A secure image steganography framework for covert communication using asymmetric encryption and Huffman Compression

Authors

  • Aulia Khamas Heikhmakhtiar Universitas Pertahanan Republik Indonesia, Bogor, Indonesia Author
  • Nadiza Lediwara Universitas Pertahanan Republik Indonesia, Bogor, Indonesia Author
  • Sembada Denrineksa Bimorogo Universitas Pertahanan Republik Indonesia, Bogor, Indonesia Author

Keywords:

Asymmetric communication, Covert Communication, Huffman Compression, Information Security, Steganography

Abstract

This paper presents a secure data-hiding framework that combines asymmetric key cryptography, lossless data compression, and image steganography to enhance the confidentiality and imperceptibility of hidden communications. The proposed method encrypts the secret message using an asymmetric encryption scheme, compresses the resulting ciphertext using Huffman coding, and embeds the compressed data into a digital image using a spatial-domain steganographic technique. This multi-layered approach ensures that both the existence and the content of the secret message are protected. Experimental evaluations were conducted using standard image quality metrics, including Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index Measure (SSIM), to assess visual imperceptibility, along with performance analysis to evaluate computational overhead. The results demonstrate that the proposed method achieves high image quality with minimal distortion while maintaining strong cryptographic security. The integration of compression effectively reduces embedding payload, further improving steganographic performance. The findings indicate that the proposed framework provides a robust and practical solution for secure and covert data transmission.

References

Ahmed, M., & Abed, F. (2022). A hybrid cryptography–steganography approach for secure data communication. Journal of Information Security and Applications, 66, 103161.

Ahmed, N., & Abdullah, M. (2021). Improving image steganography using compression and encryption techniques. Journal of Information Security and Applications, 61, 102933.

alfo1995. (2026). Huffman-Algorithm.

Alkhliwi, S. (2023). Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research, 13(2), 10453–10459.

Almazaydeh, W. I. A., Sheshadri, H. S., & Padma, S. K. (2018). A novel approach of image steganography for secret communication using spacing method. International Journal of Computer Networks & Communications (IJCNC).

Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M., Levi, M., Moore, T., & Savage, S. (2020). Measuring the cost of cybercrime. Journal of Cybersecurity, 6(1), 1–19.

Ashari, I. F. (2022). The evaluation of audio steganography to embed image files using encryption and Snappy compression. The Indonesian Journal of Computer Science, 11(2), 3050.

Bernstein, D. J., & Bhargavan, K. (2020). The security impact of RSA padding schemes. IEEE Security & Privacy, 18(3), 38–45.

Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2020). Digital image steganography: Survey and analysis of current methods. Signal Processing, 176, 107676.

Elshamy, [Authors as per article]. (2024). Image Steganography: A Comparative and Practical Study. International Journal of Intelligent Computing and Information Sciences, 24(2), 41–57. https://doi.org/10.21608/ijicis.2024.290869.1337

Gonzalez, R. C., & Woods, R. E. (2002). Digital image processing. Proceedings of the IEEE, 90(4), 716–720.

Huffman, D. A. (1952). A method for the construction of minimum-redundancy codes. Proceedings of the IRE, 40(9), 1098–1101.

Huynh-Thu, Q., & Ghanbari, M. (2008). Scope of validity of PSNR in image/video quality assessment. Electronics Letters, 44(13), 800–801.

Kahn, A., & Khan, M. A. (2021). Public key cryptography: State of the art and future challenges. Journal of Information Security and Applications, 58, 102712.

Kadhem, E. L., & Baawi, S. S. (2023). A secure and high capacity image steganography approach using Huffman coding and RSA encryption. Journal of Al-Qadisiyah for Computer Science and Mathematics, 15(2), 35–50.

Li, X., Wang, J., & Yang, Y. (2021). Secure image steganography based on adaptive embedding strategies. Journal of Visual Communication and Image Representation, 74, 102983.

Morkel, T., Eloff, J., & Olivier, M. (2005). An overview of image steganography. Information and Computer Security, 13(4), 319–331.

Nguyen, D., T. (2025). A secure image steganography based on Hamming codes and image block complexity estimation using a zig-zag order. Journal of Science and Technology on Information Security, 2(25), 21–42.

Rahman, S., Uddin, J., Hussain, H., Ahmed, A., Khan, A. A., Zakarya, M., Rahman, A., & Haleem, M. (2023). A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image. Scientific Reports, 13, 14183. https://doi.org/10.1038/s41598-023-41303-1

Ramadhan, I. F., De La Croix, N. J., Ahmad, T., & Uzamurengera, A. (2025). Huffman coding-based data reduction and quadristego logic for secure image steganography. Engineering Science and Technology, an International Journal, 65, 102033.

Ramadhan, I. F., De La Croix, N. J., Ahmad, T., & Uzamurengera, A. (2025). IRJT-Secure: Open-source image steganography with Quadristego embedding and Huffman compression. Software Impacts, 26, 100801.

Singh, R., & Verma, A. (2023). Enhancing multimedia security using asymmetric encryption and image steganography. Multimedia Tools and Applications, 82(7), 10423–10445.

Stallings, W. (2019). Cryptography and network security: principles and practice. IEEE Security & Privacy, 17(2), 88–91.

Susanto, A., Sinaga, D., & Mulyono, I. U. W. (2024). PSNR and SSIM Performance Analysis of Schur Decomposition for Imperceptible Steganography. Scientific Journal of Informatics, 11(3), 803–810. https://doi.org/10.15294/sji.v11i3.9561

Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4), 600–612.

Wijayanto, E. F., Zarlis, M., & Situmorang, Z. (2018). Increase the PSNR of image using LZW and AES algorithm with MLSB on steganography. International Journal of Engineering and Technology, 7(2.5), 119–121.

j166

Downloads

Published

2026-01-31

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)