Crypto Stego
Crypto Stego
Crypto Stego
Abstract— In today's world where keeping digital data safe is key, together with the steganographic techniques of hiding
combining cryptography and steganography gives a strong way to multimedia files, particularly images and audio. Advanced
protect sensitive info. This study shows the creation of a secure Encryption Standard (AES) is used in the system in order to
system that lets users hide private data in images and audio files. It
encrypt user data so that even if the hidden data is somehow
uses the Advanced Encryption Standard (AES) to encrypt and
found then they are virtually meaningless without the
applies clever steganographic methods like Least Significant Bit
(LSB) Reversible LSB (RLSB), and phase coding. This makes sure decryption key. Then the data is inserted into the selected
the hidden info stays safe and hard to spot. The team built the media using multiple steganography methods namely LSB and
system with Python and its flexible libraries giving users an easy- RLSB for images and phase coding for audio.
to-use interface to embed and get encrypted messages without
hassle. Thorough tests show the system works well to hide lots of These objectives can be summarized on the basis of their
data, keep media quality intact, and stand up to steganalysis attacks. implication in a broad range of fields such as secure
This work adds to the field of data security by offering a trusty tool communication, digital watermarking, and secure storage of
to hide info, which can help in many areas that need better privacy sensitive data. Thus addressing essential issues in data security
protection.
and even Camouflage giving the proposed system the much-
needed applicability by individuals and organizations.
Keywords— Crypto-Steganography, Data Security, AES, LSB,
RLSB, Phase Coding, Multimedia, Encryption, Steganalysis,
Python. II. RELATED WORK
In the audio files, we used the Phase Coding method AES implemented a high level of encryption and it
that encodes the data in the phase spectrum of the actual audio rendered the embedded data safe from any other parties to
signal. This technique is used when it is necessary to prevent access them.
the information from being intercepted.
Seamless Embedding:
Hybrid Steganography:
The combination of steganographic methods enabled the
Divide Cipher Text: We divide the encrypted data in smooth hiding of encrypted information. The media files kept
two regions and combine this with the image file. This their original quality, showing no obvious loss or distortion,
division provides the additional layer of security that requires which is important for real-world use.
a potential attacker to overcome to gain access to the hidden
information. [8] Accurate Retrieval:
Output Generation: Then the system forms a new The process of getting the information back was very
image file comprised of both parts of the encrypted data and precise, effectively taking out and unlocking the hidden data
also the decoded audio file. The originality of the stored from the media files. This precision is crucial for making sure
media files remains highly unaltered. that the original details can be completely brought back without
mistakes.
Retrieval and Decryption:
Performance Metrics:
LSB and RLSB Extraction: In the case of images, the
retrieval process include applying LSB extraction to obtain The system performed well in how fast it processed data
the first part of the hidden data, and RLSB extraction to and used its resources. The way it encrypted and embedded
obtain the second part of the hidden data. Two steps of information made sure the system could manage large
extraction are done to ensure that the information embedded amounts of data without much slowdown.
will still be retrievable. [9]
User Experience:
Phase Coding for Audio: The hidden data in audio
files is extracted with the help of Phase Coding extraction User feedback showed that people had a good time using
where the phase spectrum of the file is decoded. the system because it was easy to understand and simple to
operate. The design of the user interface was meant to make it
Decryption: easy for people to put in and get out information, even if they
don't know a lot about technology.
The extracted cipher text is merged and then
decrypted through the AES algorithm to bring back the VI. FUTURE WORK
original data. It then can store the produced results to
enhance integrity in the way the data is recalled. [10] The Crypto-Steganography system has been shown to
work well, but there are some parts that could be made better
in the future to increase what it can do and make it useful in
more situations:
Real-World Implementation: [4] Chih-Hsueh Lin, Guo-Hsin Hu, Jie-Sheng Chen, Jun-Juh Yan &
Kuang-Hui Tang, Novel design of cryptosystems for video/audio
Working with companies to use the system in actual streaming via dynamic synchronized chaos-based random
situations might help us learn how useful it really is. Making keys. Multimedia Systems 28, 1793–1808, October 2022.
changes to the system so it fits well with areas like
cybersecurity, media, and telecommunications can keep it [5] Rinaldi Munir, Application of The Modified EzStego Algorithm
useful as technology keeps changing. for Hiding Secret Messages in The Animated GIF Images, 2nd
International Conference on Science in Information Technology
(ICSITech), July 2016.
Continuous Adaptation:
[6] Md. Khalid Imam Rahmani, Kamiya Arora, Naina Pal, A
As cyber threats keep changing, the system needs to be
Crypto-Steganography: A Survey, International Journal of
updated regularly to handle new weaknesses and use the most Advanced Computer Science and Applications (IJACSA), Vol. 5,
recent improvements in encryption and hiding information. No. 7, July 2014.
Continuous research and development work will be important
for keeping the system effective over time. [7] Piyush Marwaha, Paresh Marwaha, Visual cryptographic
steganography in images, Second International Conference on
VII. CONCLUSION Computing, Communication and Networking Technologies,
September 2010.
The Crypto-Steganography project effectively merged
sophisticated encryption methods with cutting-edge hiding [8] Mustafa Sabah Taha, Mohd Shafry Mohd Rahim, Sameer
Abdulsattar Lafta, Mohammed Mahdi Hashim, and Hassanain
techniques to develop a way to hide information inside image
Mahdi Alzuabidi, Combination of Steganography and
and audio files. This system found the right mix of being secure,
Cryptography: A Short Survey, IOP Conference Series: Materials
easy to use, and hard to notice, which makes it a good choice Science and Engineering, August 2019.
for safeguarding vital data in different uses.
[9] Khalil Challita, Hikmat Farhat, Combining Steganography and
Using a combination of steganography methods made sure Cryptography: New Directions, International Journal on New
that the hidden information stayed secret and safe. The AES Computer Architectures and Their Applications (IJNCAA), July
encryption added a strong shield to prevent anyone from getting 2011.
into it without permission. The system's skill in keeping the
media files' quality high while correctly finding and unlocking [10] Kallam Ravindra Babu, Dr S. Udaya Kumar, Dr A. Vinaya
Babu, A Survey on Cryptography and Steganography Methods for
the hidden data shows it could be useful in everyday situations.
Information Security, International Journal of Computer
Applications, Volume 12, Issue 2, November 2010.
Going ahead, combining machine learning, discovering new
uses, and working with business partners will be important for
increasing the system's usefulness and making sure it stays
important as new cybersecurity problems come up. The Crypto-
Steganography project is a big move towards making data
security and privacy better in a world that's becoming more
digital.
VIII. REFERENCES
[1] Dipti Kapoor Sarmah, Neha Bajpai, Proposed System for data
hiding using Cryptography and Steganography, International
Journal of Computer Applications, Vol. 8 Issue 9, October 2010.