IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

STEGOVAULTPRO: SECURE MULTI-FORMAT STEGANOGRAPHY FOR CONFIDENTIAL DATA HIDING

AUTHORS:
Sarjun Chanakya S.K
Mentor
Dr. B. Leelavathi
Affiliation
Department of Computer Technology, Dr.N. G. P. Arts and Science College, Coimbatore, India,
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Steganography is a technique used to hide confidential information within  digital  media  files  in  such  a  way that the existence of the hidden data remains unnoticed. This project presents StegoVaultPro, a secure multi-format steganography platform designed to embed and extract hidden messages across multiple carrier types including images,  audio,  video,  and  text  files.  The system integrates Least Significant Bit (LSB) embedding techniques with strong cryptographic protection using AES encryption in Cipher Block Chaining (CBC) mode combined with PBKDF2 key derivation to ensure message confidentiality before embedding.


The platform is implemented as a modular web-based application that provides a centralized dashboard for performing   encoding     and   decoding operations. It supports carrier formats such as PNG, JPG, WAV, MP4, TXT, and PDF, allowing flexible multimedia steganography operations. Additional security mechanisms including password protection, input validation, and controlled decryption handling ensure safe processing of user data. Experimental observations demonstrate efficient embedding performance, reliable  message  recovery,  and  minimal perceptual distortion of carrier files. The proposed system offers a scalable and extensible framework for secure multimedia information hiding.

Keywords
Article Metrics
Article Views
12
PDF Downloads
2
HOW TO CITE
APA

MLA

Chicago

Copy

S.K, S. C. (2026). Stegovaultpro: Secure Multi-Format Steganography for Confidential Data Hiding. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.088

S.K, Sarjun. "Stegovaultpro: Secure Multi-Format Steganography for Confidential Data Hiding." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.088.

S.K, Sarjun. "Stegovaultpro: Secure Multi-Format Steganography for Confidential Data Hiding." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.088.

References
[1] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking. Boston, MA, USA: Kluwer Academic Publishers, 2001.

[2] S. Katzenbeisser and F. A. P. Petitcolas, Information Hiding Techniques for Steganography  and  Digital  Watermarking. Boston, MA, USA: Artech House, 2000.

[3] W. Stallings, Cryptography and Network Security: Principles and Practice, 7th ed. Boston, MA, USA: Pearson Education, 2017.

[4] B.    Schneier,          Applied Cryptography:

Protocols, Algorithms, and Source Code in C, 2nd ed. New York, NY, USA: John Wiley & Sons, 1996.

[5]  R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed. Indianapolis, IN, USA:Wiley Publishing, 2008.

[6] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1996.

[7] P. Wayner, Disappearing Cryptography:

Information Hiding—Steganography and Watermarking, 2nd ed. San Francisco, CA, USA: Morgan Kaufmann, 2002.

[8] N. Provos and P. Honeyman, “Hide and Seek:  An  Introduction  to  Steganography,”IEEE Security & Privacy Magazine, vol. 1, no. 3, pp. 32–44, 2003.

[9] F. A. P. Petitcolas, Information Hiding:

Techniques and Applications. Norwood, MA, USA: Artech House, 1999.

[10] Dr. Leelavathi and Rajesh M. Babu,“An Efficient Worm Detection System Using Multi Feature Analysis and Classification Techniques,” International Conference on Computer Networks, Springer Nature Link, pp. 1054–1064, 2019.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Gap Analysis for Future Skill Mapping
string(15) "Kushagra Mishra" Mishra, K.
(2026)
DOI: 10.55041/ijsmt.v2i3.068
Effect of Surged Electrical Muscle Stimulator on Subjects with ACL Reconstruction
string(63) "Vansh Raj Singh , Sakshi Chopra , Ritika Beniwal ,Aradhya Vatsa" Vatsa, V. R. S. ,. S. C. ,. R. B. ,.
(2026)
DOI: 10.55041/ijsmt.v2i3.092
A Review on Sorbitol as a Pharmaceutical Excipient
string(20) "K.Bhavana, N.Sravani" N.Sravani, K.
(2026)
DOI: 10.55041/ijsmt.v2i3.103
Scroll to Top