Hybrid Asymmetric Cryptography and Modified Cosine Wavelet Transform-Based Steganography Using Convolutional Autoencoder for Secure Data Sharing
Received: 23 September 2025 | Revised: 20 November 2025 | Accepted: 7 December 2025 | Online: 9 February 2026
Corresponding author: R. Padma
Abstract
The need for secure data sharing has recently become a critical requirement in modern digital communication networks, especially for image-based information, due to the increasing threats of unauthorized access and privacy breaches. Although cryptography and steganography are widely used for protecting confidential information, it is still a great challenge to achieve high levels of confidentiality and integrity with low computational complexity and minimal error rates. To overcome this challenge, this study proposed the Cosine Wavelet Transformative Convolutional Autoencoded Cryptography Steganography (CWTCA CryptStego) technique, which combines cryptographic and steganographic processes in a Convolutional Autoencoder (CAE) structure. The proposed technique uses Schmidt-Samoa cryptography for secure encryption, Myriad Normalized Residual Filtering (MNRF) for noise removal, and a Modified Discrete Cosine Transform (MDCT) for efficient data embedding, while at the decoder, the stego image is reconstructed with reduced distortion and improved visual quality. Performance analysis using standard evaluation metrics demonstrates that the proposed CWTCA CryptStego technique achieves lower bit error rates, higher Peak signal-to-noise ratio (PSNR), and enhanced confidentiality and integrity, while reducing computation time compared with existing techniques.
Keywords:
secure image sharing, myriad normalized residual filtering, convolutional autoencoder, Schmidt-Samoa cryptography algorithm, modified discrete cosine transform-based steganographyDownloads
References
M. A. Hameed, M. Hassaballah, R. Abdelazim, and A. K. Sahu, "A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement," International Journal of Cognitive Computing in Engineering, vol. 5, pp. 379–397, 2024. DOI: https://doi.org/10.1016/j.ijcce.2024.08.002
A. A. Bahaddad, K. Ali Almarhabi, and S. Abdel-Khalek, "Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption," Alexandria Engineering Journal, vol. 75, pp. 41–54, July 2023. DOI: https://doi.org/10.1016/j.aej.2023.05.051
M. M. Msallam and F. Aldoghan, "Multistage Encryption for Text Using Steganography and Cryptography," Journal of Techniques, vol. 5, no. 1, pp. 38–43, Mar. 2023. DOI: https://doi.org/10.51173/jt.v5i1.1087
S. E. Ghrare, M. A. Abouras, and I. A. Akermi, "Development of Hybrid Data Security System using LSB Steganography and AES Cryptography," African Journal of Advanced Pure and Applied Sciences (AJAPAS), vol. 3, no. 2, pp. 86–95, Jun. 2024.
M. E. Danlami, L. L. Raymond, and T. Solomon, "Hybridization of Cryptography and Steganography to Achieve Secret Communication," International Journal of Advances in Engineering and Management (IJAEM), vol. 5, no. 8, pp. 428–437, Aug. 2024.
M. M. Shwaysh, S. Alani, M. A. Saad, and T. A. Abdulhussein, "Image Encryption and Steganography Method Based on AES Algorithm and Secret Sharing Algorithm," Ingénierie des systèmes d'information, vol. 29, no. 2, pp. 705–714, Apr. 2024. DOI: https://doi.org/10.18280/isi.290232
S. Priya, S. P. Abirami, B. Arunkumar, and B. Mishachandar, "Super-resolution deep neural network (SRDNN) based multi-image steganography for highly secured lossless image transmission," Scientific Reports, vol. 14, no. 1, Mar. 2024, Art. no. 6104. DOI: https://doi.org/10.1038/s41598-024-54839-7
M. Alanzy, R. Alomrani, B. Alqarni, and S. Almutairi, "Image Steganography Using LSB and Hybrid Encryption Algorithms," Applied Sciences, vol. 13, no. 21, Oct. 2023, Art. no. 11771. DOI: https://doi.org/10.3390/app132111771
M. EL-Hady, M. H. Abbas, F. A. Khanday, L. A. Said, and A. G. Radwan, "DISH: Digital image steganography using stochastic-computing with high-capacity," Multimedia Tools and Applications, vol. 83, no. 25, pp. 66033–66048, Jan. 2024. DOI: https://doi.org/10.1007/s11042-023-17998-9
A. İhsan and N. Doğan, "An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security," Multimedia Tools and Applications, vol. 83, no. 35, pp. 82589–82619, Mar. 2024. DOI: https://doi.org/10.1007/s11042-024-18722-x
S. Rahman et al., "A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image," Scientific Reports, vol. 13, no. 1, Aug. 2023, Art. no. 14183. DOI: https://doi.org/10.1038/s41598-023-41303-1
S. Rahman, J. Uddin, H. U. Khan, H. Hussain, A. A. Khan, and M. Zakarya, "A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method," IEEE Access, vol. 10, pp. 124053–124075, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3224745
Z. Saeidi, A. Yazdi, S. Mashhadi, M. Hadian, and A. Gutub, "High performance image steganography integrating IWT and Hamming code within secret sharing," IET Image Processing, vol. 18, no. 1, pp. 129–139, Jan. 2024. DOI: https://doi.org/10.1049/ipr2.12938
B. Parihar, M. Deshmukh, and A. S. Rawat, "Efficient Single Secret Image Sharing in Resource-Constrained Environment using Counting-Based Secret Sharing over Cloud," Procedia Computer Science, vol. 230, pp. 158–167, 2023. DOI: https://doi.org/10.1016/j.procs.2023.12.071
C. Yu, X. Zhang, C. Qin, and Z. Tang, "Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 33, no. 11, pp. 6443–6458, Nov. 2023. DOI: https://doi.org/10.1109/TCSVT.2023.3270882
R. M. Holla and D. Suma, "Progressive Hartley image secret sharing for high-quality image recovery," Cogent Engineering, vol. 10, no. 2, Dec. 2023, Art. no. 2262805. DOI: https://doi.org/10.1080/23311916.2023.2262805
L. Huo, R. Chen, J. Wei, and L. Huang, "A High-Capacity and High-Security Image Steganography Network Based on Chaotic Mapping and Generative Adversarial Networks," Applied Sciences, vol. 14, no. 3, Feb. 2024, Art. no. 1225. DOI: https://doi.org/10.3390/app14031225
V. K. Sharma, P. Kumar, S. Singhal, B. P. Soni, and P. K. Shukla, "Secret image scrambling and DWT-based image steganography using smoothing operation and convolution neural networks," Journal of Discrete Mathematical Sciences & Cryptography, vol. 26, no. 3, pp. 695–705, 2023. DOI: https://doi.org/10.47974/JDMSC-1742
R. Panigrahi and N. Padhy, "An effective steganographic technique for hiding the image data using the LSB technique," Cyber Security and Applications, vol. 3, Dec. 2025, Art. no. 100069. DOI: https://doi.org/10.1016/j.csa.2024.100069
G. M. Salama et al., "Efficient multimodal cancelable biometric system based on steganography and cryptography," Iran Journal of Computer Science, vol. 6, no. 2, pp. 109–121, June 2023. DOI: https://doi.org/10.1007/s42044-022-00115-8
M. Alsafyani, F. Alhomayani, H. Alsuwat, and E. Alsuwat, "Face Image Encryption Based on Feature with Optimization Using Secure Crypto General Adversarial Neural Network and Optical Chaotic Map," Sensors, vol. 23, no. 3, Jan. 2023, Art. no. 1415. DOI: https://doi.org/10.3390/s23031415
A. S. Ali, S. Alsamaraee, and A. A. Hussein, "Optimize Image Steganography Based on Distinction Disparity Value and HMPSO to Ensure Confidentiality and Integrity," Journal of Computer Networks and Communications, vol. 2024, no. 1, Jan. 2024, Art. no. 2516567. DOI: https://doi.org/10.1155/2024/2516567
S. Rezaei and A. Javadpour, "Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission," Multimedia Tools and Applications, vol. 83, no. 35, pp. 82247–82280, Mar. 2024. DOI: https://doi.org/10.1007/s11042-024-18776-x
A. Sabharwal, P. Yadav, and K. Kumar, "Graph Crypto‐Stego System for Securing Graph Data Using Association Schemes," Journal of Applied Mathematics, vol. 2024, no. 1, Jan. 2024, Art. no. 2084342. DOI: https://doi.org/10.1155/2024/2084342
M. Kaur et al., "EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT," IEEE Access, vol. 11, pp. 90739–90748, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3305271
S. Rahman et al., "Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats," Sustainability, vol. 15, no. 5, Feb. 2023, Art. no. 4252. DOI: https://doi.org/10.3390/su15054252
A. Kumar, R. Rani, and S. Singh, "Encoder-Decoder Architecture for Image Steganography using Skip Connections.," Procedia Computer Science, vol. 218, pp. 1122–1131, 2023. DOI: https://doi.org/10.1016/j.procs.2023.01.091
Y. Y. Abdullahi, L. G. Farouk, A. S. Nur, and A. Sale, "Proposition of a Better Data Security Model for a Protective Information Exchange on the Internet with Advanced Steganographic and Cryptographic Algorithm," Journal of Applied Sciences and Environmental Management, vol. 28, no. 10, pp. 3013–3018, Oct. 2024. DOI: https://doi.org/10.4314/jasem.v28i10.8
V. Smith, M. Mendoza, and I. Ullah, "Data Security Techniques Using Vigenere Cipher And Steganography Methods In Inserting Text Messages In Images," Journal of Information Systems and Technology Research, vol. 3, no. 3, pp. 92–100, Sept. 2024. DOI: https://doi.org/10.55537/jistr.v3i3.867
H. Y. Naser, A. K. Mattar, M. A. Saare, M. A. Almaiah, and R. Shehab, "A Comparison of Lightweight Cryptographic Protocols for Energy-Efficient and Sustainable IoMT Authentication," Engineering, Technology & Applied Science Research, vol. 15, no. 4, pp. 25746–25756, Aug. 2025. DOI: https://doi.org/10.48084/etasr.12204
BOSSBASE. (1.01),. [Online]. Available: https://dde.binghamton.edu/download/.
Downloads
How to Cite
License
Copyright (c) 2026 R. Padma, Vamsidhar Yendapalli

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
