A Hybrid Cryptography and Steganography Approach Using RSA and LSB for Secure Message Transmission
Keywords:
Information security, cryptography, steganography, RSA, Least Significant Bit (LSB), data hiding, secure communication, image steganographyAbstract
Information security has become a critical concern in digital communication, requiring robust methods to ensure both confidentiality and imperceptibility. Cryptographic techniques such as RSA effectively protect message content by transforming plaintext into ciphertext; however, the presence of encrypted data may raise suspicion and become a target for attacks. Conversely, steganography conceals the existence of the message but lacks strong protection against extraction if detected. This study proposes a hybrid approach that integrates RSA cryptography with Least Significant Bit (LSB) steganography to enhance secure message transmission. The proposed method first encrypts the secret message using RSA, and subsequently embeds the resulting ciphertext into a digital image using the LSB technique. The system is implemented in Python and evaluated using Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) to assess image quality and imperceptibility. Experimental results demonstrate that the proposed method achieves high PSNR values (above 49 dB) and low MSE, indicating minimal visual distortion and high fidelity of the stego image. The integration of RSA and LSB not only secures the message content but also effectively conceals its presence, providing a dual layer of security. Therefore, the proposed hybrid method is suitable for secure digital communication applications requiring both data confidentiality and stealth.
References
[1]. W. Stallings, Cryptography and Network Security: Principles and Practice, 7th ed. Pearson, 2017.
[2]. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
[3]. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
[4]. B. Schneier, Applied Cryptography. Wiley, 1996.
[5]. N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security & Privacy, vol. 1, no. 3, pp. 32–44, 2003.
[6]. J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, 2009.
[7]. K. K. B. Gupta and S. K. Sharma, “A survey on steganography techniques,” Int. J. Comput. Appl., vol. 87, no. 14, 2014.
[8]. I. W. Mulyono, Y. Kusumawati, and N. K. Ningrum, “Analysis of image quality using LSB-based steganography and cryptography combination,” J. Informatics, 2023.
[9]. M. Rizky and D. I. G. Hts, “Combination of RSA and LSB for secure text embedding in images,” J. Info Digit, vol. 1, no. 3, pp. 1129–1142, 2023.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Ida Ayu Gde Suwiprabayanti Putra, Gst. Ayu Vida Mastrika Giri, Ngakan Putu Bagus Ananta Wijaya, Desak Putu Tia Rusilia Wati

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who submit papers with this journal agree to the following terms.