Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Ako Muhammad Abdullah, Roza Hikmat Hama Aziz

Ako Muhammad Abdullah and Roza Hikmat Hama Aziz. New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm. International Journal of Computer Applications 143(4):11-17, June 2016. BibTeX

	author = {Ako Muhammad Abdullah and Roza Hikmat Hama Aziz},
	title = {New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2016},
	volume = {143},
	number = {4},
	month = {Jun},
	year = {2016},
	issn = {0975-8887},
	pages = {11-17},
	numpages = {7},
	url = {},
	doi = {10.5120/ijca2016910143},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Nowadays, network has important roles for transferring data accurately and fast from source to a destination. The data is not secure enough to transfer highly confidential. The security of information has become one of the principle challenges of resource sharing with data communication over computer network. Cryptography and Steganography are two methods for protecting data from intruders while transferring over an open channel network. Cryptography is a method to encrypt data and steganography is the art and science of hiding secret message in a cover image. In this paper a Hash Least Significant Bit (H-LSB) with Affine cipher algorithm has been proposed for providing more security to data in a network environment. First we encrypt the data with the new cryptography algorithm and then embed in the image. Eight bits of the secret message are divided into 3, 3, 2 and embedding into the RGB pixels values of the cover image respectively. A hash function is used to select the particular position of insertion in LSB bits. This system allows a message sender to select keys to encrypt the secret message before embedding into the image and a receiver is used the keys to decrypt the message. Receiver can be decrypted the encrypt message with incorrect the keys but to a different form from the original message. This system has the ability to provide better security while transferring the secret message from one end to the other end in network environment.


  1. R, Poornima and Iswarya R.J. "An Overview of Digital Image Steganography". International Journal of Computer Science & Engineering Survey 4.1 (2013): 23-31.
  2. A, Anagaw and V. Sreenivasarao.” A Modified RSA Encryption Technique Based on Multiple public keys”. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 4, June (2013):859-864
  3. P, Kumar and V, Sharma.” Information Security Based on Steganography & Cryptography Techniques: A Review”. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 10, October (2014):247-250.
  4. O, Mohammad and A, Al-Hazaimeh.” Hiding Data in Images Using New Random Technique”. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 2, July (2012):49-53.
  5. C. J, Ezeofor and Ulasi A. G. "Analysis Of Network Data Encryption & Decryption Techniques In Communication Systems". International Journal of Innovative Research in Science, Engineering and Technology 03.12 (2014): 17797-17807.
  6. Rashid, Aqsa, Malik Missen, and Nadeem Salamat. "Analysis Of Steganography Techniques Using Least Significant Bit In Grayscale Images And Its Extension To Colour Images" Journal of Scientific Research & Reports (JSRR) 9.3 (2016): 1-14.
  7. Ahmed Laskar, Shamim. "High Capacity Data Hiding Using LSB Steganography And Encryption", International Journal of Database Management Systems (IJDMS) 4.6 (2012): 57-68.
  8. Mohammad Ali Bani Younes and Aman Jantan.” A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion” IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June (2008):247-254.
  9. Nameer N. EL-Emam.” Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithm”. International Journal of Computer, Electrical, Automation, Control and Information Engineering. Vol:2, No:11, (2008):3806-3817.
  10. Anil Kumar and Rohini Sharma.” A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 3, Issue 7, July (2013):363-372.
  11. Rosziati Ibrahim and Teoh Suk Kuan.” Steganography Algorithm to Hide Secret Message inside an Image”. Computer Technology and Application, Vol. 2 (2011): 102-108.
  12. Neil F. Johnson and Sushil Jajodia.” Exploring Steganography: Seeing the Unseen”, IEEE Computer, Vol. 31, Issue No. 2, Feb. (1998): 26-34.
  13. K. Thangadurai.“An analysis of LSB based image steganography techniques”, IEEE Computer, Computer Communication and Informatics (ICCCI), International Conference (2014): 1-4
  14. Ekta Walia , Payal Jain and Navdeep.” An Analysis of LSB & DCT based Steganography”, Global Journal of Computer Science and Technology, Vol. 10 Issue 1, April (2010):4-8.
  15. R.Amirtharajan, R. Akila and P.Deepikachowdavarapu.” A Comparative Analysis of Image Steganography”, International Journal of Computer Applications Vol 2 ,No. 3, May (2010):41-47.
  16. Kousik Dasgupta , J.K. Mandal and Paramartha Dutta.” Hash Based Least Significant Bit Technique For Video Steganography(HLSB)”, International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 2, April (2012):1-11.
  17. Roza Hikmat Hama Aziz.”Improving Courier Service Reservation System: Reliability and Performance”, Asia Journal of Natural & Applied Sceinces, Vol. 4 (4), December (2015): 20-36.
  18. Yuan Liu and Wen-Hsiang Tsai.” A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique”, IEEE Transactions on Information Forensics and Security, Vol. 2, No. 1, March (2007): 24-30.
  19. Kavita Kadam, Ashwini Koshti and Priya Dunghav.” Steganography Using Least Signicant Bit Algorithm”, Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun (2012): 338-341


Cryptography, steganography, secret message, Hash based LSB, Affine Cipher, encryption, decryption and embedding process.