Hiding of Encrypted Messages on an Image using LSB and Column Transposition Algorithms
Abstract
Data security is a very important thing to do so that messages or information are sent to someone who is not known by unauthorized persons. Data security techniques that The ones that are often used today are cryptography and steganography. In this study, the data is to be secured in text. To increase security, text messages are first encrypted using the vigenere algorithm and column transposition. This text message is then hidden into an image (cover image). The encrypted text message was hidden in the image using the LSB algorithm and column transposition. The results of the study show that the virtual stego image generated is very effective similar to the original image. Based on the results of the MSE and PSNR analysis, it can be seen that the resulting image quality can be categorized as good. This can be seen from the PSNR value above 50 dB and some even above 60 dB. Based on the results of the LSB analysis, the stego image does not look strange so it will not be suspected by unauthorized people that there is a hidden message in the image.
Downloads
References
Hamdani, “Penerapan Metode Vigenere pada Kriptografi Klasik untuk Pesan Rahasia,” Informatika Mulawarman, vol. 7, pp. 26-26, 2012.
J. A. Kusumaningtyas, “Analisa Algoritma Ciphers Transposition: Study Literature,” Multimatrix, vol. 1, pp. 1-12, 2018.
A. Ardiansyah, M. Kurniasih, “Penyembunyian Pesan Rahasia pada Citra Digital dengan Teknik Steganografi Menggunakan Metode Least Significant Bit,” Teknologi Informasi, vol. 8, pp. 96-101, 2018.
D. E. Kurniawan and N. Narupi, “Teknik Penyembunyian Data Menggunakan Kombinasi Kriptografi Rijndael dan Steganografi Least Significant Bit (LSB),” Jurnal Teknik Informatika dan Sistem Informasi, vol. 2, no. 3, Art. no. 3, Dec. 2016, doi: 10.28932/jutisi.v2i3.630.
D. Putra, “Pengolahan Citra Digital,” ANDI, 2010.
R. Munir, “Diktat Kuliah IF5054 Kriptografi,” Departemen Teknik Informatika ITB, 2006.
D. E. Kurniawan, N. R. Hartadi, and P. Prasetyawan, “Analisis Hasil Teknik Penyembunyian Hak Cipta Menggunakan Transformasi DCT dan RSPPMC pada Jejaring Sosial,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 3, Art. no. 3, Aug. 2018, doi: 10.25126/jtiik.201853692.
A. Solichin and S. Kom, “Mengukur Kualitas Citra Hasil Steganografi,” Mengukur Kualitas Citra Has. Steganografi, no. April, pp. 1–4, 2015.
E. Y. Hidayat, K. Hastuti, “Analisis Steganografi Metode Least Significant Bit (LSB) dengan Penyisipan Sekuensial dan Acak Secara Kuantitatif dan Visual,” Techno.COM, vol. 12, pp. 157-167, 2013
R. Sadikin, “Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java,” ANDI, 2012.
U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,” Journal of Computer and Communications, vol. 7, no. 3, Art. no. 3, Mar. 2019, doi: 10.4236/jcc.2019.73002.
Copyright (c) 2022 Kiswara Agung Santoso, Ahmad Tanto Wiraga, Abduh Riski
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).