A Hybrid Approach to Data Security Using Steganography and Blockchain for Tamper-Proof Communication

Authors

  • Prashant Prashant Assistant Professor, Department of Computer Science and Application, COER University, Roorkee Author
  • Shashank Jha Assistant Professor, Department of Computer Science and Application, COER University, Roorkee. Author
  • Beer Singh Assistant Professor department of Computer Application, Shree Ramswaroop Memorial College of Engineering and Management Lucknow Author
  • Gesu thakur Professor, Department of Computer Science and Application, COER University, Roorkee. Author

DOI:

https://doi.org/10.70454/JRIST.2025.10103

Keywords:

steganography, cryptographic, blockchain, Hybrid Approach, Tamper-Proof Communication

Abstract

In the data security the cryptography and steganography could be usefull for data security individually. But individual these security techniques are not enough to provide sufficient data security. In this paper we have shows that steganography and blockchain are used together to hide encrypted data inside image. The proposed method will solve two major drawbacks of the current existing security techniques, the large size of ciphertext imbedded into an image and other is to provide integrity and authenticity are guaranteed by blockchain, because it provide unalterable ledger and cryptographic hashes. Tamper detection will guaranteed through verification of the extract messages’s hash against blockchain data.

References

[1] Rajguru, S. S., Singh, G., Malhi, S. S., &Kaur, G. (2024). Stenographic Approaches for Enhancing Data Security in Cloud Computing. In E3S Web of Conferences (Vol. 556, p. 01012). EDP Sciences.https://doi.org/10.1051/e3sconf/202455601012

[2] Arunachalam, A., Seetharaman, K., &Agarwal, A. (2021). Design and Development of a Cyber Security Framework for National Time Dissemination. SN Computer Science, 2, 1-12.https://doi.org/10.1007/s42979-021-00471-5

[3] Wang, Z., Byrnes, O., Wang, H., Sun, R., Ma, C., Chen, H., ...&Xue, M. (2023). Data hiding with deep learning: A survey unifying digital watermarking and steganography. IEEE Transactions on Computational Social Systems, 10(6), 2985-2999.https://doi.org/10.1109/TCSS.2023.3268950

[4] Chowdary, H., Karan, K., Bharath, K. P., & Kumar, R. (2018, May). Data hiding in speech signal using steganography and encryption. In 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1219-1223). IEEE.https://doi.org/10.1109/RTEICT42901.2018.9012508

[5] Prashar, N., Hooda, S., & Kumar, R. (2022, December). Current status of challenges in data security: A review. In International conference on cybersecurity in emerging digital era (pp. 3-13). Singapore: Springer Nature Singapore.https://doi.org/10.1007/978-981-99-5080-5_1

[6] Sharma, D. P., HabibiLashkari, A., &Parizadeh, M. (2024). Data and Information Security. In Understanding Cybersecurity Management in Healthcare: Challenges, Strategies and Trends (pp. 55-83). Cham: Springer Nature Switzerland.https://doi.org/10.1007/978-3-031-68034-2_4

[7] Jajodia, S., Samarati, P., & Yung, M. (Eds.). (2019). Encyclopedia of Cryptography, Security and Privacy.https://doi.org/10.1007/978-3-030-71522-9_300005

[8] Adee, R., &Mouratidis, H. (2022). A dynamic four-step data security model for data in cloud computing based on cryptography and steganography. Sensors, 22(3), 1109.https://doi.org/10.3390/s22031109

[9] Abbas, M. S., Mahdi, S. S., &Hussien, S. A. (2020, April). Security improvement of cloud data using hybrid cryptography and steganography. In 2020 international conference on computer science and software engineering (CSASE) (pp. 123-127). IEEE.https://doi.org/10.1109/CSASE48920.2020.9142072

[10] Madavi, K. B., &Karthick, P. V. (2021, November). Enhanced cloud security using cryptography and steganography techniques. In 2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON) (Vol. 1, pp. 90-95). IEEE.https://doi.org/10.1109/CENTCON52345.2021.9687919

[11] Pant, V. K., Prakash, J., &Asthana, A. (2015, October). Three step data security model for cloud computing based on RSA and steganography. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (pp. 490-494). IEEE,https://doi.org/10.1109/ICGCIoT.2015.7380514

[12] Chatterjee, P., Bose, R., Banerjee, S., & Roy, S. (2023). Enhancing data security of cloud based lms. Wireless Personal Communications, 130(2), 1123-1139.https://doi.org/10.1007/s11277-023-10323-5

[13] Dudiki, N., Sangeetha, S., Manna, A., Pokhariyal, R., Mohanaprakash, T. A., &Srivastava, A. P. (2022, December). A Hybrid Cryptography Algorithm to Improve Cloud Computing Security. In 2022 5th International Conference on Contemporary Computing and Informatics (IC3I) (pp. 1020-1023). IEEE.https://doi.org/10.1109/IC3I56241.2022.10072437

[14] Abel, K. D., Misra, S., Agrawal, A., Maskeliunas, R., &Damasevicius, R. (2022). Data security using cryptography and steganography technique on the cloud. In Computational Intelligence in Machine Learning: Select Proceedings of ICCIML 2021 (pp. 475-481). Singapore: Springer Nature Singapore.https://doi.org/10.1007/978-981-16-8484-5_46

[15] Pandey, U., Rajput, M., & Singh, R. (2023, January). Role of Machine Learning in Resource Usages and Security Challenges for Cloud Computing: Survey. In 2023 International Conference on Artificial Intelligence and Smart Communication (AISC) (pp. 525-530). IEEE.https://doi.org/10.1109/AISC56616.2023.10085687

[16] Weng, C. Y., Weng, H. Y., & Huang, C. T. (2024). Expansion high payload imperceptible steganography using parameterized multilayer EMD with clock-adjustment model. EURASIP Journal on Image and Video Processing, 2024(1), 37.https://doi.org/10.1186/s13640-024-00653-0

[17] Zhanga, S., Xiaob, Y., Tianc, H., & Lid, X. (2025). A multi-image steganography: ISS. Cybersecurity, 8(1), 20.https://doi.org/10.1186/s42400-024-00333-6

[18] Gnanalakshmi, V., &Indumathi, G. (2023). A review on image steganographic techniques based on optimization algorithms for secret communication. Multimedia Tools and Applications, 82(28), 44245-44258.DOI:10.1007/s11042-023-15568-7

[19] Kumbhakar, D., Sanyal, K., &Karforma, S. (2023). An optimal and efficient data security technique through crypto-stegano for E-commerce. Multimedia Tools and Applications, 82(14), 21005-21018.https://doi.org/10.1007/s11042-023-14526-7

[20] Wang, Z., Byrnes, O., Wang, H., Sun, R., Ma, C., Chen, H., ...&Xue, M. (2023). Data hiding with deep learning: A survey unifying digital watermarking and steganography. IEEE Transactions on Computational Social Systems, 10(6), 2985-2999.https://doi.org/10.1109/TCSS.2023.3268950

[21] Pang, K. (2025). Provable Secure Steganography Based on Adaptive Dynamic Sampling. arXiv preprint arXiv:2504.12579.https://doi.org/10.48550/arXiv.2504.12579

[22] Omego, O., &Bosy, M. (2025). Multichannel Steganography: A Provably Secure Hybrid Steganographic Model for Secure Communication. arXiv preprint arXiv:2501.04511.https://doi.org/10.48550/arXiv.2501.04511

[23] Wang, Z., Byrnes, O., Wang, H., Sun, R., Ma, C., Chen, H., ...&Xue, M. (2023). Data hiding with deep learning: A survey unifying digital watermarking and steganography. IEEE Transactions on Computational Social Systems, 10(6), 2985-2999.https://doi.org/10.1109/TCSS.2023.3268950

[24] Butt, R., Tariq, N., Ashraf, M., Humayun, M., &Shaheen, M. (2025). Collaborative Defense: Federated Learning for Intrusion Detection Systems. In Federated Learning Systems: Towards Privacy-Preserving Distributed AI (pp. 147-165). Cham: Springer Nature Switzerland, https://doi.org/10.1007/978-3-031-78841-3_8

[25] Tariq, N., Alsirhani, A., Humayun, M., Alserhani, F., &Shaheen, M. (2024). A fog-edge-enabled intrusion detection system for smart grids. Journal of Cloud Computing, 13(1), 43 https://doi.org/10.1186/s13677-024-00609-9

[26] Saeed, F., Shaheen, M., Umer, T., Farooq, M.S. (2025). Employing Federated Learning for the Implication of Digital Twin. In: Afzal, M.K., Naeem, M., Ejaz, W. (eds) Digital Twins for Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-031-73679-7_5

[27] Jawad, M., Iftikhar, S., Khan, R.A., Suleman, M.T., Umer, T., Shaheen, M. (2024). IoT-Driven Smart Housing: Strengthening Housing Society Automation Through Secure and Futuristic Networks. In: Rasheed, J., Abu-Mahfouz, A.M., Fahim, M. (eds) Forthcoming Networks and Sustainability in the AIoT Era. FoNeS-AIoT 2024. Lecture Notes in Networks and Systems, vol 1036. Springer, Cham. https://doi.org/10.1007/978-3-031-62881-8_25

[28] Ahmad, F., Najam, A., & Ahmed, Z. (2013). Image-based face detection and recognition:" state of the art".arXiv preprint arXiv:1302.6379 https://doi.org/10.48550/arXiv.1302.6379

[29] Shahzad, A., Chen, W., Shaheen, M., Zhang, Y., & Ahmad, F. (2024). A robust algorithm for authenticated health data access via blockchain and cloud computing. Plos one, 19(9), e0307039 https://doi.org/10.1371/journal.pone.0307039

[30] Ahmad, F., &Najam, A. (2012, October). Video-based face classification approach: A survey. In 2012 International Conference of Robotics and Artificial Intelligence (pp. 179-186). IEEE https://doi.org/10.1109/ICRAI.2012.6413396

[31] Tahir, S., Hafeez, Y., Humayun, M., Ahmad, F., Khan, M., &Shaheen, M. (2024). Harnessing hybrid deep learning approach for personalized retrieval in e-learning. PloS one, 19(11), e0308607 https://doi.org/10.1371/journal.pone.0308607

[32] Seth, A. (2025). Attack and Anomaly Detection in IoT Sensors Using Machine Learning Approaches. Journal of Recent Innovations in Computer Science and Technology, 2(1), 16–27. https://doi.org/10.70454/JRICST.2025.20108

[33] Kumar, A., & Kumar, K. (2025). Facial Recognition and Object Detection using Machine learning. Journal of Recent Innovations in Computer Science and Technology, 2(2), 39-48. https://doi.org/10.70454/JRICST.2025.20214

[34] Ahmad, N., Feroz, I., Ahmad, F. (2024). Creating Synthetic Test Data by Generative Adversarial Networks (GANs) for Mobile Health (mHealth) Applications. In: Rasheed, J., Abu-Mahfouz, A.M., Fahim, M. (eds) Forthcoming Networks and Sustainability in the AIoT Era. FoNeS-AIoT 2024. Lecture Notes in Networks and Systems, vol 1035. Springer, Cham. https://doi.org/10.1007/978-3-031-62871-9_25.

[35] Ahmad, F., Najam, A., & Ahmed, Z. (2013). Image-based face detection and recognition: State of the art. arXiv. https://doi.org/10.48550/arXiv.1302.6379

[36] Ahmad, F., &Najam, A. (2012). Video-based face classification approach: A survey. In ICRAI 2012 (pp. 179–186). IEEE. https://doi.org/10.1109/ICRAI.2012.6413396

Downloads

Published

2025-09-20

Issue

Section

Articles

How to Cite

A Hybrid Approach to Data Security Using Steganography and Blockchain for Tamper-Proof Communication. (2025). Journal of Recent Innovation in Science and Technology , 1(1), 21-37. https://doi.org/10.70454/JRIST.2025.10103