This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. ech T Press Science Computers, Materials & Continua DOI: 10.32604/cmc.2022.023116 Article DWT-SVD Based Image Steganography Using Threshold Value Encryption Method Jyoti Khandelwal 1 , Vijay Kumar Sharma 1 , Dilbag Singh 2 , * and Atef Zaguia 3 1 School of Computing and Information Technology (SCIT), Manipal University Jaipur, Jaipur, 302004, India 2 School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju, 61005, Korea 3 Department of Computer Science, College of Computers and Information Technology Taif University,11099, Saudi Arabia *Corresponding Author: Dilbag Singh. Email: dggill2@gmail.com Received: 28 August 2021; Accepted: 16 November 2021 Abstract: Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system. This paper presents an image scrambling method that is very useful for grayscale secret images. In this method, the secret image decomposes in three parts based on the pixel’s threshold value. The division of the color image into three parts is very easy based on the color channel but in the grayscale image, it is difficult to implement. The proposed image scrambling method is implemented in image steganography using discrete wavelet transform (DWT), singular value decomposition (SVD), and sorting function. There is no visual difference between the stego image and the cover image. The extracted secret image is also similar to the original secret image. The proposed algorithm outcome is compared with the existed image steganography techniques. The comparative results show the strength of the proposed technique. Keywords: Image steganography; threshold value; sorting; discrete wave trans- formation; singular value decomposition; color band division; permutation 1 Introduction Nowadays, the internet’s coverage area encompasses the entire globe; the internet allows us to connect people from all over the world. The internet is used not only on Earth, but also in space, where it is mandatory. In this technical and digital environment, the security of information is a high- responsibility job. Information system security is the broad area that introduces the advantages and disadvantages of data digitalization. The challenges of information system security can be concluded in three terms: Confidentiality, Integrity, and Availability, some of which are called CIA [1,2]. The meaning of data confidentiality means not disclosed to unauthorized individuals, integrity means maintaining accuracy and completeness of the data and availability means information must be