Hybrid Asymmetric Cryptography and Modified Cosine Wavelet Transform-Based Steganography Using Convolutional Autoencoder for Secure Data Sharing

Authors

  • R. Padma Department of Computer Science, GITAM School of Technology, GITAM University, Bengaluru, India
  • Vamsidhar Yendapalli Department of Computer Science, GITAM School of Technology, GITAM University, Bengaluru, India
Volume: 16 | Issue: 1 | Pages: 32753-32760 | February 2026 | https://doi.org/10.48084/etasr.15047

Abstract

The need for secure data sharing has recently become a critical requirement in modern digital communication networks, especially for image-based information, due to the increasing threats of unauthorized access and privacy breaches. Although cryptography and steganography are widely used for protecting confidential information, it is still a great challenge to achieve high levels of confidentiality and integrity with low computational complexity and minimal error rates. To overcome this challenge, this study proposed the Cosine Wavelet Transformative Convolutional Autoencoded Cryptography Steganography (CWTCA CryptStego) technique, which combines cryptographic and steganographic processes in a Convolutional Autoencoder (CAE) structure. The proposed technique uses Schmidt-Samoa cryptography for secure encryption, Myriad Normalized Residual Filtering (MNRF) for noise removal, and a Modified Discrete Cosine Transform (MDCT) for efficient data embedding, while at the decoder, the stego image is reconstructed with reduced distortion and improved visual quality. Performance analysis using standard evaluation metrics demonstrates that the proposed CWTCA CryptStego technique achieves lower bit error rates, higher Peak signal-to-noise ratio (PSNR), and enhanced confidentiality and integrity, while reducing computation time compared with existing techniques.

Keywords:

secure image sharing, myriad normalized residual filtering, convolutional autoencoder, Schmidt-Samoa cryptography algorithm, modified discrete cosine transform-based steganography

Downloads

Download data is not yet available.

References

M. A. Hameed, M. Hassaballah, R. Abdelazim, and A. K. Sahu, "A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement," International Journal of Cognitive Computing in Engineering, vol. 5, pp. 379–397, 2024. DOI: https://doi.org/10.1016/j.ijcce.2024.08.002

A. A. Bahaddad, K. Ali Almarhabi, and S. Abdel-Khalek, "Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption," Alexandria Engineering Journal, vol. 75, pp. 41–54, July 2023. DOI: https://doi.org/10.1016/j.aej.2023.05.051

M. M. Msallam and F. Aldoghan, "Multistage Encryption for Text Using Steganography and Cryptography," Journal of Techniques, vol. 5, no. 1, pp. 38–43, Mar. 2023. DOI: https://doi.org/10.51173/jt.v5i1.1087

S. E. Ghrare, M. A. Abouras, and I. A. Akermi, "Development of Hybrid Data Security System using LSB Steganography and AES Cryptography," African Journal of Advanced Pure and Applied Sciences (AJAPAS), vol. 3, no. 2, pp. 86–95, Jun. 2024.

M. E. Danlami, L. L. Raymond, and T. Solomon, "Hybridization of Cryptography and Steganography to Achieve Secret Communication," International Journal of Advances in Engineering and Management (IJAEM), vol. 5, no. 8, pp. 428–437, Aug. 2024.

M. M. Shwaysh, S. Alani, M. A. Saad, and T. A. Abdulhussein, "Image Encryption and Steganography Method Based on AES Algorithm and Secret Sharing Algorithm," Ingénierie des systèmes d'information, vol. 29, no. 2, pp. 705–714, Apr. 2024. DOI: https://doi.org/10.18280/isi.290232

S. Priya, S. P. Abirami, B. Arunkumar, and B. Mishachandar, "Super-resolution deep neural network (SRDNN) based multi-image steganography for highly secured lossless image transmission," Scientific Reports, vol. 14, no. 1, Mar. 2024, Art. no. 6104. DOI: https://doi.org/10.1038/s41598-024-54839-7

M. Alanzy, R. Alomrani, B. Alqarni, and S. Almutairi, "Image Steganography Using LSB and Hybrid Encryption Algorithms," Applied Sciences, vol. 13, no. 21, Oct. 2023, Art. no. 11771. DOI: https://doi.org/10.3390/app132111771

M. EL-Hady, M. H. Abbas, F. A. Khanday, L. A. Said, and A. G. Radwan, "DISH: Digital image steganography using stochastic-computing with high-capacity," Multimedia Tools and Applications, vol. 83, no. 25, pp. 66033–66048, Jan. 2024. DOI: https://doi.org/10.1007/s11042-023-17998-9

A. İhsan and N. Doğan, "An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security," Multimedia Tools and Applications, vol. 83, no. 35, pp. 82589–82619, Mar. 2024. DOI: https://doi.org/10.1007/s11042-024-18722-x

S. Rahman et al., "A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image," Scientific Reports, vol. 13, no. 1, Aug. 2023, Art. no. 14183. DOI: https://doi.org/10.1038/s41598-023-41303-1

S. Rahman, J. Uddin, H. U. Khan, H. Hussain, A. A. Khan, and M. Zakarya, "A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method," IEEE Access, vol. 10, pp. 124053–124075, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3224745

Z. Saeidi, A. Yazdi, S. Mashhadi, M. Hadian, and A. Gutub, "High performance image steganography integrating IWT and Hamming code within secret sharing," IET Image Processing, vol. 18, no. 1, pp. 129–139, Jan. 2024. DOI: https://doi.org/10.1049/ipr2.12938

B. Parihar, M. Deshmukh, and A. S. Rawat, "Efficient Single Secret Image Sharing in Resource-Constrained Environment using Counting-Based Secret Sharing over Cloud," Procedia Computer Science, vol. 230, pp. 158–167, 2023. DOI: https://doi.org/10.1016/j.procs.2023.12.071

C. Yu, X. Zhang, C. Qin, and Z. Tang, "Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 33, no. 11, pp. 6443–6458, Nov. 2023. DOI: https://doi.org/10.1109/TCSVT.2023.3270882

R. M. Holla and D. Suma, "Progressive Hartley image secret sharing for high-quality image recovery," Cogent Engineering, vol. 10, no. 2, Dec. 2023, Art. no. 2262805. DOI: https://doi.org/10.1080/23311916.2023.2262805

L. Huo, R. Chen, J. Wei, and L. Huang, "A High-Capacity and High-Security Image Steganography Network Based on Chaotic Mapping and Generative Adversarial Networks," Applied Sciences, vol. 14, no. 3, Feb. 2024, Art. no. 1225. DOI: https://doi.org/10.3390/app14031225

V. K. Sharma, P. Kumar, S. Singhal, B. P. Soni, and P. K. Shukla, "Secret image scrambling and DWT-based image steganography using smoothing operation and convolution neural networks," Journal of Discrete Mathematical Sciences & Cryptography, vol. 26, no. 3, pp. 695–705, 2023. DOI: https://doi.org/10.47974/JDMSC-1742

R. Panigrahi and N. Padhy, "An effective steganographic technique for hiding the image data using the LSB technique," Cyber Security and Applications, vol. 3, Dec. 2025, Art. no. 100069. DOI: https://doi.org/10.1016/j.csa.2024.100069

G. M. Salama et al., "Efficient multimodal cancelable biometric system based on steganography and cryptography," Iran Journal of Computer Science, vol. 6, no. 2, pp. 109–121, June 2023. DOI: https://doi.org/10.1007/s42044-022-00115-8

M. Alsafyani, F. Alhomayani, H. Alsuwat, and E. Alsuwat, "Face Image Encryption Based on Feature with Optimization Using Secure Crypto General Adversarial Neural Network and Optical Chaotic Map," Sensors, vol. 23, no. 3, Jan. 2023, Art. no. 1415. DOI: https://doi.org/10.3390/s23031415

A. S. Ali, S. Alsamaraee, and A. A. Hussein, "Optimize Image Steganography Based on Distinction Disparity Value and HMPSO to Ensure Confidentiality and Integrity," Journal of Computer Networks and Communications, vol. 2024, no. 1, Jan. 2024, Art. no. 2516567. DOI: https://doi.org/10.1155/2024/2516567

S. Rezaei and A. Javadpour, "Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission," Multimedia Tools and Applications, vol. 83, no. 35, pp. 82247–82280, Mar. 2024. DOI: https://doi.org/10.1007/s11042-024-18776-x

A. Sabharwal, P. Yadav, and K. Kumar, "Graph Crypto‐Stego System for Securing Graph Data Using Association Schemes," Journal of Applied Mathematics, vol. 2024, no. 1, Jan. 2024, Art. no. 2084342. DOI: https://doi.org/10.1155/2024/2084342

M. Kaur et al., "EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT," IEEE Access, vol. 11, pp. 90739–90748, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3305271

S. Rahman et al., "Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats," Sustainability, vol. 15, no. 5, Feb. 2023, Art. no. 4252. DOI: https://doi.org/10.3390/su15054252

A. Kumar, R. Rani, and S. Singh, "Encoder-Decoder Architecture for Image Steganography using Skip Connections.," Procedia Computer Science, vol. 218, pp. 1122–1131, 2023. DOI: https://doi.org/10.1016/j.procs.2023.01.091

Y. Y. Abdullahi, L. G. Farouk, A. S. Nur, and A. Sale, "Proposition of a Better Data Security Model for a Protective Information Exchange on the Internet with Advanced Steganographic and Cryptographic Algorithm," Journal of Applied Sciences and Environmental Management, vol. 28, no. 10, pp. 3013–3018, Oct. 2024. DOI: https://doi.org/10.4314/jasem.v28i10.8

V. Smith, M. Mendoza, and I. Ullah, "Data Security Techniques Using Vigenere Cipher And Steganography Methods In Inserting Text Messages In Images," Journal of Information Systems and Technology Research, vol. 3, no. 3, pp. 92–100, Sept. 2024. DOI: https://doi.org/10.55537/jistr.v3i3.867

H. Y. Naser, A. K. Mattar, M. A. Saare, M. A. Almaiah, and R. Shehab, "A Comparison of Lightweight Cryptographic Protocols for Energy-Efficient and Sustainable IoMT Authentication," Engineering, Technology & Applied Science Research, vol. 15, no. 4, pp. 25746–25756, Aug. 2025. DOI: https://doi.org/10.48084/etasr.12204

BOSSBASE. (1.01),. [Online]. Available: https://dde.binghamton.edu/download/.

Downloads

How to Cite

[1]
R. Padma and V. Yendapalli, “Hybrid Asymmetric Cryptography and Modified Cosine Wavelet Transform-Based Steganography Using Convolutional Autoencoder for Secure Data Sharing”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 1, pp. 32753–32760, Feb. 2026.

Metrics

Abstract Views: 105
PDF Downloads: 75

Metrics Information