IJITCS Vol. 18, No. 1, 8 Feb. 2026
Cover page and Table of Contents: PDF (size: 2110KB)
PDF (2110KB), PP.14-41
Views: 0 Downloads: 0
Huffman Coding, Compression, Cloud, Cryptography, Stego, Image
In this rapidly progressing technological age, the likelihood of transmitting inadequately secured data in the cloud is high. Over the past several decades, experts in data and information security have tested and experimented with numerous hashing combinations. However, these have proven to be insufficient in preventing the interception and decoding of confidential text during transmission. Therefore, methodologically, in this current research, cryptography and steganography is diversified into using three different encryption algorithms of RSA, AES and LSB with further compressing of the to-be-communicated data, to enable the use of limited space in the cloud, as well as permit fast and quick embedded message transmission. The proposed architecture, EdSri has been implemented and tested against few existing models and found to show improved performance in terms of measured security metrics such as password strength, time between login attempts, login attempt rate, failed login attempt rate, device and browser fingerprinting, and also, measuring compression parameters like structural similar index, compression time, compression ratio, compression speed, bit per pixel, saving percentage, mean squared error, and peak to noise signal ratio, EdSri would hopefully become viable platform for exchanging secured information among the cloud communicators when hosted.
Edwin Xorsenyo Amenu, Sridaran Rajagopal., "EdSri: An Enhanced Approach Towards Optimizing Cloud Communication by Hybridizing Cryptography and Steganography with Huffman Compression Method", International Journal of Information Technology and Computer Science(IJITCS), Vol.18, No.1, pp.14-41, 2026. DOI:10.5815/ijitcs.2026.01.02
[1]C. Wu, A. N. Toosi, R. Buyya, and K. Ramamohanarao, “Hedonic Pricing of Cloud Computing Services,” IEEE Trans. Cloud Computing., vol. 9, no. 1, pp. 182–196, 2021, doi: 10.1109/TCC.2018.2858266.
[2]M. A. Islam, M. A. -A. K. Riad and T. S. Pias, "Enhancing Security of Image Steganography Using Visual Cryptography," 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh, 2021, pp. 694-698, doi: 10.1109/ICREST51555.2021.9331225.
[3]K. C. Nunna and R. Marapareddy, “Secure data transfer through internet using cryptography and image steganography,” Conf. Proc. - IEEE SOUTHEASTCON, vol. 2, 2020, doi: 10.1109/SoutheastCon44009.2020.9368301.
[4]S. Selvarajan, M. Mohan, and B. R. Chandavarkar, “Techniques to Secure Address Resolution Protocol,” 2020 11th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT 2020, 2020, doi: 10.1109/ICCCNT49239.2020.9225413.
[5]M. Guillermo et al., “Implementation of Automated Annotation through Mask RCNN Object Detection model in CVAT using AWS EC2 Instance,” IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON, vol. 2020-Novem, pp. 708–713, 2020, doi: 10.1109/TENCON50793.2020.9293906.
[6]B. Bharathkumar, S. Logeswar, S. Sudharsun, and B. Karthikeyan, “An Enhanced Triple Prime Encryption Approach for Image Encryption in LSB Steganography,” 2023 1st Int. Conf. Adv. Electr. Electron. Comput. Intell. ICAEECI 2023, pp. 24–27, 2023, doi: 10.1109/ICAEECI58247.2023.10370817.
[7]F. Al-Shaarani and A. Gutub, “Securing matrix counting-based secret-sharing involving crypto steganography,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 9, pp. 6909–6924, 2021, doi: 10.1016/j.jksuci.2021.09.009.
[8]L. Negi and L. Negi, “Image Steganography Using Steg with AES and LSB,” 7th Int. Conf. Comput. Eng. Des. ICCED 2021, pp. 4–7, 2021, doi: 10.1109/ICCED53389.2021.9664834.
[9]M. Tahir, M. Sardaraz, Z. Mehmood, and S. Muhammad, “CryptoGA: a cryptosystem based on genetic algorithm for cloud data security,” Cluster Comput., vol. 24, no. 2, pp. 739–752, 2021, doi: 10.1007/s10586-020-03157-4.
[10]T. R. Prasad and J. Naulegari, "Investigation of symmetric and asymmetric eye patterns for bell’s palsy diagnosis," 2023 OITS International Conference on Information Technology (OCIT), Raipur, India, 2023, pp. 655-659, doi: 10.1109/OCIT59427.2023.10431126.
[11]N. Kshetri and N. York, “algoTRIC: Symmetric and asymmetric encryption algorithms for Cryptography - A comparative analysis in AI era,” no. December, pp. 1–18, 2024. https://doi.org/10.48550/arXiv.2412.15237
[12]B. Preksha, R. Harish, B. Sreenivas, and M. Vasanthalakshmi, “Image Steganography using RSA Algorithm for Secure Communication,” 2021 IEEE Int. Conf. Mob. Networks Wirel. Commun. ICMNWC 2021, pp. 4–7, 2021, doi: 10.1109/ICMNWC52512.2021.9688352.
[13]A. Ahyuna, S. Syamsuddin, H. Hasriani, A. Ardimansyah, I. Irmawati, and S. Wahyuni, “The Application of LSB Steganography for Secure Text and Hiding Confidential Information Using AES Cryptography,” 3rd Int. Conf. Cybern. Intell. Syst. ICORIS 2021, pp. 10–13, 2021, doi: 10.1109/ICORIS52787.2021.9649497.
[14]C. L. Krishna, P. Anudeep, C. S. N. V. S. V. Lakshmi, M. V. P. C. S. Rao, S. V. Chereddy, and B. R. Krishna, “Concealment of Data using RSA Cryptography and Steganography Techniques,” Proc. 2023 2nd Int. Conf. Electron. Renew. Syst. ICEARS 2023, no. April, pp. 778–783, 2023, doi: 10.1109/ICEARS56392.2023.10085355.
[15]T. S. Deepak and V. Enireddy, “High Payload Capacity using Steganography Combined with Cryptography,” Proc. 5th Int. Conf. I-SMAC (IoT Soc. Mobile, Anal. Cloud), I-SMAC 2021, pp. 1448–1453, 2021, doi: 10.1109/I-SMAC52330.2021.9640859.
[16]A. Gopinath and M. Ravisankar, “Comparison of Lossless Data Compression Techniques,” in Proceedings of the 5th International Conference on Inventive Computation Technologies, ICICT 2020, Institute of Electrical and Electronics Engineers Inc., Feb. 2020, pp. 628–633. doi: 10.1109/ICICT48043.2020.9112516.
[17]Y. Wu, S. Xu, and C. Xi, “A Dynamic and Parallel Two-Stage Lossless Data Compression Method for Smart Grid,” IEEE Access, vol. 11, no. November, pp. 143475–143485, 2023, doi: 10.1109/ACCESS.2023.3343436.
[18]S. Abed, N. H. Al-Huwais, Y. A. Atiyah, S. Parvin, and A. Gawanmeh, “An Improved Least Significant Bit Image Steganography Method,” in 2020 4th International Conference on Multimedia Computing, Networking and Applications, MCNA 2020, Institute of Electrical and Electronics Engineers Inc., Oct. 2020, pp. 90–96. doi: 10.1109/MCNA50957.2020.9264299.
[19]A. K. Jha, A. Shankar, R. R. Borana, and C. Gururaj, “Compression in communication security using huffman encoding and cipher block chaining,” Proc. 2021 1st Int. Conf. Adv. Electr. Comput. Commun. Sustain. Technol. ICAECT 2021, 2021, doi: 10.1109/ICAECT49130.2021.9392490.
[20]P. Mishra, C. Bhaya, A. K. Pal, and A. K. Singh, “Compressed DNA Coding Using Minimum Variance Huffman Tree,” IEEE Commun. Lett., vol. 24, no. 8, pp. 1602–1606, Aug. 2020, doi: 10.1109/LCOMM.2020.2991461.
[21]B. Song, M. Deng, S. R. A. J. Pokhrel, Q. Lan, and R. Doss, “Digital privacy under attack: challenges and enablers”,08 November 2025. doi:10.1145/3759487
[22]W. Nie, X. Xiao, Z. Wu, Y. Wu, F. Shen, and X. Luo, “The research of information security for the education cloud platform based on appscan technology,” Proc. - 5th IEEE Int. Conf. Cyber Secur. Cloud Comput. 4th IEEE Int. Conf. Edge Comput. Scalable Cloud, CSCloud/EdgeCom 2018, pp. 185–189, 2018, doi: 10.1109/CSCloud/EdgeCom.2018.00040.
[23]M. Sharifzadeh, M. Aloraini, and D. Schonfeld, “Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography,” IEEE Trans. Inf. Forensics Secur., vol. 15, no. c, pp. 867–879, 2020, doi: 10.1109/TIFS.2019.2929441.
[24]N. F. Soliman, M. I. Khalil, A. D. Algarni, S. Ismail, R. Marzouk, and W. El-Shafai, Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication, vol. 80, no. 3. Multimedia Tools and Applications, 2021. doi: 10.1007/s11042-020-09881-8.
[25]T. Fupeng, “Research on Education Big Data Security Strategy under Network Environment,” 2021 IEEE 6th Int. Conf. Big Data Anal. ICBDA 2021, pp. 19–22, 2021, doi: 10.1109/ICBDA51983.2021.9403030.
[26]M. M. Mahmoud and H. T. Elshoush, “Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography-An Innovative Approach,” IEEE Access, vol. 10, pp. 29954–29971, 2022, doi: 10.1109/ACCESS.2022.3155146.
[27]B. Kumar Pandey et al., “Encryption and steganography-based text extraction in IoT using the EWCTS optimizer,” Imaging Sci. J., vol. 69, no. 1–4, pp. 38–56, 2021, doi: 10.1080/13682199.2022.2146885.
[28]R. Adee and H. Mouratidis, “A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography,” pp. 1–23, 2022. https://doi.org/10.3390/s22031109
[29]O. F. Abdelwahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, and A. A. M. Khalaf, “Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Steganography Techniques to Hide Data,” Procedia Comput. Sci., vol. 182, pp. 5–12, 2021, doi: 10.1016/j.procs.2021.02.002.
[30]O. F. A. Wahab, A. A. M. Khalaf, A. I. Hussein and H. F. A. Hamed, "Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques," in IEEE Access, vol. 9, pp. 31805-31815, 2021, doi: 10.1109/ACCESS.2021.3060317
[31]L. Negi, S. Kumar, and M. Bharti, “A Hybrid Data Security Technique Using Chaos Encryption, RC4 Encryption, Huffman Data Compression and LSB Steganography,” Proc. - 2nd IEEE Int. Conf. Device Intell. Comput. Commun. Technol. DICCT 2024, no. May, pp. 288–293, 2024, doi: 10.1109/DICCT61038.2024.10532929.
[32]E. Lateef and S. Shakir, “A Secure and High-Capacity Image Steganography Approach Using Huffman Coding and RSA Encryption,” vol. 15, no. 2, 2023. doi: https://doi.org/10.29304/jqcm.2023.15.2.1231
[33]S. Rahman et al., “OPEN A Huffman code LSB based image steganography technique using multi level encryption and achromatic component of an image,” Sci. Rep., pp. 1–19, 2023, doi: 10.1038/s41598-023-41303-1.
[34]A. M. Elgaier and A. M. Abushaala, "An Effect of Huffman Encoding with Hybrid Edge Detection in LSB Image Steganography," 2024 IEEE 4th International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), Tripoli, Libya, 2024, pp. 403-409, doi: 10.1109/MI-STA61267.2024.10599686.
[35]W. A. Awadh, A. S. Alasady, and A. K. Hamoud, “cryptography, and image steganography Hybrid information security system via combination of compression, cryptography, and image steganography,” no. September, pp. 6574–6584, 2022, doi: 10.11591/ijece.v12i6.pp6574-6584.
[36]A. Agrawal “CSIS_ Compressed sensingâbased enhancedâembedding capacity image steganography scheme, 2021 - IET Image Processing - Wiley Online Library.pdf.” 08 March 2021 https://doi.org/10.1049/ipr2.12161
[37]E. X. Amenu, S. Rajagopal, and I. Science, “Optimizing the Security and Privacy of Cloud Data Communication; Hybridizing Cryptography and Steganography Using Triple Key of AES, RSA and LSB with Deceptive QR Code Technique: A Novel Approach,” pp. 1–7, 2024.
[38]S. R. Raiyan, “SCR EED S OLO: A Secure and Robust LSB Image Steganography Framework with Randomized Symmetric Encryption and Reed – Solomon Coding” 10 Aug 2025, https://doi.org/10.48550/arXiv.2503.12368.
[39]S. E. Ghrare, M. A. Abouras, and I. A. Akermi, “African Journal of Advanced Pure and Applied Sciences (AJAPAS) Development of Hybrid Data Security System using LSB Steganography and AES Cryptography,” vol. 3, no. 2, pp. 86–95, 2024.
[40]Jan, A., Parah, S.A., Hussan, M. et al. Double layer security using crypto-stego techniques: a comprehensive review. Health Technol. 12, 9–31 (2022). https://doi.org/10.1007/s12553-021-00602-1
[41]M. Sites et al., “A Dynamic and Efficient Crypto-Steganography System for Securing Multiple Files in Cloud,” no. February, pp. 21–24, 2023, doi: 10.1109/KST57286.2023.10086908.
[42]N. Manohar and P. V. Kumar, “Data Encryption Decryption Using Steganography,” Proc. Int. Conf. Intell. Comput. Control Syst. ICICCS 2020, no. Iciccs, pp. 697–702, 2020, doi: 10.1109/ICICCS48265.2020.9120935.
[43]S. Sarkar and M. Nandan, "Password Strength Analysis and its Classification by Applying Machine Learning Based Techniques," 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA), Gunupur, India, 2022, pp. 1-5, doi: 10.1109/ICCSEA54677.2022.9936117
[44]L. Wang, “Design and Analysis of Network Security Access Control System,” Proc. - 2019 3rd Int. Conf. Data Sci. Bus. Anal. ICDSBA 2019, pp. 426–429, 2019, doi: 10.1109/ICDSBA48748.2019.00092.
[45]S. Wiefling, S. Thunem, and L. L. O. Iacono, “Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale,” vol. 26, no. 1, 2022, doi: 10.1145/3546069.
[46]Jan, A., Parah, S.A., Hussan, M. et al. Double layer security using crypto-stego techniques: a comprehensive review. Health Technol. 12, 9–31 (2022). https://doi.org/10.1007/s12553-021-00602-1
[47]S. S. Gujar, "Exploring Device Fingerprinting for Password-Less Authentication Systems," 2024 Global Conference on Communications and Information Technologies (GCCIT), BANGALORE, India, 2024, pp. 1-7, doi: 10.1109/GCCIT63234.2024.10862062
[48]H. Shiomi, T. Shimobaba, T. Kakue, and T. Ito, “Lossless Compression Using the Ramanujan Sums: Application to Hologram Compression,” IEEE Access, vol. 8, pp. 144453–144457, 2020, doi: 10.1109/ACCESS.2020.3014979.
[49]P. Mishra, C. Bhaya, A. K. Pal, and A. K. Singh, “Compressed DNA Coding Using Minimum Variance Huffman Tree,” IEEE Commun. Lett., vol. 24, no. 8, pp. 1602–1606, 2020, doi: 10.1109/LCOMM.2020.2991461.
[50]P. Roy, D. Roy and R. Banerjee. “A Proficient Video Compression using Block based Fragmented Cosine Transform ( BFCT ) in Wireless Multimedia Sensor Network (WMSN),” pp. 10–13, 2020, doi: 10.1109/NCETSTEA48365.2020.9119930.
[51]G. Shrividhiya, K. S. Srujana, S. N. Kashyap, and C. Gururaj, “Robust data compression algorithm utilizing LZW framework based on huffman technique,” 2021 Int. Conf. Emerg. Smart Comput. Informatics, ESCI 2021, pp. 234–237, 2021, doi: 10.1109/ESCI50559.2021.9396785.
[52]O. F. Abdelwahab, A. Steganography, I. Hussein, H. F. A. Techniques, and M. Hamdy, “ScienceDirect ScienceDirect ScienceDirect Efficient Combination RSA Cryptography, Lossless Learning of Compression Steganography Techniques to Hide Data Efficient Combination of RSA Cryptography, Lossless Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Hide Data Compression Steganography Techniques to Hide Data,” Procedia Comput. Sci., vol. 182, pp. 5–12, 2021, doi: 10.1016/j.procs.2021.02.002.
[53]R. Aswathy Krishna, N. Subramanian, and K. Jain, “Image Steganography Using HBV And Padded RSA,” ISDFS 2023 - 11th Int. Symp. Digit. Forensics Secur., no. May, pp. 11–12, 2023, doi: 10.1109/ISDFS58141.2023.10131891.
[54]M. Alanzy, R. Alomrani, B. Alqarni, and S. Almutairi, “applied sciences Image Steganography Using LSB and Hybrid Encryption Algorithms,” 2023, https://doi.org/10.3390/app132111771.
[55]D. Mehta and D. Bhatti, “Blind image steganography algorithm development which resistant against JPEG compression attack,” Multimed. Tools Appl., vol. 81, no. 1, pp. 459–479, 2022, doi: 10.1007/s11042-021-11351-8.