UPM Institutional Repository

Efficient text data hiding technique using cryptography and steganography


Citation

Mohd Sani, Nor Fazlida and Nujjaid, Mohamad Adreen (2024) Efficient text data hiding technique using cryptography and steganography. Journal of Computer Science, 21 (1). pp. 43-51. ISSN 1549-3636; eISSN: 1552-6607

Abstract

Steganography serves as a technique for covertly embedding confidential information within other data, ensuring that both the existence and content of this hidden data remain undisclosed to unauthorized parties. Its applications span diverse domains, including military operations, online payment systems, and the Internet of Things (IoT). Steganography proves highly adaptable in concealing data, as information with an unknown presence escapes detection by potential attackers. Nonetheless, recent developments in steganalysis and image processing techniques have made it simpler for adversaries to reveal secret information. In response to this challenge, researchers have suggested various countermeasures, such as integrating steganography with encryption. This study employs steganography utilizing the Least Significant Bit (LSB) approach, which uses the Advanced Encryption Standard (AES) for symmetric encryption, and the Rivest-Shamir-Adleman (RSA) method for asymmetric key encryption. The Diffie-Hellman key exchange method improves the procedure as a whole. The effectiveness of these methods in protecting and hiding confidential information is then evaluated, along with how quickly the data is hidden. According to the results, using Diffie-Hellman key exchange in conjunction with AES performs better than using RSA for the encryption technique in terms of data hiding capabilities and speed.


Download File

[img] Text
115847.pdf - Published Version

Download (624kB)

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.3844/jcssp.2025.43.51
Publisher: Science Publications
Keywords: Cryptography; Steganography; Key exchange algorithm
Depositing User: Scopus
Date Deposited: 13 Mar 2025 07:13
Last Modified: 13 Mar 2025 07:23
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.3844/jcssp.2025.43.51
URI: http://psasir.upm.edu.my/id/eprint/115847
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item