An algorithm for steganographic embedding of encrypted files in raster images


  • Yoana Ivanova New Bulgarian University



Vigenere cipher, affine transformations, Bezier curves, vector and raster steganography


The aim of this paper is proposing a method for the application of algorithms for hiding an encrypted file inside of a digital image for cybersecurity purposes. The originality of the method is expressed in the possibility of studying the mathematical algorithms for creating computer graphics. The development of a comprehensive algorithm should contribute to the practical realization of the method proposed. It emphasizes on built-in algorithms in software systems for creating computer graphics and the advantages of steganographic embedding by opensource products that hides any archive file in a digital image. Its application contribution is supported by practical examples of software hiding and archiving an encrypted file in a graphic image.


DANIEL, Brett. What Is AES Encryption? [The Definitive Q&A Guide]. Trenton Systems [online]. 31 March 2021 [viewed 20 February 2022]. Available from:

JASSIM, Nassif K. Hybrid cryptography and steganography method to embed encrypted text message within image. Journal of Physics: Conference Series [online]. 2019, vol. 1339, № 012061 [viewed 20 January 2023]. eISSN 1742-6596. Available from:

THAYANANTHAN, Vijey. Combining RSA and Vigenère Cipher algorithm to Encrypt and Decrypt Data, CS741 - Applied Cryptography. Studocu [online]. Technical University of Mombasa, 2019 [viewed 20 January 2023]. Available from:

SARKAR, Subhasish. How much do you know about the Vigenère cipher? IBM Z Security [online]. 2020 [viewed 20 January 2023]. Available from:

NERI, Daniel, Ariel M. SISON, and Ruji P. MEDINA. Performance Analysis of the Modified Vigenere Algorithm to Secure Data. In: Proceedings of the 9th International Workshop on Computer Science and Engineering (WCSE 2019 SUMMER). Hong Kong, 2019, pp. 789-794. ISBN 978-981-14-1684-2.

SUBANDI, Amin et al. Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification. Advances in Science, Technology and Engineering Systems Journal [online]. 2017, vol. 5(2), pp. 1-5 [viewed 20 January 2023]. ISSN 2415-6698. Available from: DOI:10.25046/aj020501

ASCII Conversion Chart. Technical Resources [online]. [viewed 20 January 2023]. Available from:

XOR Gate & XNOR Gates: Truth Table, Symbol & Boolean Expression. Electrical 4U [online]. 11 October 2020 [viewed 20 January 2023]. Available from:

What is the difference between Encryption and Compression? What order should they be done in? Encryption Consulting [online]. [viewed 20 January 2023]. Available from:

ZELENSKI, Julie, Keith SCHWARZ, and Marty STEPP. Huffman Encoding and Data Compression [online]. [viewed 20 January 2023]. Stanford University and Marty Stepp, licensed under Creative Commons Attribution 2.5 License. Available from:

CONRAD, Eric, Seth MISENAR and Joshua FELDMAN. Domain 5: Cryptography. In: CISSP Study Guide [online]. Second Edition. Amsterdam [u.a.]: Elsevier Inc, 2012, pp. 169-211 [viewed 20 January 2023]. ISBN 978-1-59749-961-3. Available from:

SHENE, C. K. Introduction to Computing with Geometry Notes [online]. Michigan Technology University, 2014 [viewed 20 January 2023]. Available from:

SALOMON, David. Curves and Surfaces for Computer Graphics [online]. New York: Springer, 2005 [viewed 20 January 2023]. ISBN 978-0-387-24196-8. SpringerLink. Available from:

ANDERSON, Scott D. Affine Transformations Computer Graphics. Wellesley College [online]. [viewed 20 January 2023]. Available from:

КЪДРЕВ, Васил и Росен ПАСАРЕЛСКИ. Приложение на подходи на изкуствен интелект и машинно обучение в киберсигурността. Годишник Телекомуникации 2021 [онлайн]. София: НБУ, 2021, (8), с. 53-64 [прегледан 20 Януари 2023]. eISSN 2534-854X. Достъпен на: [KADREV, Vasil i Rosen PASARELSKI. Prilozhenie na podhodi na izkustven intelekt i mashinno obuchenie v kibersigurnostta. Godishnik Telekomunikatsii 2021 [onlayn]. Sofia: NBU, 2021, (8), s. 53-64 [pregledan 20 Yanuari 2023]. eISSN 2534-854X. Dostapen na:]

СИМЕОНОВА, Цветелина и Васил КЪДРЕВ. Развитие на изкуствения интелект и неговото приложение в телекомуникационните мрежи и услуги. Сборник доклади от Научна конференция с международно участие на НВУ „В. Левски”, В. Търново, 27-28.05.2021. Велико Търново: ИК на НВУ „Васил Левски, 2021, с. 2376-2386. ISSN 2367-7481. [SIMEONOVA, Tsvetelina i Vasil KADREV. Razvitie na izkustvenia intelekt i negovoto prilozhenie v telekomunikatsionnite mrezhi i uslugi. Sbornik dokladi ot Nauchna konferentsia s mezhdunarodno uchastie na NVU „V. Levski”, V. Tarnovo, 27-28.05.2021. Veliko Tarnovo: IK na NVU „Vasil Levski, 2021, s. 2376- 2386. ISSN 2367-7481.]




How to Cite

Ivanova, Y. (2022). An algorithm for steganographic embedding of encrypted files in raster images. Yearbook Telecommunications, 9, 35–44.