Research Article Open Access

Efficient Text Data Hiding Technique Using Cryptography and Steganography

Nor Fazlida Mohd Sani1 and Mohamad Adreen Nujjaid2
  • 1 Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, Malaysia
  • 2 Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, Malaysia

Abstract

Steganography serves as a technique for covertly embedding confidential information within other data, ensuring that both the existence and content of this hidden data remain undisclosed to unauthorized parties. Its applications span diverse domains, including military operations, online payment systems, and the Internet of Things (IoT). Steganography proves highly adaptable in concealing data, as information with an unknown presence escapes detection by potential attackers. Nonetheless, recent developments in steganalysis and image processing techniques have made it simpler for adversaries to reveal secret information. In response to this challenge, researchers have suggested various countermeasures, such as integrating steganography with encryption. This study employs steganography utilizing the Least Significant Bit (LSB) approach, which uses the Advanced Encryption Standard (AES) for symmetric encryption, and the Rivest-Shamir-Adleman (RSA) method for asymmetric key encryption. The Diffie-Hellman key exchange method improves the procedure as a whole. The effectiveness of these methods in protecting and hiding confidential information is then evaluated, along with how quickly the data is hidden. According to the results, using Diffie-Hellman key exchange in conjunction with AES performs better than using RSA for the encryption technique in terms of data hiding capabilities and speed.

Journal of Computer Science
Volume 21 No. 1, 2025, 43-51

DOI: https://doi.org/10.3844/jcssp.2025.43.51

Submitted On: 18 July 2024 Published On: 3 December 2024

How to Cite: Sani, N. F. M. & Nujjaid, M. A. (2025). Efficient Text Data Hiding Technique Using Cryptography and Steganography. Journal of Computer Science, 21(1), 43-51. https://doi.org/10.3844/jcssp.2025.43.51

  • 228 Views
  • 126 Downloads
  • 0 Citations

Download

Keywords

  • Cryptography
  • Steganography
  • Key Exchange Algorithm