AN IMPROVED CHAOTIC IMAGE ENCRYPTION FOR ENHANCED SECURITY AND KEY SPACE OPTIMIZATION
DOI:
https://doi.org/10.62643/ijerst.v21.n3(1).pp637-645Keywords:
Steganography, ChaCha20, Elliptic Curve Cryptography (ECC), Confidentiality and Integrity, LSB Embedding.Abstract
Embedding secret data within digital images (steganography) is a widely used technique for covert
communication. However, traditional LSB methods lack confidentiality and integrity checks, making
them vulnerable to extraction and tampering. To address these shortcomings, this work proposes an
integrated solution that combines encryption (ECC or ChaCha20), LSB steganography, and
compression to securely hide short payloads inside cover images. Public-key cryptography offers
strong security but can be computationally intensive, whereas symmetric stream ciphers like
ChaCha20 deliver high performance but require key distribution. Conventional LSB steganography
directly embeds plaintext bits, exposing messages to steganalysis and eavesdropping. A robust system
is therefore needed to ensure that extracted data cannot be read without the key, and that any alteration
is detectable. In this project, the secret message is first encrypted using either ECIES over secp256k1
(asymmetric) or ChaCha20 (symmetric), and its SHA-256 hash is computed to ensure integrity. The
resulting ciphertext bytes are Base64-encoded and converted into an ASCII bitstream, which is then
embedded into the least significant bits of an RGB image. The stego image is subsequently
compressed using zlib to reduce file size and obscure potential embedding artifacts. On the receiver
side, the compressed file is decompressed, the LSB bits are extracted to reconstruct the Base64
ciphertext, the SHA-256 hash is recalculated to verify integrity, and the payload is decrypted. A
Tkinter GUI guides users through uploading images, entering secrets, selecting encryption modes, and
viewing performance graphs that compare ECC and ChaCha20. Experimental results show that
ChaCha20 encryption is significantly faster than ECC for short messages, while ECC provides
asymmetric security without the need for key exchange. By integrating strong encryption,
steganography, and compression, this system mitigates the limitations of traditional LSB methods—
ensuring confidentiality, integrity, and minimal perceptual distortion—making it well-suited for
applications requiring covert, tamper-evident communication.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.












