Efficient text data hiding technique using cryptography and steganography
Steganography serves as a technique for covertly embedding confidential information within other data, ensuring that both the existence and content of this hidden data remain undisclosed to unauthorized parties. Its applications span diverse domains, including military operations, online payment sys...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/117432/ http://psasir.upm.edu.my/id/eprint/117432/1/117432.pdf |
| _version_ | 1848867246622900224 |
|---|---|
| author | Mohd Sani, Nor Fazlida Nujjaid, Mohamad Adreen |
| author_facet | Mohd Sani, Nor Fazlida Nujjaid, Mohamad Adreen |
| author_sort | Mohd Sani, Nor Fazlida |
| building | UPM Institutional Repository |
| collection | Online Access |
| description | Steganography serves as a technique for covertly embedding confidential information within other data, ensuring that both the existence and content of this hidden data remain undisclosed to unauthorized parties. Its applications span diverse domains, including military operations, online payment systems, and the Internet of Things (IoT). Steganography proves highly adaptable in concealing data, as information with an unknown presence escapes detection by potential attackers. Nonetheless, recent developments in steganalysis and image processing techniques have made it simpler for adversaries to reveal secret information. In response to this challenge, researchers have suggested various countermeasures, such as integrating steganography with encryption. This study employs steganography utilizing the Least Significant Bit (LSB) approach, which uses the Advanced Encryption Standard (AES) for symmetric encryption, and the Rivest-Shamir-Adleman (RSA) method for asymmetric key encryption. The Diffie-Hellman key exchange method improves the procedure as a whole. The effectiveness of these methods in protecting and hiding confidential information is then evaluated, along with how quickly the data is hidden. According to the results, using Diffie-Hellman key exchange in conjunction with AES performs better than using RSA for the encryption technique in terms of data hiding capabilities and speed. |
| first_indexed | 2025-11-15T14:33:27Z |
| format | Article |
| id | upm-117432 |
| institution | Universiti Putra Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T14:33:27Z |
| publishDate | 2024 |
| publisher | Science Publications |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | upm-1174322025-05-22T03:51:19Z http://psasir.upm.edu.my/id/eprint/117432/ Efficient text data hiding technique using cryptography and steganography Mohd Sani, Nor Fazlida Nujjaid, Mohamad Adreen Steganography serves as a technique for covertly embedding confidential information within other data, ensuring that both the existence and content of this hidden data remain undisclosed to unauthorized parties. Its applications span diverse domains, including military operations, online payment systems, and the Internet of Things (IoT). Steganography proves highly adaptable in concealing data, as information with an unknown presence escapes detection by potential attackers. Nonetheless, recent developments in steganalysis and image processing techniques have made it simpler for adversaries to reveal secret information. In response to this challenge, researchers have suggested various countermeasures, such as integrating steganography with encryption. This study employs steganography utilizing the Least Significant Bit (LSB) approach, which uses the Advanced Encryption Standard (AES) for symmetric encryption, and the Rivest-Shamir-Adleman (RSA) method for asymmetric key encryption. The Diffie-Hellman key exchange method improves the procedure as a whole. The effectiveness of these methods in protecting and hiding confidential information is then evaluated, along with how quickly the data is hidden. According to the results, using Diffie-Hellman key exchange in conjunction with AES performs better than using RSA for the encryption technique in terms of data hiding capabilities and speed. Science Publications 2024-12-03 Article PeerReviewed text en cc_by_4 http://psasir.upm.edu.my/id/eprint/117432/1/117432.pdf Mohd Sani, Nor Fazlida and Nujjaid, Mohamad Adreen (2024) Efficient text data hiding technique using cryptography and steganography. Journal of Computer Science, 21 (1). pp. 43-51. ISSN 1549-3636; eISSN: 1552-6607 https://thescipub.com/abstract/10.3844/jcssp.2025.43.51 10.3844/jcssp.2025.43.51 |
| spellingShingle | Mohd Sani, Nor Fazlida Nujjaid, Mohamad Adreen Efficient text data hiding technique using cryptography and steganography |
| title | Efficient text data hiding technique using cryptography and steganography |
| title_full | Efficient text data hiding technique using cryptography and steganography |
| title_fullStr | Efficient text data hiding technique using cryptography and steganography |
| title_full_unstemmed | Efficient text data hiding technique using cryptography and steganography |
| title_short | Efficient text data hiding technique using cryptography and steganography |
| title_sort | efficient text data hiding technique using cryptography and steganography |
| url | http://psasir.upm.edu.my/id/eprint/117432/ http://psasir.upm.edu.my/id/eprint/117432/ http://psasir.upm.edu.my/id/eprint/117432/ http://psasir.upm.edu.my/id/eprint/117432/1/117432.pdf |