Hiding of Encrypted Messages on an Image using LSB and Column Transposition Algorithms

  • Kiswara Agung Santoso Universitas Jember
  • Ahmad Tanto Wiraga Universitas Jember
  • Abduh Riski Universitas Jember
Keywords: Column transposition, Cryptography, LSB, Steganography, Vigenere cipher

Abstract

Data security is a very important thing to do so that messages or information are sent to someone who is not known by unauthorized persons. Data security techniques that The ones that are often used today are cryptography and steganography. In this study, the data is to be secured in text. To increase security, text messages are first encrypted using the vigenere algorithm and column transposition. This text message is then hidden into an image (cover image). The encrypted text message was hidden in the image using the LSB algorithm and column transposition. The results of the study show that the virtual stego image generated is very effective similar to the original image. Based on the results of the MSE and PSNR analysis, it can be seen that the resulting image quality can be categorized as good. This can be seen from the PSNR value above 50 dB and some even above 60 dB. Based on the results of the LSB analysis, the stego image does not look strange so it will not be suspected by unauthorized people that there is a hidden message in the image.

Downloads

Download data is not yet available.

References

Hamdani, “Penerapan Metode Vigenere pada Kriptografi Klasik untuk Pesan Rahasia,” Informatika Mulawarman, vol. 7, pp. 26-26, 2012.

J. A. Kusumaningtyas, “Analisa Algoritma Ciphers Transposition: Study Literature,” Multimatrix, vol. 1, pp. 1-12, 2018.

A. Ardiansyah, M. Kurniasih, “Penyembunyian Pesan Rahasia pada Citra Digital dengan Teknik Steganografi Menggunakan Metode Least Significant Bit,” Teknologi Informasi, vol. 8, pp. 96-101, 2018.

D. E. Kurniawan and N. Narupi, “Teknik Penyembunyian Data Menggunakan Kombinasi Kriptografi Rijndael dan Steganografi Least Significant Bit (LSB),” Jurnal Teknik Informatika dan Sistem Informasi, vol. 2, no. 3, Art. no. 3, Dec. 2016, doi: 10.28932/jutisi.v2i3.630.

D. Putra, “Pengolahan Citra Digital,” ANDI, 2010.

R. Munir, “Diktat Kuliah IF5054 Kriptografi,” Departemen Teknik Informatika ITB, 2006.

D. E. Kurniawan, N. R. Hartadi, and P. Prasetyawan, “Analisis Hasil Teknik Penyembunyian Hak Cipta Menggunakan Transformasi DCT dan RSPPMC pada Jejaring Sosial,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 3, Art. no. 3, Aug. 2018, doi: 10.25126/jtiik.201853692.

A. Solichin and S. Kom, “Mengukur Kualitas Citra Hasil Steganografi,” Mengukur Kualitas Citra Has. Steganografi, no. April, pp. 1–4, 2015.

E. Y. Hidayat, K. Hastuti, “Analisis Steganografi Metode Least Significant Bit (LSB) dengan Penyisipan Sekuensial dan Acak Secara Kuantitatif dan Visual,” Techno.COM, vol. 12, pp. 157-167, 2013

R. Sadikin, “Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java,” ANDI, 2012.

U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,” Journal of Computer and Communications, vol. 7, no. 3, Art. no. 3, Mar. 2019, doi: 10.4236/jcc.2019.73002.

Published
2022-04-17
How to Cite
[1]
K. Santoso, A. Wiraga, and A. Riski, “Hiding of Encrypted Messages on an Image using LSB and Column Transposition Algorithms”, JAIC, vol. 6, no. 1, pp. 25-30, Apr. 2022.
Section
Articles