International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF
Volume 74 | Issue 2 | Year 2026 | Article Id. IJETT-V74I2P105 | DOI : https://doi.org/10.14445/22315381/IJETT-V74I2P105

Using Cryptography and Steganography for a Three-Layered Data Hiding System


Isaac Adjaye Aboagye, Bright Baba Danjuma, Stephen Ofori Yeboah, Divine Sackitey, Nii Longdon Sowah, Joseph Agyiri, Kuubore Marcellinus, Anthony Adu Gyamfi

Received Revised Accepted Published
16 Jan 2025 11 Sep 2025 25 Nov 2025 14 Feb 2026

Citation :

Isaac Adjaye Aboagye, Bright Baba Danjuma, Stephen Ofori Yeboah, Divine Sackitey, Nii Longdon Sowah, Joseph Agyiri, Kuubore Marcellinus, Anthony Adu Gyamfi, "Using Cryptography and Steganography for a Three-Layered Data Hiding System," International Journal of Engineering Trends and Technology (IJETT), vol. 74, no. 2, pp. 75-87, 2026. Crossref, https://doi.org/10.14445/22315381/IJETT-V74I2P105

Abstract

Protecting sensitive information or data against cyber threats is critical for ensuring trust and integrity in many applications. Traditional cryptographic methods cannot withstand sophisticated attacks. To address these challenges, a three-layered security approach is proposed. In the proposed approach, the first layer uses a substitution encryption algorithm followed by AES-128 encryption. This enhanced ciphertext complexity. The encrypted data is then masked within cover media using steganography. This approach provided a secure defense mechanism, ensuring confidentiality, integrity, and availability of information. Through rigorous testing, the strategy proved effective against interception, decryption, and detection, meeting the specific requirements of banking systems and other institutions that handle sensitive data. This will enhance the proactive defense mechanism and ensure customer trust. Adopting this security strategy is vital for mitigating cyber risks and protecting banking and financial data integrity. It offers a robust defense mechanism crucial for safeguarding financial transactions and data security in an increasingly hostile digital landscape.

Keywords

Cryptography, Steganography, Cyphertext, ASCII, Cybersecurity.

References

[1] Wenli Duo, MengChu Zhou, and Abdullah Abusorrah, “A Survey of Cyber Attacks on Cyber-Physical Systems: Recent Advances and Challenges,” IEEE/CAA Journal of Automatica Sinica, vol. 9, No. 5, pp. 784-800, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[2] Chowdhury A., “Applications and Techniques in Information Security,” 6th International Conference on Applications and Techniques in Information Security, Cairns, pp. 54-65, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[3] Pan Yang, Naixue Xiong, and Jingli Ren, “Data Security and Privacy Protection for Cloud Storage: A Survey,” Special Section on Emerging Approaches to Cyber Security, vol. 8, pp. 131723- 131740, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[4] Danielle Kriz, “Cybersecurity Principles for Industry and Government: A Useful Framework for Efforts Globally to Improve Cybersecurity,” 2011 Second Worldwide Cybersecurity Summit (WCS), London, UK, pp. 1-3, 2011.
[Google Scholar] [Publisher Link]

[5] Richard Boateng et al., “Cyber Crime and Criminality in Ghana: Its Forms and Implications,” 16th Americas Conference on Information Systems, Lima, Peru, pp. 85-100, 2011.
[
Publisher Link]

[6] Ritz Carr, “Some Legal and Practical Challenges in the Investigation of Cybercrime,” Cybersecurity Undergraduate Research, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[7] Grace Odette Boussi, Himanshu Gupta, and Syed Akhter Hossain, “Financial Crime: A Conceptual Framework Implementation for Prevention of Malicious Request from a VPN or Proxy Server,” Scope Journal, vol. 13, no. 1, pp 375-385, 2023.
[
Publisher Link]

[8] Md. Khalid Imam Rahmani, Mr. Amit Kumar Goyal, and Manisha Mudgal, “Study of Cryptography and Steganography System,” International Journal of Engineering and Computer Science, vol. 4, no. 8, pp. 13685-13687, 2015.
[Google Scholar] [Publisher Link]

[9] Kaustubh Dwivedi et al., “A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions,” arXiv Preprint, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[10] Richard Apau et al., “Image Steganography Techniques for Resisting Statistical Steganalysis Attacks: A Systematic Literature Review,” PloS one, vol. 19, no. 9, pp. 1-47, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[11] Hayfaa Abdulzahra Atee, Robiah Ahmad, and Norliza Mohd Noor, “Cryptography and Image Steganography using Dynamic Encryption on LSB and Color Image Based Data Hiding,” Middle-East Journal of Scientific Research, vol. 23, no. 7, pp. 1450-1460, 2015.
[Google Scholar]

[12] Mangesh Kulkarni, Prasad Jagtap, and Ketan Kulkarni, “An Efficient Data Hiding Scheme using Steganography and Cryptography Technique,” International Journal of Scientific and Research Publications, vol. 5, no. 4, pp. 1-4, 2015.
[Google Scholar] [Publisher Link]

[13] Abrar Alsaidi et al., “Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding,” Journal of Computer Science & Computational Mathematics (JCSCM), vol. 8, no. 3, pp. 33-42, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[14] Malak Gorm-Allah Alkhudaydi, and Adnan Abdul-Aziz Gutub, “Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications,” Journal of Information Security and Cybercrimes Research, vol. 3, no. 1, pp.13-30, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[15] Nouf A. Al-Juaid, Adnan A. Gutub, and Esam A. Khan, “Enhancing PC Data Security via Combining RSA Cryptography and Video-Based Steganography,” Journal of Information Security and Cybercrimes Research, vol. 1, no. 1, pp. 5-13, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[16] G. Diwakara Reddy et al. “A Proficient and Secure Way of Transmission using Cryptography and Steganography,” 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS), Tashkent, Uzbekistan, pp. 582-586, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[17] N.R.D.P. Astuti, E. Aribowo, and E. Saputra, “Data Security Improvements on Cloud Computing using Cryptography and Steganography,” IOP Conference Series: Materials Science and Engineering, vol. 821, no. 1, pp. 1-8, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[18] Eshraq S. Bin Hureib, and Adnan A. Gutub, “Enhancing Medical Data Security via Combining Elliptic Curve Cryptography with 1-LSB and 2-LSB Image Steganography,” IJCSNS International Journal of Computer Science and Network Security, vol. 20, no. 12, pp. 232-241, 2020. 
[CrossRef] [Google Scholar] [Publisher Link]

[19] Fredy Varghese, and P. Sasikala, “A Detailed Review based on Secure Data Transmission using Cryptography and Steganography,” Wireless Personal Communications, vol. 129, no. 4, pp. 2291-2318, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[20] Mustafa S. Abbas, Suadad S. Mahdi, and Shahad A. Hussien, “Security Improvement of Cloud Data using Hybrid Cryptography and Steganography,” 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, pp. 123-127, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[21] Liliana Pasquale, “Automating Trade-Off Analysis of Security Requirements,” Requirements Engineering, vol. 21, no. 4, pp. 481-504, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[22] Ahmed Ali AL-Shaaby, and Talal AlKharobi, “Cryptography and Steganography: New Approach,” Transactions on Networks and Communications, vol. 5, no. 6, pp. 25-38, 2017.
[CrossRef] [Google Scholar] [Publisher Link]

[23] Swati S Patil, and Prof. Sangeetha Goud et al., “Enhanced Multi-Level Secret Data Hiding” International Journal of Scientific Research in Science, Engineering and Technology, vol. 2, no. 2, pp. 846-850, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[24] Ramadhan J. Mstafa, and Khaled M. Elleithy, “A Highly Secure Video Steganography using Hamming Code (7, 4),” IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, Farmingdale, NY, USA, pp. 1-7, 2014.
[CrossRef] [Google Scholar] [Publisher Link]

[25] B. Padmavathi, and S. K. Ranjitha, “A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique,” International Journal of Science and Research, vol. 2, no. 4, pp. 170-174, 2013.
[
Google Scholar]

[26] P. Manikandaprabhu, and M. Samreetha, “A Review of Encryption and Decryption of Text using the AES Algorithm,” International Journal of Scientific Research & Engineering Trends, vol. 10, no. 2, pp. 400-404, 2024.
[Google Scholar] [Publisher Link]

[27] R. Lavanya, and M. Karpagam, “Enhancing the Security of AES through Small-Scale Confusion Operations for Data Communication,” Microprocessors and Microsystems, vol. 75, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[28] Paweł Chodowiec, and Kris Gaj “Very Compact FPGA Implementation of the AES Algorithm,” International Workshop on Cryptographic Hardware and Embedded Systems, pp. 319-333, 2003.
[
CrossRef] [Google Scholar] [Publisher Link]

[29] Rajesh Kumar Tiwari, and G. Sahoo, “A Novel Methodology for Data Hiding in PDF Files,” Information Security Journal: A Global Perspective, vol. 20, no. 1, pp. 45-57, 2011.
[
CrossRef] [Google Scholar] [Publisher Link]

[30] Shabir A. Parah et al., “Hiding in Encrypted Images: A Three-Tier Security Data Hiding Technique,” Multidimensional Systems and Signal Processing, vol. 28, no. 2, 549-572, 2017.
[
CrossRef] [Google Scholar] [Publisher Link]