ARCHIVES
Original Article
Stegno Vault: A Web-Based Secure Data Transmission System Using LSB Steganography
Yogita More1
Shweta Chounde2
Tanuja Dhere3
Om Gaikwad4
Zohaib Khan5
1 Professor, SRCOE, Department of Computer Engineering, Pune, Maharashtra, India. 2 3 4 5 Student, SRCOE, Department of Computer Engineering, Pune, Maharashtra, India.
Published Online: May-August 2026
Pages: 112-119
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502011References
[1]. R. Mahajan, B. More, L. Gunjal, B. Waghulde, and R. Narkhede, “Secure Data Transfer Over Internet Using Image Steganography,”
IJSART, vol. 10, no. 2, 2024.
[2]. Y. More, S. Chounde, T. Dhere, O. Gaikwad, and Z. Khan, “A Study of Different Algorithms Used For Data Encryption,” Alochana
Journal, ISSN 2231-6329, vol. 14, no. 11, pp. 13–20, 2025.
[3]. S. Kumar, Y. Li, H. Zhang, R. Patel, and T. Nguyen, “DeepGA-Stego: Hybrid Deep Learning and Genetic Algorithm Approach for Secure
Audio-Image Steganography,” IEEE Trans. Information Forensics and Security, vol. 17, no. 2, pp. 345–359, 2022.
[4]. L. Zhang, S. Kumar, R. Patel, and T. Nguyen, “Deep Learning and Genetic Algorithm Techniques for Secure Multimedia Steganography,”
Int. J. Information Security, vol. 22, no. 4, pp. 1100–1118, 2023.
[5]. S. Rahman et al., “A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component
of an image,” Scientific Reports, vol. 13, p. 14183, 2023. DOI: 10.1038/s41598-023-41303-1.
[6]. N. Krishnammal, B. S. Nagarjuna, M. Y. Kumar, and C. R. Vamsi, “Data Hiding in Image using Steganography,” ICITSM 2025, EAI.
DOI: 10.4108/eai.28-4-2025.2358060.
[7]. A. R. Chouthamal, S. Bansod, and S. K. Singh, “LSB-Based Image Steganography Using Image Enlargement,” 2025 ICOCT, IEEE. DOI:
10.1109/ICOCT64433.2025.11118799.
[8]. A. K. Sahu and G. Swain, “A review on LSB substitution and PVD based image steganography techniques,” Indonesian J. Electrical
Engineering and Computer Science, vol. 2, no. 3, pp. 712–719, 2016.
[9]. M. Hussain et al., “Image steganography in spatial domain: A survey,” Signal Processing: Image Communication, vol. 65, pp. 46–66,
2018.
[10]. G. Rajkumar and V. Malemath, “Video Steganography: Secure Data Hiding Technique,” Int. J. Computer Network and Information
Security, vol. 9, pp. 38–45, 2017.
[11]. T. Morkel, J. H. P. Eloff, and M. S. Olivier, “An overview of image steganography,” in Proc. 5th Annual ISSA Conf., Johannesburg, South
Africa, 2005, pp. 1–11.
[12]. R. J. Anderson and F. A. P. Petitcolas, “On the limits of steganography,” IEEE J. Selected Areas in Communications, vol. 16, no. 4, pp.
474–481, May 1998.
[13]. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3–4, pp. 313–336, 1996.
[14]. N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” IEEE Computer, vol. 31, no. 2, pp. 26–34, Feb. 1998.
[15]. C. Cachin, “An information-theoretic model for steganography,” in Proc. 2nd Int. Workshop Information Hiding, Portland, OR, USA,
1998, pp. 306–318.
[16]. Neelam LabhadeKumar, Mangala S Biradar, Ashvini Narayan Pawale,"Reinforcement Learning-Based Deep FEFM for Blockchain
Consensus Mechanism Optimization with Non-Linear Analysis"Journal of Computational Analysis and Applications, Vol. 33 No. 05
(2024)
[17]. Neelam Labhade-Kumar “Shot Boundary Detection Using Artificial Neural Network”, Advances in Signal and Data Processing. Lecture
Notes in Electrical Engineering, Springer, Vol 703. PP-44-55 Jan-2021
[18]. Neelam Labhade-Kumar Optimizing Cluster Head Selection in Wireless Sensor Networks Using Mathematical Modeling and Statistical
Analysis of The Hybrid Energy-Efficient Distributed (HEED) Algorithm, Communications on Applied Nonlinear Analysis, ISSN: 1074-
133XVol 31 No. 6s (2024), PP-602-617 August 2024
[19]. Neelam Labhade-Kumar “Experimental Design of Electricity Theft Detection and Alert System Using Arduino Assisted Controller and
Smart Sensors"7th International Conference on Inventive Computation Technologies, IEEE Xplore Part Number : CFP24F70-ART ; ISBN
: 979-8-3503-5929-9, 2024,PP-1961-1968
[20]. Dr.Neelam Labhade-Kumar “Novel Management Trends Using IOT in Indian Automotive Spares Manufacturing Industries”, Journal of
Pharmaceutical Negative Results , Vol. 13 ISSUE 09,PP 4887-4899, Nov-2022
[21]. Dr.Neelam Labhade-Kumar “Adaptive Hybrid Bird Swarm Optimization Based Efficient Transmission In WSN”, Journal of
Pharmaceutical Negative Results, Vol. 14 ISSUE 02,PP-480-484, Jan-2023,
[22]. Neelam Labhade-Kumar “Combining Hand-crafted Features and Deep Learning for Automatic Classification of Lung Cancer on CT
Scans”, Journal of Artificial Intelligence and Technology, 2023
[23]. Neelam Labhade-Kumar “Enhancing Crop Yield Prediction in Precision Agriculture through Sustainable Big Data Analytics and Deep
Learning Techniques”, Carpathian Journal of Food Science and Technology,2023, Special Issue, 1-18
[24]. Neelam Labhade-Kumar “Accident prevention and management system in urban VANET for improving slippery roads ride after rain”
Journal of environmental protection and ecology, ISSN:1311-5065 Issue 2 volume 25,PP 586–599,2024
[25]. Prof. Dr. Neelam Labhade-Kumar, An image processing method for kidney stone segmentation in CT scan images based on CNN-
regularized extreme learning machine approach, Hybrid and Advanced Technologies, PP- 217-222,202
IJSART, vol. 10, no. 2, 2024.
[2]. Y. More, S. Chounde, T. Dhere, O. Gaikwad, and Z. Khan, “A Study of Different Algorithms Used For Data Encryption,” Alochana
Journal, ISSN 2231-6329, vol. 14, no. 11, pp. 13–20, 2025.
[3]. S. Kumar, Y. Li, H. Zhang, R. Patel, and T. Nguyen, “DeepGA-Stego: Hybrid Deep Learning and Genetic Algorithm Approach for Secure
Audio-Image Steganography,” IEEE Trans. Information Forensics and Security, vol. 17, no. 2, pp. 345–359, 2022.
[4]. L. Zhang, S. Kumar, R. Patel, and T. Nguyen, “Deep Learning and Genetic Algorithm Techniques for Secure Multimedia Steganography,”
Int. J. Information Security, vol. 22, no. 4, pp. 1100–1118, 2023.
[5]. S. Rahman et al., “A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component
of an image,” Scientific Reports, vol. 13, p. 14183, 2023. DOI: 10.1038/s41598-023-41303-1.
[6]. N. Krishnammal, B. S. Nagarjuna, M. Y. Kumar, and C. R. Vamsi, “Data Hiding in Image using Steganography,” ICITSM 2025, EAI.
DOI: 10.4108/eai.28-4-2025.2358060.
[7]. A. R. Chouthamal, S. Bansod, and S. K. Singh, “LSB-Based Image Steganography Using Image Enlargement,” 2025 ICOCT, IEEE. DOI:
10.1109/ICOCT64433.2025.11118799.
[8]. A. K. Sahu and G. Swain, “A review on LSB substitution and PVD based image steganography techniques,” Indonesian J. Electrical
Engineering and Computer Science, vol. 2, no. 3, pp. 712–719, 2016.
[9]. M. Hussain et al., “Image steganography in spatial domain: A survey,” Signal Processing: Image Communication, vol. 65, pp. 46–66,
2018.
[10]. G. Rajkumar and V. Malemath, “Video Steganography: Secure Data Hiding Technique,” Int. J. Computer Network and Information
Security, vol. 9, pp. 38–45, 2017.
[11]. T. Morkel, J. H. P. Eloff, and M. S. Olivier, “An overview of image steganography,” in Proc. 5th Annual ISSA Conf., Johannesburg, South
Africa, 2005, pp. 1–11.
[12]. R. J. Anderson and F. A. P. Petitcolas, “On the limits of steganography,” IEEE J. Selected Areas in Communications, vol. 16, no. 4, pp.
474–481, May 1998.
[13]. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3–4, pp. 313–336, 1996.
[14]. N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” IEEE Computer, vol. 31, no. 2, pp. 26–34, Feb. 1998.
[15]. C. Cachin, “An information-theoretic model for steganography,” in Proc. 2nd Int. Workshop Information Hiding, Portland, OR, USA,
1998, pp. 306–318.
[16]. Neelam LabhadeKumar, Mangala S Biradar, Ashvini Narayan Pawale,"Reinforcement Learning-Based Deep FEFM for Blockchain
Consensus Mechanism Optimization with Non-Linear Analysis"Journal of Computational Analysis and Applications, Vol. 33 No. 05
(2024)
[17]. Neelam Labhade-Kumar “Shot Boundary Detection Using Artificial Neural Network”, Advances in Signal and Data Processing. Lecture
Notes in Electrical Engineering, Springer, Vol 703. PP-44-55 Jan-2021
[18]. Neelam Labhade-Kumar Optimizing Cluster Head Selection in Wireless Sensor Networks Using Mathematical Modeling and Statistical
Analysis of The Hybrid Energy-Efficient Distributed (HEED) Algorithm, Communications on Applied Nonlinear Analysis, ISSN: 1074-
133XVol 31 No. 6s (2024), PP-602-617 August 2024
[19]. Neelam Labhade-Kumar “Experimental Design of Electricity Theft Detection and Alert System Using Arduino Assisted Controller and
Smart Sensors"7th International Conference on Inventive Computation Technologies, IEEE Xplore Part Number : CFP24F70-ART ; ISBN
: 979-8-3503-5929-9, 2024,PP-1961-1968
[20]. Dr.Neelam Labhade-Kumar “Novel Management Trends Using IOT in Indian Automotive Spares Manufacturing Industries”, Journal of
Pharmaceutical Negative Results , Vol. 13 ISSUE 09,PP 4887-4899, Nov-2022
[21]. Dr.Neelam Labhade-Kumar “Adaptive Hybrid Bird Swarm Optimization Based Efficient Transmission In WSN”, Journal of
Pharmaceutical Negative Results, Vol. 14 ISSUE 02,PP-480-484, Jan-2023,
[22]. Neelam Labhade-Kumar “Combining Hand-crafted Features and Deep Learning for Automatic Classification of Lung Cancer on CT
Scans”, Journal of Artificial Intelligence and Technology, 2023
[23]. Neelam Labhade-Kumar “Enhancing Crop Yield Prediction in Precision Agriculture through Sustainable Big Data Analytics and Deep
Learning Techniques”, Carpathian Journal of Food Science and Technology,2023, Special Issue, 1-18
[24]. Neelam Labhade-Kumar “Accident prevention and management system in urban VANET for improving slippery roads ride after rain”
Journal of environmental protection and ecology, ISSN:1311-5065 Issue 2 volume 25,PP 586–599,2024
[25]. Prof. Dr. Neelam Labhade-Kumar, An image processing method for kidney stone segmentation in CT scan images based on CNN-
regularized extreme learning machine approach, Hybrid and Advanced Technologies, PP- 217-222,202
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026