Pandey, ShraiyashBaniya, PashupatiNand, ParmaHameed, Alaa AliBhushan, BharatJamil, Akhtar2025-04-182025-04-182024Pandey, S., Baniya, P., Nand, P., Hameed, A. A., Bhushan, B., & Jamil, A. (2023, September). CryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications. In International Conference on Emerging Trends and Applications in Artificial Intelligence (pp. 532-543). Cham: Springer Nature Switzerland.23673370https://hdl.handle.net/20.500.12713/6606In today’s era, security is one of the most critical issues in the development of electronic communications applications, especially when sending private data. The data may be encrypted with several algorithms; however, an extra layer of security can improve protection by a significant amount. Therefore, in this paper, we have developed an application, CryptStego, to secure data using two techniques, cryptography and steganography, to transmit data securely. The encryption of original data is executed using Blowfish algorithm, a cryptographic technique. Additionally, the encrypted data is hidden through using Least Significant Bit (LSB), a steganography technique. The implementation of both techniques offers an extensive level of security, since an intruder must firstly identify the encrypted text within the image to attain the encrypted text, then secondly to decrypt using the algorithm to obtain the original message. Therefore, any intruder must encounter multiple levels of security to obtain the original message from the cipher image. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.eninfo:eu-repo/semantics/closedAccessBlowfish AlgorithmCryptographyLeast Significant Bit (LSB)SteganographyWeb-ApplicationCryptStego: Powerful Blend of Cryptography and Steganography for Securing CommunicationsConference Object9605325432-s2.0-8519357593810.1007/978-3-031-56728-5_44Q4