Hybrid Method using 3-DES, DWT and LSB for Secure Image Steganography Algorithm Giovani Ardiansyah Faculty of Computer Science Dian Nuswantoro University Semarang, Indonesia gvn.ardiansyah@gmail.com Christy Atika Sari Faculty of Computer Science Dian Nuswantoro University Semarang, Indonesia atika.sari@dsn.dinus.ac.id De Rosal Ignatius Moses Setiadi Faculty of Computer Science Dian Nuswantoro University Semarang, Indonesia moses@dsn.dinus.ac.id Eko Hari Rachmawanto Faculty of Computer Science Dian Nuswantoro University Semarang, Indonesia eko.hari.rachmawanto@dsn.dinus.ac.id Abstract—Public networks such as the Internet are becoming more sophisticated, faster, and cheaper, so that more and more used for information exchange. This may increase the likelihood of confidential information from being stolen and exploited by unauthorized persons. This study proposed a combination of two Steganography domains coupled with Cryptography which aimed to make confidential information more secure and inaccessible to unauthorized persons. Messages are encrypted using the 3-DES method. On the other side of the cover image is decomposed into four subbands by using DWT. LH, HL, and HH subbands are chosen to embed encrypted message using LSB method. The last step, done Inverse DWT (IDWT) to get the stego image reconstruction. From the proposed method is then measured its quality with PSNR and MSE. As for message encryption results are measured using entropy. From the experiment results obtained PSNR results with a value of 55.30 dB for image messages size 64 * 64 and 49.23 dB for messages size 128 * 128. The extraction process can also be done perfectly with NC 1 and the average of Entropy of encrypted messages are 7.95754 for 64*64 and 7.98904 for 128*128. Keywords— Steganography; Cryptography; Encryption; DWT; LSB; 3-DES I. INTRODUCTION More than a million population in the world can be easily doing the information exchange. Easily accessing information, making it more vulnerable to information can be manipulated [1] [2]. To decrease it, need a special safeguard against the information exchange. The solution that can make message safer by is using Steganography and Cryptography methods [3]. Steganography is a branch of Data Hiding technique that aims to conceal the message into various covers data, such as, file, audio, video, or picture [4]. There are two kinds of Steganography by domain, namely Domain Frequency and Spatial Domain [5]. In Frequency Domain, used signal analysis on the cover. Discrete Wavelet Transform (DWT) is a technique that mostly used in Frequency Domain pattern [6]. In this research, the chosen method is DWT, because in DWT pixel coefficient values that spread becomes the reason for choosing DWT. In another side, Spatial Domain pattern is directly modifying the pixel coefficient values in the cover [7]. The most common technique that used in the Spatial Domain are Least Significant Bit (LSB) and Most Significant Bit (MSB) [8]. To achieve a good imperceptibility, proposed LSB as a message embedding method in the cover that has been implemented DWT because the differences of pixel coefficient values in the cover will only change slightly higher or lower than before. Besides that, the message security can be done by using Cryptography technique. Cryptography is a message encryption technique so that it can not be guessed or read [9]. There are two types of cryptography algorithms, which are, symmetry and asymmetry cryptography algorithms [10]. Symmetry Cryptography algorithm uses one key in encryption and decryption process [11]. Implementation of the 3-DES algorithm will be used before converting pixel value of the message to binary. After making the encrypted message will be followed by a phase of embedding. Therefore, the message will be difficult to be read. II. RELATED RESEARCH Refers to the research that has been done by Verma et al [12]. Used Steganography method with 2-level DWT and produced the best PSNR value from some experiments is 56.24 dB with the composition: the cover image size is 512*512 and the embedded message image size is 64*64. In other research that has been done by Setiadi et al [3]. Used the combination method between Steganography Discrete Cosine Transform (DCT) and Cryptography One Time Pad (OTP). The implementation of OTP is intended to the message to be more secure. In this research, produced the average of PSNR value from some experiments that have been done, which