Authors :
Emenike Gabriel Chukwu; Achi Ikenna Kalu; Ugochukwu Kelechi Onwuasoanya; Umoren Jonah Imeh; Akpan Godwin Abasiama
Volume/Issue :
Volume 11 - 2026, Issue 2 - February
Google Scholar :
https://tinyurl.com/5ct5kup5
Scribd :
https://tinyurl.com/uubpsbnk
DOI :
https://doi.org/10.38124/ijisrt/26feb204
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Because security issues have gotten worse due to the quick expansion of network-based applications, especially with regard to the integrity and confidentiality of sensitive data sent over unprotected communication channels. Current security strategies that use steganography or cryptography alone are still susceptible to traffic monitoring, steganalysis, and cryptanalysis assaults. In order to improve secure data transmission in network contexts, this study suggests a hybrid data security framework that combines the Least Significant Bit (LSB) picture steganography approach with the Rivest–ShamirAdleman (RSA) public-key cryptography algorithm. In order to provide strong confidentiality, the suggested model first encrypts plaintext data using RSA key-pair generation and asymmetric encryption. The resulting ciphertext is then embedded into digital cover images using LSB-based steganographic embedding without causing noticeable distortion or substantial payload overhead. The Python programming Language were used in the PyCharm Integrated Development Environment to design and implement the system. The combined crypto-steganographic strategy improves resistance to brute-force assaults, steganalysis, and illegal access while preserving picture quality and transmission efficiency, according to experimental evaluation. The results show that the suggested framework outperforms stand-alone steganographic or cryptographic approaches in terms of security performance. A reliable and scalable data security system appropriate for safeguarding private data in contemporary network-based applications is contributed by this study.
Keywords :
Data Security, Crypto-Steganography, Network-Based Application, Information Hiding, Encryption, and Steganography.
References :
- Almomani, I., Alkhayer, A., El-Shafai, W., (2022), a Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices, Sensors, 22(6), 2281; https://doi.org/10.3390/s22062281, s22062281
- Arora, R. and Parashar, A., (2023). Secure User Data in Cloud Computing Using Encryption Algorithms. International Journal of Engineering Research and Applications (IJERA), Vol. 3, 1922-1926.
- Channalli, S. and Jadhav, A. (2019). Steganography an Art of Hiding Data. International Journal on Computer Science and Engineering, IJCSE, vol. 1, no. 3.
- Chen L, et al. (2020), multilevel support vector regression analysis to identify condition-specific regulatory networks. Bioinformatics, 26(11):1416-22
- Choudhary, U., and Parul, A., (2024), Image Steganography Combined with Cryptography for Covert Communication, Jaypee Institute of Information Technology jornal, C3 2024, August 08–10, 2024, Noida, India.
- Ezeofor, C. J. and Ulasi, A. G (2024). Analysis of Network Data Encryption and Decryption Techniques in Communication Systems. International Journal of Innovative Research in Science, Engineering and Technology, Vol. 3.
- Fridrich, J. (2019). Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press. https://doi.org/10.1017/CBO9781139192903
- F. Ifeanyi, (2025), IoT Threat Detection using Federated Learning and Edge AI with Random Forest Optimization, Nature Journal of Emerging Sciences, Technologies and Innovations (NATURERUST), Vol. 3 No. 2, (2025). https://naturerust.com/index.php/njesti/article/view/10
- H. Motameni, M. Norouzi, M. Jahandar, and A. Hatami (2019), Labeling Method in Steganography, Proceedings of World Academy 0f Science, Engineering and Technology, Volume 24 October 2007 ISSN 1307-6884
- Hussain, M. and Hussain, M. (2021). Embedding data in edge boundaries with high PSNR. Proceedings of 7th International Conference on Emerging Technologies (ICET 2011), pp.1-6.
- Huang, J.,Luo, W. and Huang, F., (2020). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, Vol. 2, pp. 201–214.
- Helmy, M. (2023), Audio Transmission Based on Hybrid rypto‑steganography Framework for Efficient Cyber Security in Wireless Communication System, Multimedia Tools and Applications (2025) 84:18893–18917 https://doi.org/10.1007/s11042-023-17921-2
- H. V. Patil and V. P. Sonaje 2023, “Crypto‑Stego: A hybrid method for encrypting text messages using AES and LSB algorithms,” Int. J. Intell. Syst. Appl. Eng., 2024. [Online]. Available: https://ijisae.org/index.php/IJISAE/article/view/7468
- J. Onyilo, (2025), Explainable AI Intrusion Detection System, Nature Journal of Emerging Sciences, Technologies and Innovations (NATURERUST), Vol. 1 No. 1 (2025). DOI: https://doi.org/10.65752/e5fa2b27
- Jung, K. H. and Yoo, K. Y. (2019). Image data hiding method based on multi-pixel differencing and LSB substitution methods. Proc. 2008 International Conference on Convergence and Hybrid Information Technology (ICHIT '08), pp. 355-358.
- Johnson, N. F., Duric, Z., & Fridrich, J. (2021). Information Hiding: Steganography and Watermarking Attacks and Countermeasures. Kluwer Academic Publishers.
- Kallapu, B., Janardhan, A.N., Hejamadi, R.M., Shrinivas, K.R.N., Saritha; Ramesh, R.K., Gabralla, L.A. (2025), Multi-Layered Security Framework Combining Steganography and DNA Coding. Systems 2025, 13, 341. https://doi.org/10.3390/systems13050341
- Kumar, B. and Dr.Murti, K. (2021). Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology. Journal on Computer Science and Engineering (IJCSE), Vol. 3.
- Obaida, M. and Awad, R., (2023). A New Approach for Complex Encrypting and Decrypting Data. International Journal of Computer Networks and Communications (IJCNC), Vol. 5.
- Patel, A., & Gupta, S. (2019). "Efficient Techniques for Digital Data Hiding and Secure Communication." International Journal of Computer Applications, 180(47), 25–31.
- Rahul, P., Shinge, R. and Vineet, S., (2023). An Encryption and Decryption Algorithm Based on ASCII Value of Data. International Journal of Computer Science and Information Technologies, Vol. 5.
- Reddy, S., Sowjanya, Ch., Praveena, P.and Prof.Shalini L (2022). Poly-alphabetic Symmetric Key Algorithm Using Randomized Prime Numbers. International Journal of Scientific and Research Publications, Vol. 2.
- R. Saheb (2024), “A new hybrid approach for image security using steganography and encryption,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., 2024. [Online]. Available: https://ijsrcseit.com/index.php/home/article/view/175
- Serdar S. and Umut A. (2018), LSB Substitution and PVD performance analysis for image steganography, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, Vol.-6, Issue-10, and Oct 2018. DOI: 10.26438/ijcse/v6i10.14
- Sharma, K. G., & Kumar, R. (2018). "Crypto-Steganography: A Fusion Approach for Secure Communication." In Proceedings of the IEEE International Conference on Information Security (pp. 135–142).
- Suguna, T., Padma, C., Rani, M. J., and Priya, G. (2018). Hybrid Cryptography and Steganography-Based Security System for IoT Networks. International Journal on Recent and Innovation Trends in Computing and Communication, 11(8s), 415–421. https://doi.org/10.17762/ijritcc.v11i8s.7221
- S. Singh, N. K. Sekhon, A. Singh, and S. Gupta (2024), “StegaCrypt: Integrating hybrid cryptography and image steganography,” Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET), 2024. [Online]. Available: https://www.ijraset.com/research-paper/stegacrypt-integrating-hybrid-cryptography-and image-steganography
- T. Suguna, C. Padma, M. J. Rani, and G. Priya (2023), “Hybrid cryptography and steganography‑based security system for IoT networks,” Int. J. Recent Innov. Trends Comput. Commun. (IJRITCC), 2023. [Online]. Available: https://ijritcc.org/index.php/ijritcc/article/view/7221
- Wen-Hsiang T. and Da-Chun W. (2023), A steganographic method for images by pixel-value differencing, Science Direct AI Journal, Volume 24, Issues 9–10, June 2003, Pages 1613-1626, https://doi.org/10.1016/S0167-8655(02)00402-6
- Wid, A. A., Ali, S. A., Alaa, K. H. (2022), Hybrid information security system via combination of compression, cryptography, and image steganography, International Journal of Electrical and Computer Engineering (IJECE), Vol. 12, No. 6, December 2022, pp. 6574~6584, ISSN: 2088-8708, DOI: 10.11591/ijece. v12i6.pp6574-6584
- Yang, C. H., and Hath, K. J. (2019). Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security, vol. 3, no. 5, pp. 488-497.
- Yang, H. X. and Sun, G. (2019). A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution. Journal: Radio engineering, vol. 18, no. 4, pp. 509-516.
Because security issues have gotten worse due to the quick expansion of network-based applications, especially with regard to the integrity and confidentiality of sensitive data sent over unprotected communication channels. Current security strategies that use steganography or cryptography alone are still susceptible to traffic monitoring, steganalysis, and cryptanalysis assaults. In order to improve secure data transmission in network contexts, this study suggests a hybrid data security framework that combines the Least Significant Bit (LSB) picture steganography approach with the Rivest–ShamirAdleman (RSA) public-key cryptography algorithm. In order to provide strong confidentiality, the suggested model first encrypts plaintext data using RSA key-pair generation and asymmetric encryption. The resulting ciphertext is then embedded into digital cover images using LSB-based steganographic embedding without causing noticeable distortion or substantial payload overhead. The Python programming Language were used in the PyCharm Integrated Development Environment to design and implement the system. The combined crypto-steganographic strategy improves resistance to brute-force assaults, steganalysis, and illegal access while preserving picture quality and transmission efficiency, according to experimental evaluation. The results show that the suggested framework outperforms stand-alone steganographic or cryptographic approaches in terms of security performance. A reliable and scalable data security system appropriate for safeguarding private data in contemporary network-based applications is contributed by this study.
Keywords :
Data Security, Crypto-Steganography, Network-Based Application, Information Hiding, Encryption, and Steganography.