Designing a Network-Based Data Security System Using Crypto-Steganography: An Institutional Based Research (IBR)


Authors : Emenike Gabriel Chukwu; Achi Ikenna Kalu; Ugochukwu Kelechi Onwuasoanya; Umoren Jonah Imeh; Akpan Godwin Abasiama

Volume/Issue : Volume 11 - 2026, Issue 2 - February


Google Scholar : https://tinyurl.com/5ct5kup5

Scribd : https://tinyurl.com/uubpsbnk

DOI : https://doi.org/10.38124/ijisrt/26feb204

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Because security issues have gotten worse due to the quick expansion of network-based applications, especially with regard to the integrity and confidentiality of sensitive data sent over unprotected communication channels. Current security strategies that use steganography or cryptography alone are still susceptible to traffic monitoring, steganalysis, and cryptanalysis assaults. In order to improve secure data transmission in network contexts, this study suggests a hybrid data security framework that combines the Least Significant Bit (LSB) picture steganography approach with the Rivest–ShamirAdleman (RSA) public-key cryptography algorithm. In order to provide strong confidentiality, the suggested model first encrypts plaintext data using RSA key-pair generation and asymmetric encryption. The resulting ciphertext is then embedded into digital cover images using LSB-based steganographic embedding without causing noticeable distortion or substantial payload overhead. The Python programming Language were used in the PyCharm Integrated Development Environment to design and implement the system. The combined crypto-steganographic strategy improves resistance to brute-force assaults, steganalysis, and illegal access while preserving picture quality and transmission efficiency, according to experimental evaluation. The results show that the suggested framework outperforms stand-alone steganographic or cryptographic approaches in terms of security performance. A reliable and scalable data security system appropriate for safeguarding private data in contemporary network-based applications is contributed by this study.

Keywords : Data Security, Crypto-Steganography, Network-Based Application, Information Hiding, Encryption, and Steganography.

References :

  1.  Almomani, I., Alkhayer, A., El-Shafai, W., (2022), a Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices, Sensors, 22(6), 2281; https://doi.org/10.3390/s22062281, s22062281
  2. Arora, R. and Parashar, A., (2023). Secure User Data in Cloud Computing Using Encryption Algorithms. International Journal of Engineering Research and Applications (IJERA), Vol.  3, 1922-1926.
  3. Channalli, S. and Jadhav, A. (2019). Steganography an Art of Hiding Data. International Journal on Computer Science and Engineering, IJCSE, vol. 1, no. 3.
  4. Chen L, et al. (2020), multilevel support vector regression analysis to identify condition-specific regulatory networks. Bioinformatics, 26(11):1416-22
  5. Choudhary, U., and Parul, A., (2024), Image Steganography Combined with Cryptography for Covert Communication, Jaypee Institute of Information Technology jornal, C3 2024, August 08–10, 2024, Noida, India.
  6. Ezeofor, C.  J. and Ulasi, A.  G (2024). Analysis of Network Data Encryption and Decryption Techniques in Communication Systems.  International Journal of Innovative Research in Science, Engineering and Technology, Vol. 3.
  7. Fridrich, J. (2019). Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press. https://doi.org/10.1017/CBO9781139192903
  8. F. Ifeanyi, (2025), IoT Threat Detection using Federated Learning and Edge AI with Random Forest Optimization, Nature Journal of Emerging Sciences, Technologies and Innovations (NATURERUST), Vol. 3 No. 2, (2025). https://naturerust.com/index.php/njesti/article/view/10
  9. H. Motameni, M. Norouzi, M. Jahandar, and A. Hatami (2019), Labeling Method in Steganography, Proceedings of World Academy 0f Science, Engineering and Technology, Volume 24 October 2007 ISSN 1307-6884
  10. Hussain, M. and Hussain, M. (2021). Embedding data in edge boundaries with high PSNR. Proceedings of 7th International Conference on Emerging Technologies (ICET 2011), pp.1-6.
  11. Huang, J.,Luo, W. and Huang, F., (2020). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, Vol. 2, pp. 201–214.
  12. Helmy, M. (2023), Audio Transmission Based on Hybrid rypto‑steganography Framework for Efficient Cyber Security in Wireless Communication System, Multimedia Tools and Applications (2025) 84:18893–18917 https://doi.org/10.1007/s11042-023-17921-2
  13. H. V. Patil and V. P. Sonaje 2023, “Crypto‑Stego: A hybrid method for encrypting text messages using AES and LSB algorithms,” Int. J. Intell. Syst. Appl. Eng., 2024. [Online]. Available: https://ijisae.org/index.php/IJISAE/article/view/7468
  14. J. Onyilo, (2025), Explainable AI Intrusion Detection System, Nature Journal of Emerging Sciences, Technologies and Innovations (NATURERUST), Vol. 1 No. 1 (2025). DOI: https://doi.org/10.65752/e5fa2b27
  15. Jung, K. H. and Yoo, K. Y. (2019). Image data hiding method based on multi-pixel differencing and LSB substitution methods. Proc. 2008 International Conference on Convergence and Hybrid Information Technology (ICHIT '08), pp. 355-358.
  16. Johnson, N. F., Duric, Z., & Fridrich, J. (2021). Information Hiding: Steganography and Watermarking Attacks and Countermeasures. Kluwer Academic Publishers.
  17. Kallapu, B., Janardhan, A.N., Hejamadi, R.M., Shrinivas, K.R.N., Saritha; Ramesh, R.K., Gabralla, L.A. (2025), Multi-Layered Security Framework Combining Steganography and DNA Coding. Systems 2025, 13, 341. https://doi.org/10.3390/systems13050341
  18. Kumar, B. and Dr.Murti, K. (2021). Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology. Journal on Computer Science and Engineering (IJCSE), Vol. 3.
  19. Obaida, M. and Awad, R., (2023). A New Approach for Complex Encrypting and Decrypting Data. International Journal of Computer Networks and Communications (IJCNC), Vol. 5.
  20. Patel, A., & Gupta, S. (2019). "Efficient Techniques for Digital Data Hiding and Secure Communication." International Journal of Computer Applications, 180(47), 25–31.
  21. Rahul, P., Shinge, R. and Vineet, S., (2023). An Encryption and Decryption Algorithm Based on ASCII Value of Data. International Journal of Computer Science and Information Technologies, Vol. 5.
  22. Reddy, S., Sowjanya, Ch., Praveena, P.and Prof.Shalini L (2022). Poly-alphabetic Symmetric Key Algorithm Using Randomized Prime Numbers. International Journal of Scientific and Research Publications, Vol. 2.
  23. R. Saheb (2024), “A new hybrid approach for image security using steganography and encryption,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., 2024. [Online]. Available: https://ijsrcseit.com/index.php/home/article/view/175
  24. Serdar S. and Umut A. (2018), LSB Substitution and PVD performance analysis for image steganography, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, Vol.-6, Issue-10, and Oct 2018. DOI: 10.26438/ijcse/v6i10.14
  25. Sharma, K. G., & Kumar, R. (2018). "Crypto-Steganography: A Fusion Approach for Secure Communication." In Proceedings of the IEEE International Conference on Information Security (pp. 135–142).
  26. Suguna, T., Padma, C., Rani, M. J., and Priya, G. (2018). Hybrid Cryptography and Steganography-Based Security System for IoT Networks. International Journal on Recent and Innovation Trends in Computing and Communication, 11(8s), 415–421. https://doi.org/10.17762/ijritcc.v11i8s.7221
  27. S. Singh, N. K. Sekhon, A. Singh, and S. Gupta (2024), “StegaCrypt: Integrating hybrid cryptography and image steganography,” Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET), 2024. [Online]. Available: https://www.ijraset.com/research-paper/stegacrypt-integrating-hybrid-cryptography-and image-steganography
  28. T. Suguna, C. Padma, M. J. Rani, and G. Priya (2023), “Hybrid cryptography and steganography‑based security system for IoT networks,” Int. J. Recent Innov. Trends Comput. Commun. (IJRITCC), 2023. [Online]. Available: https://ijritcc.org/index.php/ijritcc/article/view/7221
  29. Wen-Hsiang T. and Da-Chun W. (2023), A steganographic method for images by pixel-value differencing, Science Direct AI Journal, Volume 24, Issues 9–10, June 2003, Pages 1613-1626, https://doi.org/10.1016/S0167-8655(02)00402-6
  30. Wid, A. A., Ali, S. A., Alaa, K. H. (2022), Hybrid information security system via combination of compression, cryptography, and image steganography, International Journal of Electrical and Computer Engineering (IJECE), Vol. 12, No. 6, December 2022, pp. 6574~6584, ISSN: 2088-8708, DOI: 10.11591/ijece. v12i6.pp6574-6584
  31. Yang, C. H., and Hath, K. J. (2019). Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security, vol. 3, no. 5, pp. 488-497.
  32. Yang, H.  X. and Sun, G. (2019). A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution. Journal: Radio engineering, vol. 18, no. 4, pp. 509-516. 

Because security issues have gotten worse due to the quick expansion of network-based applications, especially with regard to the integrity and confidentiality of sensitive data sent over unprotected communication channels. Current security strategies that use steganography or cryptography alone are still susceptible to traffic monitoring, steganalysis, and cryptanalysis assaults. In order to improve secure data transmission in network contexts, this study suggests a hybrid data security framework that combines the Least Significant Bit (LSB) picture steganography approach with the Rivest–ShamirAdleman (RSA) public-key cryptography algorithm. In order to provide strong confidentiality, the suggested model first encrypts plaintext data using RSA key-pair generation and asymmetric encryption. The resulting ciphertext is then embedded into digital cover images using LSB-based steganographic embedding without causing noticeable distortion or substantial payload overhead. The Python programming Language were used in the PyCharm Integrated Development Environment to design and implement the system. The combined crypto-steganographic strategy improves resistance to brute-force assaults, steganalysis, and illegal access while preserving picture quality and transmission efficiency, according to experimental evaluation. The results show that the suggested framework outperforms stand-alone steganographic or cryptographic approaches in terms of security performance. A reliable and scalable data security system appropriate for safeguarding private data in contemporary network-based applications is contributed by this study.

Keywords : Data Security, Crypto-Steganography, Network-Based Application, Information Hiding, Encryption, and Steganography.

Paper Submission Last Date
28 - February - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe