Hybrid Encryption and Steganography for Secure Image Data Hiding

Authors

  • Hawkar Kamaran Hama Department of Computer Science, College of Basic Education, University of Sulaimani, Sulaimani, KRI, Iraq
  • Aram M. Ahmed Department of Computer Science and Engineering, School of Science and Engineering, University of Kurdistan Hewler, Erbil, Iraq
  • Bryar A. Hassan Department of Computer Science, College of Science, Charmo University, Chamchamal/Sulaimani, KRI, Iraq
  • Abdulhady Abas Abdullah Artificial Intelligence and Innovation Centre, University of Kurdistan Hewler, Erbil, Iraq

DOI:

https://doi.org/10.21928/uhdjst.v9n2y2025.pp287-296

Keywords:

Robust Security Model, ChaCha20 Encryption, Discrete Wavelet Transform, Least Significant Bit Steganography, Image-Based Data Hiding

Abstract

Secure communication is becoming increasingly important in modern digital societies, where sensitive information is frequently exchanged over open networks. Traditional steganographic and cryptographic methods alone often fail to achieve a balance between imperceptibility, capacity, and robustness. To address these limitations, experimental results show a Peak Signal-to-Noise Ratio (PSNR) of 68 dB, indicating excellent visual quality, and a data-hiding capacity of 15 bits per pixel. It provides higher data payloads than conventional steganographic methods (typically 1–2 bpp) while still maintaining a very high PSNR of 68 dB. Furthermore, we highlight the improvements over existing works in terms of imperceptibility, robustness, and security. This revision makes the abstract more comprehensive and self-contained. Comparative analysis further highlights the superiority of this method over conventional techniques, offering an optimal balance between security, imperceptibility, and embedding capacity.

References

Y. Nir and A. Langley. “ChaCha20 and Poly1305 for IETF Protocols”. Association for Computing Machinery, United States, 2015.

R. K. Muhammed, R. Khalid, R. R. Aziz, A. A. Hassan, S. J. Sayda, T. A. Rashid and B. A. Hassan. “Comparative analysis of AES, Blowfish, Twofish, salsa20, and ChaCha20 for image encryption”. Kurdistan Journal of Applied Research, vol. 9, no. 1, pp. 52-65, 2024.

G. Othman and D. Q. Zeebaree. “The Applications of discrete wavelet transform in image processing: A review”. Journal of Soft Computing and Data Mining, vol. 1, pp. 31-43, 2024.

M. A. Aslam, M. Rashid, F. Azam, M. Abbas, Y. Rasheed, S. S. Alotaibi and M. W. Anwar. “Image steganography using least significant bit (LSB) systematic literature review”. In: 2022 2nd International Conference on Computing and Information Technology (ICCIT). IEEE, United States, 2022, pp. 32-38.

D. J. Bernstein. “ChaCha, a variant of Salsa20”. In: Workshop Record of SASC. Citeseer, United States, 2008, pp. 3-5.

R. Bazine, H. Wu and K. Boukhechba. “Spectral DWT multilevel decomposition with spatial filtering enhancement preprocessing-based approaches for hyperspectral imagery classification”. Remote Sensing, vol. 11, no. 24, p. 2906, 2019.

J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke and G. Wolf. “Modeling the Security of Steganographic Systems”. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 1525, Springer, Berlin, pp. 344-354, 1998.

I. J. Kadhim, P. Premaratne, P. J. Vial and B. Halloran. “Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research”. Neurocomputing, vol. 335, pp. 299-326, 2019.

X. Liao, Q. Y. Wen and J. Zhang. “A steganographic method for digital images with four-pixel differencing and modified LSB substitution”. Journal of Visual Communication and Image Representation, vol. 22, no. 1, pp. 1-8, 2011.

S. C. Hertel, C. E. Chwieralski, M. Hinz, M. C. Rio, C. Tomasetto and W. Hoffmann. “Profiling trefoil factor family (TFF) expression in the mouse: Identification of an antisense TFF1-related transcript in the kidney and liver”. Peptides (N.Y.), vol. 25, no. 5, pp. 755-762, 2004.

“SIPI Image Database”. Available from: https://sipi.usc.edu/ database [Last accessed on 2024 Nov 25].

V. R. Kebande. “Extended-Chacha20 stream cipher with enhanced quarter round function”. IEEE Access, vol. 11, pp. 114220-114237, 2023.

A. Tavakoli, Z. Honjani and H. Sajedi. “Convolutional neural network-based image watermarking using discrete wavelet transform”. International Journal of Information Technology (Singapore), vol. 15, no. 4, pp. 2021-2029, 2023.

K. V. Vaisnavi and P. R. Yaashikaa. “Discrete wavelet transform based digital image watermarking for satellite image security in comparison with singular value decomposition”. AIP Conference Proceedings, vol. 2822, no. 1, p. 020117, 2023.

A. Alabaichi, M. A. A. K. Al-Dabbas and A. Salih. “Image steganography using least significant bit and secret map techniques”. International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 935-946, 2020.

R. Rizal, A. Rahmatulloh, N. Widiyasono, R. R and D. R. Nursamsi. “Steganography: Combination of least significant bit (LSB) and bit-plane complexity segmentation (BPCS) methods for hiding massage on image and audio”. International Journal of Computer Applications, vol. 185, no. 21, pp. 1-7, 2023.

P. Ganwani, L. Gupta, C. Jain, R. Kulkarni and S. Chaudhari. “LSB based audio steganography using RSA and ChaCha20 encryption”. In: 2021 12th International Conference on Computing Communication and Networking Technologies, ICCCNT 2021. IEEE, United States, 2021.

V. Kumar and D. Kumar. “A modified DWT-based image steganography technique”. Multimedia Tools and Applications, vol. 77, no. 11, pp. 13279-13308, 2018.

S. H. Ahmed, A. M. Ahmed, O. H. Ahmed and W. K. Kadir. “Combining steganography and cryptography on Android platform to achieve a high-level security”. Journal of Engineering and Applied Sciences, vol. 12, no. 17, pp. 4448-4452, 2017.

J. Korhonen and J. You. “Peak signal-to-noise ratio revisited: Is simple beautiful?” In: 2012 4th International Workshop on Quality of Multimedia Experience, QoMEX 2012. IEEE, United States, pp. 37-38, 2012.

M. Baziyad, I. Shahin, T. Rabie and A. B. Nassif. “Maximizing embedding capacity for speech steganography: A segment-growing approach”. Multimedia Tools and Applications, vol. 80, no. 16, pp. 24469-24490, 2021.

S. Hemalatha, D. U. Acharya, A. Renuka and P. R. Kamath. “A secure and high capacity image steganography technique”. Signal and Image Processing an International Journal, vol. 4, p. 83, 2013.

X. Duan, M. Gou, N. Liu, W. Wang and C. Qin. “High-capacity image steganography based on improved xception”. Sensors, vol. 20, no. 24, p. 7253, 2020.

A. Jaradat, E. Taqieddin and M. Mowafi. “A high‐capacity image steganography method using chaotic mapping and particle swarm optimization”. Security and Communication Networks, vol. 2021, p. 6679284, 2021.

Y. Zhang, X. Zhang and W. Zhang. “A high-capacity adaptive image steganography algorithm based on a three-layer shell matrix”. In: Proceedings of the 2023 International Conference on Computer Science and Artificial Intelligence, pp. 1-6, 2023.

R. Agrawal and K. Ahuja. “CSIS: Compressed Sensing-Based Enhanced-Embedding Capacity Image Steganography Scheme”. [arXiv Preprint], 2021.

Published

2025-11-03

How to Cite

Hama, H. K., Ahmed, A., Hassan, B. A., & Abdullah, A. A. (2025). Hybrid Encryption and Steganography for Secure Image Data Hiding. UHD Journal of Science and Technology, 9(2), 287–296. https://doi.org/10.21928/uhdjst.v9n2y2025.pp287-296

Issue

Section

Articles

Most read articles by the same author(s)