Cryptosystem for Secure Data Transmission using Advanced Encryption Standard (AES) and Steganography
DOI:
https://doi.org/10.32628/CSEIT195659Keywords:
Stego, Steganography, Cryptography, Least Significant Bit (LSB), Encryption, Advanced Encryption Standard (AES)Abstract
The rapid growth of global internet usage has intensified the demand for secure data transmission, as data breaches pose significant threats to individuals and organizations. Cryptography and steganography are two key techniques in data security: cryptography encrypts sensitive messages, while steganography conceals them within digital media. This study integrates both methods, employing Advanced Encryption Standard (AES) for encryption and the Least Significant Bit (LSB) technique for data embedding. The combined approach ensures data integrity, security, and flexibility, while maintaining minimal and visually imperceptible alterations to the carrier (stego) image. The system also introduces an initial login authentication layer to strengthen access control. This multi-layer security method significantly reduces the likelihood of interception and detection by unauthorized parties.
References
- Slain T., Deon S. (2004). Symmetric Key Encryption using Rijndael and C#.
- Narendra K Pareek (2012). Design and analysis of a novel digital Image encryption) scheme. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2.
- Ria Das, Indrajit Das (2016). Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques. IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).
- Ankit Gambhir and Sibaram Khara (2016). Integrating RSA Cryptography & Audio Steganography. IEEE ICCCA.
- Moresh Mukhedkar, Prajkta Powar and Peter Gaikwad (2015.). Secure non real time image encryption algorithm development using cryptography & Steganography. IEEE INDICON.
- Irfan Pratama (2016). Increasing the Security of MP3 Steganography Using AES Encryption and MD5 Hash Function”. International Conference on Science and Technology-Computer. (ICST), IEEE.
- Nikhil Patel, ShwetaMeena (2016). LSB Based Image Steganography Using Dynamic Key Cryptography. International Conference on Emerging Trends in Communication Technologies (ETCT).
- S. H. Gawanda and P. Y. Pawar, (2012). M-Commerce Security Using random LSB Steganography and Cryptography.” International Journal od Machine Learning and Computing, vol. 2(4).
- Amogh Mahapatra, Rajballav Dash (2007), Data encryption and decryption by using hill cipher technique and self-repetitive matrix”, International Conference on Intelligent Computing, Computer Science & Information Systems.
- Himanshi Sharma, Kamal Kumar Sharma and Sharad Chauhan (2015). Steganography Techniques Using Cryptography-A Review”, Paper. International Journal of Recent Research Aspects, Special Issue: Engineering Research Aspects ISSN: 2349-7688.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.