Research Article | Open Access | Download PDF
Volume 74 | Issue 2 | Year 2026 | Article Id. IJETT-V74I2P105 | DOI : https://doi.org/10.14445/22315381/IJETT-V74I2P105Using Cryptography and Steganography for a Three-Layered Data Hiding System
Isaac Adjaye Aboagye, Bright Baba Danjuma, Stephen Ofori Yeboah, Divine Sackitey, Nii Longdon Sowah, Joseph Agyiri, Kuubore Marcellinus, Anthony Adu Gyamfi
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 16 Jan 2025 | 11 Sep 2025 | 25 Nov 2025 | 14 Feb 2026 |
Citation :
Isaac Adjaye Aboagye, Bright Baba Danjuma, Stephen Ofori Yeboah, Divine Sackitey, Nii Longdon Sowah, Joseph Agyiri, Kuubore Marcellinus, Anthony Adu Gyamfi, "Using Cryptography and Steganography for a Three-Layered Data Hiding System," International Journal of Engineering Trends and Technology (IJETT), vol. 74, no. 2, pp. 75-87, 2026. Crossref, https://doi.org/10.14445/22315381/IJETT-V74I2P105
Abstract
Protecting sensitive information or data against cyber threats is critical for ensuring trust and integrity in many applications. Traditional cryptographic methods cannot withstand sophisticated attacks. To address these challenges, a three-layered security approach is proposed. In the proposed approach, the first layer uses a substitution encryption algorithm followed by AES-128 encryption. This enhanced ciphertext complexity. The encrypted data is then masked within cover media using steganography. This approach provided a secure defense mechanism, ensuring confidentiality, integrity, and availability of information. Through rigorous testing, the strategy proved effective against interception, decryption, and detection, meeting the specific requirements of banking systems and other institutions that handle sensitive data. This will enhance the proactive defense mechanism and ensure customer trust. Adopting this security strategy is vital for mitigating cyber risks and protecting banking and financial data integrity. It offers a robust defense mechanism crucial for safeguarding financial transactions and data security in an increasingly hostile digital landscape.
Keywords
Cryptography, Steganography, Cyphertext, ASCII, Cybersecurity.
References
[1] Wenli Duo, MengChu Zhou, and Abdullah Abusorrah,
“A Survey of Cyber Attacks on Cyber-Physical Systems: Recent Advances and
Challenges,” IEEE/CAA Journal of Automatica Sinica, vol. 9, No. 5, pp.
784-800, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Chowdhury A., “Applications
and Techniques in Information Security,” 6th International Conference on Applications and Techniques in Information
Security, Cairns, pp. 54-65, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Pan Yang, Naixue Xiong, and Jingli Ren, “Data
Security and Privacy Protection for Cloud Storage: A Survey,” Special
Section on Emerging Approaches to Cyber Security, vol. 8, pp. 131723-
131740, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Danielle Kriz, “Cybersecurity Principles for Industry and Government: A Useful
Framework for Efforts Globally to Improve Cybersecurity,” 2011 Second Worldwide
Cybersecurity Summit (WCS), London, UK, pp. 1-3, 2011.
[Google Scholar] [Publisher Link]
[5] Richard Boateng et al., “Cyber Crime and
Criminality in Ghana: Its Forms and Implications,” 16th Americas
Conference on Information Systems, Lima, Peru, pp. 85-100, 2011.
[Publisher Link]
[6] Ritz Carr, “Some Legal and Practical Challenges
in the Investigation of Cybercrime,” Cybersecurity Undergraduate Research,
2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Grace Odette Boussi, Himanshu Gupta, and Syed
Akhter Hossain, “Financial Crime: A Conceptual Framework Implementation for
Prevention of Malicious Request from a VPN or Proxy Server,” Scope Journal,
vol. 13, no. 1, pp 375-385, 2023.
[Publisher Link]
[8] Md. Khalid Imam Rahmani, Mr. Amit Kumar Goyal, and
Manisha Mudgal, “Study of Cryptography and Steganography System,” International
Journal of Engineering and Computer Science, vol. 4, no. 8, pp.
13685-13687, 2015.
[Google Scholar] [Publisher Link]
[9] Kaustubh Dwivedi et al., “A Novel
Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks,
Mitigations, and Research Directions,” arXiv Preprint, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Richard Apau et al., “Image
Steganography Techniques for Resisting Statistical Steganalysis Attacks: A
Systematic Literature Review,” PloS one, vol. 19, no. 9, pp. 1-47,
2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Hayfaa Abdulzahra Atee, Robiah Ahmad, and Norliza
Mohd Noor, “Cryptography and Image Steganography using Dynamic Encryption on
LSB and Color Image Based Data Hiding,” Middle-East Journal of Scientific
Research, vol. 23, no. 7, pp. 1450-1460, 2015.
[Google Scholar]
[12] Mangesh Kulkarni, Prasad Jagtap, and Ketan
Kulkarni, “An Efficient Data Hiding Scheme using Steganography and Cryptography
Technique,” International Journal of Scientific and Research Publications,
vol. 5, no. 4, pp. 1-4, 2015.
[Google Scholar] [Publisher Link]
[13] Abrar Alsaidi et al., “Compression Multi-Level
Crypto Stego Security of Texts Utilizing Colored Email Forwarding,” Journal
of Computer Science & Computational Mathematics (JCSCM), vol. 8, no. 3,
pp. 33-42, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Malak Gorm-Allah Alkhudaydi, and Adnan Abdul-Aziz
Gutub, “Integrating Light-Weight Cryptography with Diacritics Arabic Text
Steganography Improved for Practical Security Applications,” Journal of
Information Security and Cybercrimes Research, vol. 3, no. 1, pp.13-30,
2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Nouf A. Al-Juaid, Adnan A. Gutub, and Esam A.
Khan, “Enhancing PC Data Security via Combining RSA Cryptography and
Video-Based Steganography,” Journal of Information Security and Cybercrimes
Research, vol. 1, no. 1, pp. 5-13, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[16] G. Diwakara Reddy et al. “A Proficient
and Secure Way of Transmission using Cryptography and Steganography,” 2022 2nd
International Conference on Technological Advancements in Computational
Sciences (ICTACS), Tashkent, Uzbekistan, pp. 582-586, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] N.R.D.P. Astuti, E. Aribowo, and E. Saputra, “Data
Security Improvements on Cloud Computing using Cryptography and Steganography,”
IOP Conference Series: Materials Science and Engineering, vol. 821, no.
1, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Eshraq S. Bin Hureib, and Adnan A. Gutub,
“Enhancing Medical Data Security via Combining Elliptic Curve Cryptography with
1-LSB and 2-LSB Image Steganography,” IJCSNS International Journal of
Computer Science and Network Security, vol. 20, no. 12, pp. 232-241,
2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Fredy Varghese, and P. Sasikala, “A Detailed
Review based on Secure Data Transmission using Cryptography and Steganography,”
Wireless Personal Communications, vol. 129, no. 4, pp. 2291-2318, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Mustafa S. Abbas, Suadad S. Mahdi, and Shahad A.
Hussien, “Security Improvement of Cloud Data using Hybrid Cryptography and
Steganography,” 2020 International Conference on Computer Science and
Software Engineering (CSASE), Duhok, Iraq, pp. 123-127, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Liliana Pasquale, “Automating
Trade-Off Analysis of Security Requirements,” Requirements Engineering, vol.
21, no. 4, pp. 481-504, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Ahmed Ali AL-Shaaby, and Talal AlKharobi,
“Cryptography and Steganography: New Approach,” Transactions on Networks and
Communications, vol. 5, no. 6, pp. 25-38, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Swati S Patil, and Prof. Sangeetha Goud et al.,
“Enhanced Multi-Level Secret Data Hiding” International Journal of
Scientific Research in Science, Engineering and Technology, vol. 2, no. 2,
pp. 846-850, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Ramadhan J. Mstafa, and Khaled M. Elleithy, “A
Highly Secure Video Steganography using Hamming Code (7, 4),” IEEE Long
Island Systems, Applications and Technology (LISAT) Conference 2014, Farmingdale,
NY, USA, pp. 1-7, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[25] B. Padmavathi, and S. K. Ranjitha, “A Survey on
Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution
Technique,” International Journal of Science and Research, vol. 2, no. 4,
pp. 170-174, 2013.
[Google Scholar]
[26] P. Manikandaprabhu, and M.
Samreetha, “A Review of Encryption and Decryption of Text using the AES Algorithm,”
International Journal of Scientific Research & Engineering Trends, vol.
10, no. 2, pp. 400-404, 2024.
[Google Scholar] [Publisher Link]
[27] R. Lavanya, and M. Karpagam,
“Enhancing the Security of AES through Small-Scale Confusion Operations for
Data Communication,” Microprocessors and Microsystems, vol. 75, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Paweł Chodowiec, and Kris Gaj “Very Compact FPGA Implementation of the AES
Algorithm,” International Workshop on Cryptographic Hardware and Embedded
Systems, pp. 319-333, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Rajesh Kumar Tiwari, and G.
Sahoo, “A Novel Methodology for Data Hiding in PDF Files,” Information
Security Journal: A Global Perspective, vol. 20, no. 1, pp. 45-57,
2011.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Shabir A. Parah et al.,
“Hiding in Encrypted Images: A Three-Tier Security Data
Hiding Technique,” Multidimensional Systems and Signal Processing, vol.
28, no. 2, 549-572, 2017.
[CrossRef] [Google Scholar] [Publisher Link]