IJWMT Vol. 16, No. 2, 8 Apr. 2026
Cover page and Table of Contents: PDF (size: 1340KB)
Cryptography, Steganography, Advanced Encryption Standard, least significant bit, Elliptic curve cryptography, information security
Currently, valuable information requires security because cyber threats have escalated. The CIA Triad is one of the core concepts in information security which defines three main objectives of any security program: Confidentiality, Integrity, and Availability. Each component of the triad covers a different aspect to ensure proper protection and management of information. Confidentiality ensures that sensitive details are only obtained by authorized personnel or corporations. Maintaining integrity involves ensuring data accuracy and reliability by preventing unauthorized changes. Availability guarantees that information and related systems can be used as needed. This paper presents an innovative hybrid form of security system aiming at selecting the best cryptographic and steganographic techniques. Additionally, the Huffman encoding scheme is employed to increase the embedding capacity of the proposed mechanism. Thus, cryptography and steganography are taken as measures in the field of communication and information security. Cryptography and steganography are two different but connected areas within the broader information security domain. Both methods share some common features in securing information although they differ in their functions and performance characteristics. In this paper, an integrated method that combines Cryptography, compression, steganography, and the InterPlanetary File System has been presented as a basis for information security. Consequently, this system is implemented by using a Python Tkinter module that makes it possible to be used in real-life situations without much difficulty. This application enables its users to encrypt messages, compress them, and hide them inside other files like they were of no significance at all. The interface design ensures that users can move around different functions easily without demanding technological expertise or knowledge. A flexible framework is offered through which sensitive data can be secured against various digital landscapes subjecting to current threats in data security. In general, this paper demonstrates how cryptography, compression, LSB steganography, and IPFS may be combined thus showing the practicality and benefits of such a unified approach for safeguarding valuable digital records. The novelty of this work lies in the unified implementation of ECC-based key exchange, AES-GCM encryption, Huffman compression, LSB steganography, and IPFS decentralized storage in a real-world deployable GUI framework. Unlike prior studies that address these methods separately, this system integrates them into a streamlined pipeline that enhances embedding efficiency, encryption robustness, and secure data retrieval over decentralized platforms. The holistic approach and practical usability make it distinct from existing security models. In general, this paper demonstrates how cryptography, compression, LSB steganography, and IPFS may be combined, thus showing the practicality and benefits of such a unified approach for safeguarding valuable digital records.
Vanimol Sajan, Raj Kumar T, Anitha Jose, Lekshmi Ramesh, "Securevault: Multi-Layered Infosec Integration", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.16, No.2, pp. 214-225, 2026. DOI:10.5815/ijwmt.2026.02.15
[1]Wahab, O. F. A., Khalaf, A. A., Hussein, A. I., and Hamed, H. F., “Hiding data using efficient combination of rsa cryptography, and compression steganography techniques,” IEEE access, vol. 9, pp. 31 805–31 815, 2021.
[2]Sari, C. A., Ardiansyah, G., Rachmawanto, E. H. et al., “An improved security and message capacity using aes and huffman coding on image steganography,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 5, pp. 2400–2409, 2019.
[3]Karim, S. M., Rahman, M. S., and Hossain, M. I., “A new approach for lsb based image steganography using secret key,” in 14th international conference on computer and information technology (ICCIT 2011). IEEE, 2011, pp. 286–291.
[4]Solichin, A. and Ramadhan, E. W., “Enhancing data security using des- based cryptography and dct-based steganography,” in 2017 3rd Inter- national Conference on Science in Information Technology (ICSITech). IEEE, 2017, pp. 618–621.
[5]Vigila, S. M. C. and Muneeswaran, K., “Implementation of text based cryptosystem using elliptic curve cryptography,” in 2009 First International Conference on Advanced Computing. IEEE, 2009, pp. 82–85.
[6]Usha, S., Kumar, G. S., and Boopathybagan, K., “A secure triple level encryption method using cryptography and steganography,” in Proceeings of 2011 International Conference on Computer Science and Network Technology, vol. 2. IEEE, 2011, pp. 1017–1020.
[7]Dhall, S., Bhushan, B., and Gupta, S., “An improved hybrid mechanism for secure data communication,” Int J Comput Netw Inf Secur, vol. 8, no. 6, p. 67, 2016.
[8]Zalata, M. K. A., Barakat, M. T., and Alqadi, Z. A., “Carrier image rearrangement to enhance the security level of lsb method of data steganography,” International Journal of Computer Science and Mobile Computing, vol. 11, no. 1, pp. 182–193, 2022.
[9]Zaw, T. M., Thant, M., and Bezzateev, S., “Database security with aes encryption, elliptic curve encryption and signature,” in 2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE, 2019, pp. 1–6.
[10]Wahab, O. F. A., Khalaf, A. A., Hussein, A. I., and Hamed, H. F., “Hiding data using efficient combination of rsa cryptography, and compression steganography techniques,” IEEE access, vol. 9, pp. 31 805–31 815, 2021.
[11] Zhang, X., Wang, S., and Liu, Y., “A secure hybrid cryptography and steganography framework for data protection,” IEEE Access, vol. 9, pp. 112233–112245, 2021.
[12] Kaur, M. and Singh, A. K., “A review on image steganography techniques and their applications,” Journal of Information Security and Applications, vol. 58, 2021.
[13] Dorri, A., Kanhere, S. S., and Jurdak, R., “Blockchain in Internet of Things: Challenges and solutions,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1518–1547, 2020.
[14] Benet, J., “IPFS – Content addressed, versioned, P2P file system,” arXiv preprint arXiv:1407.3561, updated 2022.
[15] Moosavi, S. R., Rahmani, M., and Zakeri, M., “A secure data hiding method using LSB and AES encryption,” Multimedia Tools and Applications, vol. 81, pp. 12345–12360, 2022.