• Abstract

    Data security in modern communication systems is paramount, with sensitive information requiring robust encryption and secure transmission. Recent statistics highlight a 34% rise in data breaches over the last two years and an estimated global loss of $10.5 trillion annually by 2025 due to cybercrime. Existing cryptographic methods often face challenges in balancing computational efficiency, encryption robustness, and adaptability to multi-domain operations. To address these gaps, this paper proposes a novel multi-layered security framework. Initially, the message is split into two segments. The first segment undergoes encryption using the Authenticated. Encryption and Hashing Lightweight Cryptographic (AEHLC) algorithm, ensuring lightweight and efficient protection. The second segment is secured using the Cryptographic Suite for Algebraic Lattices with Digital Signatures (CSAL-DS) algorithm, leveraging advanced lattice-based cryptographic structures. Both encrypted segments are concatenated for comprehensive security. Further, a Dual-Domain Contourlet and Shearlet Transform (DDCST) is employed for watermarking the cover and source images, enhancing the integration of visual security. Lastly, Graph Fourier Transform (GFT) is utilized to embed the encrypted message within the watermarked image, completing the steganographic process. This methodology not only fortifies data confidentiality and integrity but also ensures high imperceptibility and robustness against steganalysis and cryptographic attacks.

  • References

    1. Murhty, G. K., & Kanimozhi, T. (2024). Methodologies in Steganography and Cryptography–Review. Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough: Volume 4, 205-214.
    2. u, Kun, Mingpei Wang, Xiaohui Ma, Jia Chen, Xiaochao Wang, and Xingjun Wang. "Learning-based image steganography and watermarking: A survey." Expert Systems with Applications (2024): 123715.
    3. Haverkamp, I. and Sarmah, D.K., 2024. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis. International Journal of Information Security, pp.1-29.
    4. Bachiphale, Pramod M., and Nitish S. Zulpe. "A comprehensive review of visual cryptography for enhancing high-security applications." Multimedia Tools and Applications (2024): 1-23.
    5. Singh, Dilbag, Sharanpreet Kaur, Mandeep Kaur, Surender Singh, Manjit Kaur, and Heung-No Lee. "A systematic literature review on chaotic maps-based image security techniques." Computer Science Review 54 (2024): 100659.
    6. Aljarf, A., Zamzami, H., & Gutub, A. (2024). Is blind image steganalysis practical using feature-based classification?. Multimedia Tools and Applications, 83(2), 4579-4612.
    7. Al-Bayati, Hajir Alauldeen, Lahieb M. Jawad, and Dalal N. Hamod. "Exploring Visual Cryptography Techniques: A Comprehensive Review." Al-Nahrain Journal of Science 27, no. 3 (2024): 97-108.
    8. Zhang, Xin, Kejiang Chen, Jinyang Ding, Yuqi Yang, Weiming Zhang, and Nenghai Yu. "Provably secure public-key steganography based on elliptic curve cryptography." IEEE Transactions on Information Forensics and Security (2024).
    9. Aala, Suresh, Eswar Panchakarla, Rohith Kumar Ankam, Prudhvi Krishna Pavuluri, and Sunil Chinnadurai. "Steganographic Data Encryption Technique using Hyperspectral Imaging: A Deceptive Approach." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1-6. IEEE, 2024.
    10. Zainal, Nasharuddin, Alaa Rishek Hoshi, Mahamod Ismail, Abd Al-Razak T. Rahem, and Salim Muhsin Wadi. "A hybrid steganography and watermark algorithm for copyright protection by using multiple embedding approaches." Bulletin of Electrical Engineering and Informatics 13, no. 3 (2024):1877-1896.
    11. Pekerti, Albertus Anugerah, Arif Sasongko, and Adi Indrayanto. "Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques." IEEE Access (2024).
    12. Sailaja, K., Madhavi, N., Sreeramamurthy, K., Murala, D., Ashwini, K. and Vanguru, S., 2024. An Efficient And Secure Data Hiding Technique: Video Steganography. Library Progress International, 44(3), pp.15912-15924.
    13. Abdellatef, Essam, and Fath Allah. "MA DWT versus DCT Based Hybrid Steganography and Watermarking Technique for Color Image Encryption." SINAI International Scientific Journal (SISJ) 1 (2024): 33-57.
    14. Battula, Tirumala Krishna, Harikishore Neerukattu, and Aruna Kukkala. "DRPE Image Encryption with Watermarking Using 2D-FrFT and Its Invariance Property: A Fusion-Based Hybrid Approach." In 2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN), pp. 17- 22. IEEE, 2024.
    15. Ghrare, Seddeq E., Maisem A. Abouras, and Ibrahim A. Akermi. "Development of Hybrid Data Security System using LSB Steganography and AES Cryptography." African Journal of Advanced Pure and Applied Sciences (AJAPAS) (2024): 86-95.
    16. Njoum, Murad, Rossilawati Sulaiman, Zarina Shukur, and Faizan Qamar. "High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution." Computers, Materials & Continua 81, no. 1 (2024).
    17. Sharma, Divya, Chander Prabha, Md Mehedi Hassan, Shahab Abdulla, Anupam Kumar Bairagi, Samah Alshathri, and Walid El-Shafai. "Securing X-Ray Images into Cover Images Using Hybrid EBS Steganography with Five-Layer Cryptography." IEEE Access (2024).
    18. Shaik, Sameerunnisa, and J. Jabez. "Associated Video Frame Steganography Model based on Frame Integrity Verification using GAN Network." In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC), pp. 728-735. IEEE, 2024.
    19. Chen, Niusen, Bo Chen, and Weisong Shi. "An application-layer plausibly deniable encryption system for wearable devices." Discover Internet of Things 4, no. 1 (2024): 9. Abed, Ali Mohammed, Houcemeddine Hermassi, and Walid Barhoumi. "A New Encryption-Based Algorithm for Embedded Image Steganography." International Journal of Sociotechnology and
    20. Knowledge Development (IJSKD) 16, no. 1 (2024): 1-28.
    21. Bodke, Minal, and Sangita Chaudhari. "Remote Sensing Image Watermarking using Archimedes Optimization Algorithm and Discrete Cosine Transform." In IGARSS 2024-2024 IEEE International Geoscience and Remote Sensing Symposium, pp. 9206-9209. IEEE, 2024.
    22. Singh, Mandeep, and Albert Carlson. "Watermarking Using Polymorphic Algorithms for Increased Data Security." In 2024 IEEE World AI IoT Congress (AIIoT), pp. 237-243. IEEE, 2024.
    23. Rupa, Ch, R. Pavan Malleswari, Sk Arshiya Sultana, Mohamed Abbas, and Aditya Kumar Sahu. "Data Privacy Protection Using Lucas Series based Hybrid Reversible Watermarking Approach." IEEE Access (2024).
    24. Fernando, Yusra, Dedi Darwis, Abhishek R. Mehta, Wamiliana Wamiliana, and Agus Wantoro. "A New Approach of Steganography on Image Metadata." JOIV: International Journal on Informatics Visualization 8, no. 2 (2024): 968-976.
    25. Rajabi-Ghaleh, Sajjad, Babak Olyaeefar, Reza Kheradmand, and Sohrab Ahmadi-Kandjani. "Image security using steganography and cryptography with sweeping computational ghost imaging." Frontiers in Physics 12 (2024): 1336485.
    26. Zhang, Leihong, Yiqiang Zhang, Runchu Xu, Yangjun Li, and Dawei Zhang. "Research on Equal- resolution Image Hiding Encryption Based on Image Steganography and Computational Ghost Imaging." Current Optics and Photonics 8, no. 3 (2024): 270-281.
    27. Hameed, Mohamed Abdel, M. Hassaballah, and Tong Qiao. "IS-DGM: an improved steganography method based on a deep generative model and hyper logistic map encryption via social media networks." Multimedia Systems 30, no. 3 (2024): 129.
    28. Fadhil, Fadhil Abbas, Farah Tawfiq Abdul Hussien, Teba Walaa Aldeen Khairi, and Nikolai Safiullin.
    29. "A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm." Baghdad Science Journal 21, no. 7 (2024): 2485-2485.
    30. Shirole, Rashmi, and Shiva Murthy Govind Swamy. "Intensity-based randomised image steganography technique with novel AES encryption." International Journal of Information and Computer Security 25, no. 1-2 (2024): 167-188.
    31. Ramyashree, Venugopala PS, and Sarojadevi. "Optimal Information Hiding: Advanced Bitstream‐Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos." Journal of Engineering 2024, no. 1 (2024): 8860475.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2024 K.U.V. Padma, E. Neelima

How to cite

Padma, K., & Neelima, E. (2025). Adaptive lightweight cryptographic framework for data transmission using multi-domain transformations. Multidisciplinary Science Journal, (| Accepted Articles). https://doi.org/10.31893/multiscience.2025460
  • Article viewed - 116