METHOD OF HIDING INFORMATION USING THE AES ENCRYPTION ALGORITHM AND THE LSB STEGANOGRAPHIC METHOD WITH PROTECTION AGAINST CROPPING AND STEGANALYSIS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.31.997

Keywords:

steganography, cryptography, AES, LSB, hiding, data, container, image, security, encryption

Abstract

In an evolving era of rapidly increasing digital information volumes, ensuring its secure transmission is a critical task. The combination of steganography and encryption creates a powerful two-level security mechanism that simultaneously encrypts data and conceals its transmission. This paper proposes a method that implements two-level protection. The secret message is first encrypted using a reliable AES algorithm with a 256-bit key. This converts the source text into a pseudo-random sequence of bits, which complicates statistical analysis. Next, the encrypted data is embedded into a 24-bit color container image using a modified LSB method. The novelty of the approach lies in the following improvements: one full byte of the message is embedded into one pixel of the image, with its bits distributed across the RGB channels, which provides capacity; pixels are selected in a pseudo-random order using a pseudo-random number generator (PRNG), and a second PRNG is used for additional masking, providing additional protection against steganography analysis; The start of message embedding is shifted from the beginning of the file based on the image size, which protects the data when the steganographic container is partially cropped.

Standard metrics were selected to evaluate the effectiveness of the developed method: peak signal-to-noise ratio (PSNR), structural similarity index (SSIM), and normalized cross-correlation (NCC). Experimental analysis showed that the proposed method provides high-quality steganographic images. Even with maximum container filling (262,144 bytes), the PSNR remained high (56.67–56.76 dB), and the SSIM and NCC metrics were very close to 1, indicating minimal visual distortion. It is impossible to visually distinguish the original image from the stego container. A comparative analysis with other known methods (for 100,000 bytes) showed that the proposed algorithm has higher PSNR values (70.01–70.07 dB), confirming its effectiveness. The use of a double PRNG and embedding one byte per pixel ensures both high security and significant throughput. The developed hybrid method, which combines AES-256 encryption and modified LSB steganography with pseudo-random selection of pixels and bits, is an effective solution for the covert transmission of large amounts of data. The method provides a high level of security, resistance to steganography analysis, and visual invisibility of embedded data, as confirmed by high PSNR, SSIM, and NCC metrics.

Downloads

Download data is not yet available.

References

Radivilova, T., Kirichenko, L., Ageyev, D., Tawalbeh, M., & Bulakh, V. (2018, May). Decrypting SSL/TLS traffic for hidden threats detection. In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) (pp. 143-146). IEEE. doi: 10.1109/DESSERT.2018.8409116.

Radivilova, T., Dobrynin, I., Panteleev, V., Fisenko, D., Mazepa, A., & Bilodid, V. (2025). Analysis of methods for predicting internal threats based on analysis of data from the social network Twitter. Electronic professional scientific publication “Cybersecurity: Education, Science, Technology,” 4(28), 478–489. doi: 10.28925/2663-4023.2025.28.818

Ivanisenko, I., Kirichenko, L., & Radivilova, T. (2016, August). Investigation of multifractal properties of additive data stream. In 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP) (pp. 305-308). IEEE. doi: 10.1109/DSMP.2016.7583564.

Radivilova, T., Kirichenko, L., Panteleev, V., Mazepa, A., & Bilodid, V. (2024). Analysis of authentication methods for web applications and implementation of a web application with an integrated authentication system. Current state of scientific research and technology in industry, (3 (29)), 76-90. doi: 10.30837/2522-9818.2024.3.076

Alghawli, A. S. A., & Radivilova, T. (2024). Resilient cloud cluster with DevSecOps security model, automates a data analysis, vulnerability search and risk calculation. Alexandria Engineering Journal, 107, 136-149. doi:10.1016/j.aej.2024.07.036

Nasution, R. I. H., Fauzi, A., & Khair, H. (2023). Hybrid Cryptosystem Algorithm Vigenere Cipher and Base64 for Text Message Security Utilizing Least Significant Bit (LSB) Steganography as Insert into Image. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 2(3), 89-98. doi: 10.59934/jaiea.v2i3.201

Alanzy, M., Alomrani, R., Alqarni, B., & Almutairi, S. (2023). Image steganography using LSB and hybrid encryption algorithms. Applied Sciences, 13(21), 11771. doi: 10.3390/app132111771

Talasila, S., Vijaya Kumar, G., Vijaya Babu, E., Nainika, K., Veda Sahithi, M., & Mohan, P. (2023, June). The hybrid model of lsb—technique in image steganography using aes and rsa algorithms. In International Conference on Soft Computing and Signal Processing (pp. 403-413). Singapore: Springer Nature Singapore. doi: 10.1007/978-981-99-8451-0_34

Gupta, A., Ali, A., Pandey, A. K., Gupta, A. K., & Tripathi, A. (2022, November). Metamorphic cryptography using AES and LSB method. In 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM) (pp. 1-8). IEEE. doi: 10.1109/ICACCM56405.2022.10009381.

Gopika, R., A., Ganesh, R. S. (2025). Dynamic pixel shuffling and hash LSB steganography with RC4 encryption: A robust data security framework. Expert Systems with Applications, 279, 127403. doi: 10.1016/j.eswa.2025.127403.

Raiyan, S. R., & Kabir, M. H. (2025). SCReedSolo: A Secure and Robust LSB Image Steganography Framework with Randomized Symmetric Encryption and Reed-Solomon Coding. arXiv preprint arXiv:2503.12368.

Radivilova, T., Dobrynin, I., Snihurov, A., Stanhei, S., & Bulba, S. (2025). Image Steganography Method using LSB and AES Encryption Algorithm. In 2025 Proceedings of the Workshop Classic, Quantum, and Post-Quantum Cryptography 2025 (CQPC 2025), 4016, (pp.32-44). Ceur.

Apau, R., Twum, F., Asante, M., & Hayfron-Acquah, J. B. (2024, February). A Secure and High Embedding Capacity Image Steganography Scheme Using Image Enhancement Technique, Compression, and Genetic Algorithm. In International Congress on Information and Communication Technology (pp. 307-325). Singapore: Springer Nature Singapore. doi: 10.1007/978-981-97-5441-0_27

Malik, C., Jha, M., Jha, M., & Bansal, A. (2024, June). A Novel Approach for Image Steganography and Cryptography Using Genetic Algorithm. In International Conference on Data Analytics & Management (pp. 77-90). Singapore: Springer Nature Singapore. doi: 10.1007/978-981-96-3372-2_6.

Reddy, K. K., Kumar, N. V., Sajan, L., Teja, M. P., & Kumar, V. P. (2023, December). Enhancing Steganography Security: A Dual Layer Approach with LSB and AES Algorithm. In International Conference on Advances in Computational Intelligence and Informatics (pp. 321-327). Singapore: Springer Nature Singapore. doi: 10.1007/978-981-97-4727-6_32.

Kumar, N., Soni, M. (2025). Randomized salt LSB: a novel approach to steganography with improved concealment and robustness. Int. j. inf. tecnol., 17, 4401–4414. doi: 10.1007/s41870-025-02501-4.

Khalil, N., Sarhan, А., Alshewimy, M. A.M. (2024) A secure image steganography based on LSB technique and 2D chaotic maps. Computers and Electrical Engineering, 119(B), 109566. doi: 10.1016/j.compeleceng.2024.109566.

Ehsan Ali, U. A., Ali, E., Sohrawordi, M., & Sultan, M. N. (2021). A LSB based image steganography using random pixel and bit selection for high payload. doi: 10.5815/ijmsc.2021.03.03

Roy, S., Islam, M.M. (2022). A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security. SN COMPUT. SCI. 3, 153. doi: 10.1007/s42979-022-01046-8.

Rahman, S., Uddin, J., Hussain, H., Shah, S., Salam, A., Amin, F., Díez, I.T., Vargas, D. L. R., & Espinosa, J. C. M. (2025). A novel and efficient digital image steganography technique using least significant bit substitution. Scientific Reports, 15(1), 107. doi: 10.1038/s41598-024-83147-3.

Padmaja, S., & Basha, S. M. (2025). A Novel Hybrid Steganography Approach for Securing Text, Images, and Audio with Robust Encryption in Audio Steganography. ITEGAM-JETIA, 11(52), 136-147. doi: 10.5935/jetia.v11i52.1235.

Abood, M. H., & Abdulmajeed, S. W. (2022). High Security Image Cryptographic Algorithm Using Chaotic Encryption Algorithm with Hash-LSB Steganography. Al-Iraqia Journal for Scientific Engineering Research, 1(2), 65-74. doi: doi.org/10.58564/IJSER.1.2.2022.53.

Durge, R. S., & Deshmukh, V. M. (2025). Securing Cloud Data: A hybrid encryption approach with RSA and AES for enhanced security and performance. Journal of Integrated Science and Technology, 13(3), 1060-1060. doi: 10.62110/sciencein.jist.2025.v13.1060.

Sabeen, S. (2024, December). Securing Cloud Data: A Comprehensive Review of Hybrid Cryptography and Analysis of AES, Blowfish, and Twofish Algorithms. In 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS) (pp. 568-575). IEEE. doi: 10.1109/ICACRS62842.2024.10841570

Sahu, A., & Pradhan, C. (2023, January). A novel image steganography technique using AES encryption in DCT domain. In International Conference on Distributed Computing and Intelligent Technology (pp. 349-354). Cham: Springer Nature Switzerland. doi: 10.1007/978-3-031-24848-1_26.

Downloads


Abstract views: 20

Published

2025-12-16

How to Cite

Radivilova, T., Chakrian, V., Snihurov, A., Dobrynin, I., Ageyev, D., shenychnykh, S., & Shtangei, S. (2025). METHOD OF HIDING INFORMATION USING THE AES ENCRYPTION ALGORITHM AND THE LSB STEGANOGRAPHIC METHOD WITH PROTECTION AGAINST CROPPING AND STEGANALYSIS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 27–42. https://doi.org/10.28925/2663-4023.2025.31.997

Most read articles by the same author(s)