A Secure Web-Based Cyber Defense Framework using AES Encryption, Steganography and Machine Learning

Authors

  • Hanamant R Jakaraddi Assistant Professor, Dept. of MCA, Acharya Institute of Technology, Bangalore, Karnataka, India Author
  • Madhurani Kwari PG Student [MCA], Dept. of MCA, Acharya Institute of Technology, Bangalore, Karnataka, India Author
  • Annapareddy Haarika Assistant Professor, Dept. of ISE, BMS Institute of Technology and Management, Bangalore, Karnataka, India Author

DOI:

https://doi.org/10.15680/IJCTECE.2025.0806013

Keywords:

Phishing Detection, Smishing Prevention, Image Steganography, Cryptographic Techniques, Cyber Security, Data Hiding, Stego-Cryptography, Social Engineering Attack

Abstract

This Approach is a comprehensive, web-based cybersecurity system combining file encryption, phishing URL detection, and SMS threat analysis to deliver robust protection against modern cyber threats. The system integrates three core components: (1) AES-256 file encryption with stenographic key hiding via the LSB technique in images, (2) phishing detection using a gradient boosting classifier trained on 30+ URL features, and (3) SMS threat analysis using NLP and sentiment analysis. Bootstrap was used for a responsive UI, with secure authentication implemented for user access. Testing included 500+ phishing URLs, 200+ SMS messages, and various file types. The phishing module achieved 95.2% accuracy by analyzing URL structure, domain reputation, and content. The SMS threat analyzer detected social engineering threats with 92.8% accuracy using keyword and linguistic pattern recognition. The encryption module successfully embedded and retrieved keys in 100% of tests. The platform delivered fast performance with an average response time of 2.3 seconds and received an 89% user satisfaction rate for its intuitive interface. Overall, the system offers a high-accuracy, user-friendly, and multi-layered cyber-security solution, suitable for individuals and organizations seeking advanced digital protection.

References

1. Sindhu, R., & Singh, P. (2020). Information Hiding using Steganography. International Journal of Engineering and Advanced Technology, 9(4), 1549-1554.ijeat+1

2. Sumathi, C.P., Santanam, T., & Umamaheswari, G. (2013). A Study of Various Steganographic Techniques Used for Information Hiding. International Journal of Computer Science & Engineering Survey, 4(6), 9-22.arxiv

3. Parvez, M.T., & Gutub, A.A. (2024). A novel technique for image steganography based on maximum... Multimedia Tools and Applications, 83, 1-13.link.springer

4. Yadav, R. (2023). A NEW METHOD FOR IMAGE STEGANOGRAPHY USING THE... International Journal of Computer Science and Mobile Computing, 12(2), 14-25.ijcsmc

5. Parvez, M.T., & Gutub, A. (2025). A novel and efficient digital image steganography technique using... Scientific Reports, 15, 1-15.nature

6. Pitropakis, N., Basbas, M., Dalatis, K., Doyamis, E., Srifi, M.D., & Katsikas, S. (2024). A systematic review and research challenges on phishing... Personal and Ubiquitous Computing, 28, 1-25.link.springer

7. Goel, D. (2024). Detection and Prevention of Smishing Attacks. arXiv preprint arXiv:2501.00260, 1-63.arxiv

8. Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2022). Digital image steganography: A literature survey. Information Sciences, 1-20.sciencedirect

9. Althobaiti, K., & Alsufyani, N. (2024). A review of organization-oriented phishing research. PMC, 1-15.pmc.ncbi.nlm.nih

10. Various. (2024). Smishing Detection: Combating SMS Phishing Attacks by Utilizing... SSRN, 1-10.papers.ssrn

11. Al-Nawasrah, A., Almomani, A.M., & Manasrah, A. (2025). A Survey on Phishing Attack Taxonomy, Detection Techniques... Journal of Network and Systems Management, 33, 1-20.tandfonline

12. Shabir, M.Y., Zubair, M., Khan, M.A., & Asad, M.U. (2023). A Case Study on Smishing: An Assessment of Threats against... Proceedings of the ACM Conference, 1-10.acm

13. Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. Frontiers in Computer Science, 3, 1-15.frontiersin

14. Various. (2024). Analysing The Impact of Smishing Attack in Public Announcement... Procedia Computer Science, 1-10.sciencedirect

15. Pitropakis, N., Basbas, M., Dalatis, K., Doyamis, E., Srifi, M.D., & Katsikas, S. (2023). Mitigation strategies against the phishing attacks. Computers & Security, 1-25.sciencedirect

Downloads

Published

2025-11-19

How to Cite

A Secure Web-Based Cyber Defense Framework using AES Encryption, Steganography and Machine Learning. (2025). International Journal of Computer Technology and Electronics Communication, 8(6), 11692-11697. https://doi.org/10.15680/IJCTECE.2025.0806013