
A SYSTEMATIC REVIEW OF MULTI-MEDIA CRYPTOSTEGANOGRAPHY: TECHNIQUES, CONSTRAINTS, AND ARCHITECTURAL REQUIREMENTS FOR WEB DEPLOYMENT | IJCT Volume 12 – Issue 6 | IJCT-V12I6P13

International Journal of Computer Techniques
ISSN 2394-2231
Volume 12, Issue 6 | Published: November – December 2025
Table of Contents
ToggleAuthor
Kareena U, Koustubha Nagaraj, Muskaan Sheikh. Soujanya K
Abstract
The online space expands quicker all the time. That kind of expansion pulls in constant threats from folks aiming to grab data they should not touch. Regular encryption alone does not cut it anymore. We really need stronger options. Steganography covers up the very existence of any message in the first place. It gives a solid method for sharing info without anyone noticing[1]. Even so, things like the web remain wide open and easy to hit. Fresh types of attacks on networks show up regularly too. That means we must layer in tough defenses that fit together well. Such an approach keeps information secure and unaltered as it moves around. Environments full of constant surveillance or pattern hunting require nothing less.
Keywords
^KEYWORDS^
Conclusion
The development of viable covert communication systems for web development necessitates a combined Cryptosteganographic architecture, where pre-encryption messages confidentiality and integrity regardless of a successful steganalysis attack[9, 10]. Future research must prioritize adaptive algorithms that maintain low computational complexity- critical for real time web deployment- while adhering to strict media format constraints, particularly the use of uncompressed media to prevent payload destruction.
References
J. Bah l and R. Ramakishore, “LSB Technique and Its Variations Used In Audio Steganography: A Survey,” International Journal of Engineering Research & Technology (IJERT), vol. 02, no. 04, April 2013. [2]. E.G. Satish, N. Sreenivasa, E. Naresh, P. Ramesh Naidu, and A.C. Ramachandra, “Multimedia Multilevel Security by Integrating Steganography and Cryptography Techniques,” ITM Web Conf., vol. 57, 2023, Art. no. 01012. Doi: 10.1051/itmconf/20235701012. [3]. S. Rahman et al., “A novel and efficient digital image steganography technique using least significant bit substitution,” Scientific Reports, col. 15, no. 1, 2025. [4]. H Kaur and J Rani, “A Survey on different techniques of steganography,” MATEC Web of Conferences, vol. 57, 2016. [5]. M. H. Mohamed and L. M. Mohamed, “High Capacity Image Steganography Technique based on LSB Substitution Method,” Applied Mathematics & Information Sciences, vol. 10, no. 1, 2016. [6]. A. A. Zakaria et al., “High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution,” Applied Sciences, vol. 8, no. 11, 2018. [7]. M. Pelosi and C. Easttom, “Positive Identification of LSB image Steganography using Cover Image Comparisons,” Journal of Digital Forensics, Security and Law, vol. 15, no. 2, 2021. [8] .B. E. Sánchez Rinza, L. G. Munive Morales, and A. Jaramillo Núñez, “LSB Algorithm to Hide Text in an Audio Signal,” COMPUTACIÓN Y SISTEMAS (COMP. Y SIST.), vol. 26, no. 1, Jan/Mar. 2022. [9] . D. K. Sarmah and N. Bajpai, “Proposed System for data hiding using Cryptography and Steganography,” International Journal of Computer Applications, vol. 8, no. 9, Sept. 2010. [10]. A. U. Zaman, “Security during transmission of Data Using Web Steganography,” Starred Paper (Master’s Thesis), St. Cloud State University, 2018. [11]. Z. N. Sultani and B. N. Dhannoon, “Image and Audio Steganography based on indirect LSB,” Kuwait Journal of Science, vol. 48, no. 4, 2021. [12]. R. S. Hameed et al., “High Capacity Image Steganography System based on Multi-layer Security and LSB Exchanging Method,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 13, no. 8, 2022. [13]. R. Apau et al., “Image Steganography Techniques for Resisting Statistical Steganalysis Attacks: A systematic literature review,” PLoS One, vol. 19, no. 9, 2024. [14]. S. Zhang et al., “A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks,” Sensors (Basel), vol. 22, no. 20, 2022. [15]. E. A. Alsolami, “Audio Steganography Method using Least Significant Bit (LSB) Encoding Technique,” Journal of Theoretical and Applied Information Technology, vol. 100, no. 12, 2022.
How to Cite This Paper
Kareena U, Koustubha Nagaraj, Muskaan Sheikh. Soujanya K (2025). A SYSTEMATIC REVIEW OF MULTI-MEDIA CRYPTOSTEGANOGRAPHY: TECHNIQUES, CONSTRAINTS, AND ARCHITECTURAL REQUIREMENTS FOR WEB DEPLOYMENT. International Journal of Computer Techniques, 12(6). ISSN: 2394-2231.







