Secure Data Transmission using Cryptographic and Steganographic Technique

Rakeshgowda D. S. *, Guruprakash C. D.**
*-** Department of Computer Science and Engineering, Sri Siddhartha Institute of Technology, Tumkur, Karnataka, India.
Periodicity:January - June'2025

Abstract

Secure data transmission is increasingly vital amid rising cyber threats. This paper proposes a hybrid system combining cryptographic and steganographic techniques, implemented through a user interface for practical use. Users upload multipart documents, optionally compressed through zip, then encrypted with AES-256 for confidentiality. The AES key is encrypted using RSA for enhanced security. Both encrypted data and keys are embedded into a cover image using Discrete Wavelet Transform (DWT) steganography, chosen for its robustness. At the receiver end, the stego-image is processed to extract and decrypt the data, recovering the original files. Preliminary results show strong resistance to statistical attacks and high image quality (PSNR > 38 dB). This approach integrates symmetric and asymmetric cryptography with advanced steganography, offering a scalable solution for secure document sharing in sensitive applications, such as corporate and governmental communication.

Keywords

Cryptography, Steganography, AES Encryption, RSA Encryption, Data Security, Hybrid Security.

How to Cite this Article?

Rakeshgowda, D. S., and Guruprakash, C. D. (2025). Secure Data Transmission using Cryptographic and Steganographic Technique. International Journal of Communication and Networking System, 14(1), 27-35.

References

[1]. Alhomoud, A. M. (2021). Image steganography in spatial domain: Current status, techniques, and trends. Intelligent Automation & Soft Computing, 27(1), 69.
[3]. Gundla, R., Gupta, S., & Mohamed, R. B. (2022). 'Hybrid approach to cloud storage security using ECC-AES encr yption and key management techniques. International Journal of Computer Science and Engineering, 2(6), 15-100.
[4]. Islam, M. A., Simran, S. S., Aseef, M., & Rahman, L. (2024). Covert Data Transmission using Secret-Sharing and Network Steganography (Doctoral Dissertation, Brac University).
[9]. Sharma, N. (2021). Secure and Robust Bio-Signal Watermarking for Smart Healthcare Applications (Doctoral Dissertation, National Institute of Technology Patna).
[10]. Stallings, W. (2018). Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 35
Online 15 15 200 35
Pdf & Online 35 35 400 35

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.