502 and the highest PSNR is 43.4323 dB, while the NCC value is 237.3584 with correlation 0.7181.

Full Text:


B. Wang, J. Ding, Q. Wen, X. Liao, and C. Liu, “An image watermarking algorithm based on DWT DCT and SVD,” in 2009 IEEE International Conference on Network Infrastructure and Digital Content, 2009, pp. 1034–1038.

W. S. Sari, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, “A Good Performance OTP Encryption Image based on DCT-DWT Steganography,” TELKOMNIKA, vol. 15, no. 4, pp. 1987–1995, 2017.

A. Susanto, S. D.R.I.M., C. A. Sari, and E. H. Rachmawanto, “Hybrid Method using HWT-DCT for Image Watermarking,” in 5th International Conference on Information Technology for Cyber and IT Service Management (CITSM 2017), 2017.

G. Ardiansyah, C. A. Sari, D. Setiadi, and E. H. Rachmawanto, “Hybrid Method using 3-DES , DWT and LSB for Secure Image Steganography Algorithm,” in 2017 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 2017, pp. 248–253.

T. Pan and D. Li, “A Novel Image Encryption Using Arnold Cat,” Int. J. Secur. Its Appl., vol. 7, no. 5, pp. 377–386, 2013.

N. Nagaraj and P. G. Vaidya, “One-Time Pad , Arithmetic Coding and Logic Gates : An Unifying Theme Using Dynamical Systems,” pp. 1–9, 2008.

R. D. Ardy, O. R. Indriani, C. A. Sari, D. R. Ignatius, and M. Setiadi, “Digital Image Signature using Triple Protection Cryptosystem (RSA, Vigenere, and MD5),” in International Conference on Smart Cities, Automation & Intelligent Computing Systems, 2017, pp. 1–6.

H. S. Meharwade, S. Veena, and A. R. Shankar, “Joint encryption / watermarking based on Arnold cat map and DCT,” Int. J. Softw. Hardw. Res. Eng., vol. 3, no. 3, pp. 1–5, 2015.

Z. T. Al-mokhtar, High Security Video Watermarking Scheme Based on 3-D DCT and 2-D DWT with Arnold Map Algorithm. .

D. V. N. K. Rao, Y. Madhuri, S. V. R. Kumar, and Y. V. S. Babu, “Robust Image Watermarking using DCT & Wavelet Packet Denoising,” Int. J. Sci. Eng. Res., vol. 3, no. 5, pp. 1–7, 2012.

D. Singh and S. K. Singh, “DWT-SVD and DCT based Robust and Blind Watermarking Scheme for Copyright Protection,” Multimed. Tools Appl., vol. 76, no. 11, pp. 13001–13024, 2017.

Rafael C. Gonzales, R. E. Woods, and Steven L. Eddins, Digital image proccesing using MATLAB, no. 2. 2014.

E. J. Kusuma, O. R. Indriani, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “An Imperceptible LSB Image Hiding on Edge Region Using DES Encryption,” in International Conference on Innovative and Creative Information Technology (ICITech), 2017, pp. 1–5.

N. Sharma, Prabhjot, and H. Kaur, “A Review of Information Security using Cryptography Technique.,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 323–326, 2017.

Y. Wu, S. Agaian, and J. P. Noonan, “A New Family of Generalized 3D Cat Maps,” arXiv:1205.3208, pp. 1–10, 2012.

A. Waghmare, A. Bhagat, A. Surve, and S. Kalgutkar, “Chaos Based Image Encryption and Decryption,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 5, no. 4, pp. 64–68, 2016.

C. Pradhan, V. Saxena, and A. K. Bisoi, “Imperceptible Watermarking Technique using Arnold’s Transform and Cross Chaos Map in DCT Domain,” Int. J. …, vol. 55, no. October 2012, pp. 50–53, 2012.

J. Chandra and R. S. Wahono, “Integrasi Discrete Wavelet Transform dan Singular Value Decomposition pada Watermark ing Citra untuk Perlindungan Hak Cipta,” J. Intell. Syst., vol. 1, no. 2, pp. 127–135, 2015.

P. Singh, S. Shivani, and S. Agarwal, “A chaotic map based DCT-SVD watermarking scheme for rightful ownership verification,” in 2014 Students Conference on Engineering and Systems, 2014, pp. 1–4.

DOI: http://dx.doi.org/10.30591/jpit.v4i1.911


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Terindeks oleh :












Program Studi D4 Teknik Informatika
Politeknik Harapan Bersama Tegal
Jl. Mataram No.09 Pesurungan Lor Kota Tegal

Telp. +62283 - 352000

Email :


Copyright: JPIT (Jurnal Informatika: Jurnal Pengembangan IT) p-ISSN: 2477-5126 (print), e-ISSN 2548-9356 (online) 

Flag Counter
View Visitor Statistic


Creative Commons License
JPIT (Jurnal Informatika: Jurnal Pengembangan IT) is licensed under a Creative Commons Attribution 4.0 International License.