Image Steganography Using RSA Algorithm

Authors

  • Mrs. V. Sravani Kumari Assistant Professor - Department of CSE - Data Science, CMR Engineering College, Kandlakoya, Medchal, Telangana, India. Author
  • T. Swetha UG - Department of CSE - Data Science, CMR Engineering College, Kandlakoya, Medchal, Telangana, India. Author
  • G. Vineesha UG - Department of CSE - Data Science, CMR Engineering College, Kandlakoya, Medchal, Telangana, India. Author
  • G. Raghuram UG - Department of CSE - Data Science, CMR Engineering College, Kandlakoya, Medchal, Telangana, India. Author
  • A. Venkatsai UG - Department of CSE - Data Science, CMR Engineering College, Kandlakoya, Medchal, Telangana, India. Author

DOI:

https://doi.org/10.47392/IRJAEM.2025.0176

Keywords:

Image Steganography, RSA Encryption, Cryptography, Information Security, Data Hiding, LSB Substitution, Hybrid Security, Digital Communication

Abstract

This research explores a novel security framework that combines RSA cryptography with image steganography to address growing digital security challenges. Our approach employs a two-tier protection mechanism: first encrypting sensitive data using RSA public-key cryptography, then concealing this encrypted information within digital images through an adaptive Least Significant Bit (LSB) technique. Unlike single-layer security solutions, this hybrid model ensures that even if hidden data is detected, it remains protected by encryption. We've developed a comprehensive system featuring intuitive user interfaces for encryption, embedding, extraction, and decryption processes. Performance evaluation demonstrates excellent visual integrity of carrier images with Peak Signal-to-Noise Ratio (PSNR) values exceeding 53 dB across test cases. The adaptive embedding algorithm intelligently varies bit modification based on image characteristics, making the system resilient against common steganalysis methods. Implementation testing shows the system effectively balances security strength, visual quality preservation, computational efficiency, and embedding capacity. This dual-security approach proves especially valuable for confidential communications, intellectual property protection, and secure data transmission across vulnerable networks.

Downloads

Download data is not yet available.

Downloads

Published

2025-04-02