Efficient Text Data Hiding Technique Using Cryptography and Steganography
- 1 Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, Malaysia
- 2 Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, Malaysia
Abstract
Steganography serves as a technique for covertly embedding confidential information within other data, ensuring that both the existence and content of this hidden data remain undisclosed to unauthorized parties. Its applications span diverse domains, including military operations, online payment systems, and the Internet of Things (IoT). Steganography proves highly adaptable in concealing data, as information with an unknown presence escapes detection by potential attackers. Nonetheless, recent developments in steganalysis and image processing techniques have made it simpler for adversaries to reveal secret information. In response to this challenge, researchers have suggested various countermeasures, such as integrating steganography with encryption. This study employs steganography utilizing the Least Significant Bit (LSB) approach, which uses the Advanced Encryption Standard (AES) for symmetric encryption, and the Rivest-Shamir-Adleman (RSA) method for asymmetric key encryption. The Diffie-Hellman key exchange method improves the procedure as a whole. The effectiveness of these methods in protecting and hiding confidential information is then evaluated, along with how quickly the data is hidden. According to the results, using Diffie-Hellman key exchange in conjunction with AES performs better than using RSA for the encryption technique in terms of data hiding capabilities and speed.
DOI: https://doi.org/10.3844/jcssp.2025.43.51
Copyright: © 2025 Nor Fazlida Mohd Sani and Mohamad Adreen Nujjaid. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 230 Views
- 131 Downloads
- 0 Citations
Download
Keywords
- Cryptography
- Steganography
- Key Exchange Algorithm