Text Insertion and Encryption Using The Bit-Swapping Method in Digital Images
Abstract
Communication is an essential aspect of everyday life, involving the transmission of information through various media. Technological advances have made communication easier but have also increased privacy and data security risks. Several efforts are made to maintain the security of digital information, including coding information (cryptography) and hiding information (steganography). In this article, the author secures information through a combination of cryptography and steganography. To secure text data, we encrypt by exchanging bits between adjacent characters. Subsequently, the encrypted text is hidden within an image. The security analysis results show the successful reconstruction of the message from the stego image and the successful restoration of the message to its original form. The use of the bit swapping method in the text message encryption process has been proven to enhance the security level of the ciphertext, as indicated by the lower TPK calculation value of 0.33 compared to the TPK value in previous studies. Additionally, embedding the ciphertext into digital images has been demonstrated to further increase the security level of the message, evidenced by the NPCR calculation value of 0.0000109% and the UACI calculation value of 0.000000555%. These very small values indicate no significant changes.
Downloads
References
E. Setyaningsih, Kriptografi dan Implementasinya Menggunakan Matlab, 1 ed., vol. 1. Andi Yogyakarta, 2015.
R. Munir, “Kriptografi / Rinaldi Munir | OPAC Perpustakaan Nasional RI.,” Book. Diakses: 7 Agustus 2023. [Daring]. Tersedia pada: https://opac.perpusnas.go.id/DetailOpac.aspx?id=1240782#
K. A. Santoso, Fatmawati, dan H. Suprajitno, “On Max-Plus Algebra and Its Application on Image Steganography,” Scientific World Journal, vol. 2018, 2018, doi: 10.1155/2018/6718653.
K. Agung, Fatmawati, dan H. Suprajitno, “Image encryption based on pixel bit modification,” J Phys Conf Ser, vol. 1008, hlm. 012016, Apr 2018, doi: 10.1088/1742-6596/1008/1/012016.
J. Sekip, S. Sikambing, dan N. Sumatera, “Penyisipan Pesan Dengan Algoritma Pixel Value Differencing Dengan Algoritma Caesar Cipher Pada Proses Steganografi,” vol. V, no. 1, hlm. 6–11, 2016.
K. A. Santoso, A. Kamsyakawuni, dan A. Riski, “Hiding the Text into An Image by Max-Plus Algebra,” dalam Proceedings - 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering, ICOMITEE 2019, 2019. doi: 10.1109/ICOMITEE.2019.8921210.
A. L. Tungadi dan E. A. Lisangan, “Kajian Penerapan Semi-Automated Evaluation Based on Similarity pada Investigasi Digital Image Forensics,” vol. 1, no. 2, hlm. 7–12, 2016.
K. A. Santoso, A. Pradjaningsih, dan E. Delenia, “Pengaman Teks dengan Kombinasi Metode <i>Electronic Code Book </i>(ECB) dan Kode <i>Seven Segment Display</i>,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 11, no. 1, hlm. 85–94, Feb 2024, doi: 10.25126/jtiik.20241117448.
T. Musri dan A. Pradana, “Perancangan Enkripsi Keamanan Data Menggunakan Metode Least Significant Bit Dengan Teknik Modifikasi Random Data Encrypt Algorithm Untuk Audio Steganography,” Jurnal: Elektrika Borneo (JEB), vol. 6, no. 2, hlm. 48–53, 2020.
A. A. Wahyudi, “Implementasi Steganografi Berkas File Mp3 Menggunakan Metode LSB (Least Significant Bit) Pada Perangkat Mobile Android,” Universitas Islam Negara Sunan Kalijaga, Yogyakarta, 2014.
D. E. Kurniawan and N. Narupi, “Teknik Penyembunyian Data Menggunakan Kombinasi Kriptografi Rijndael dan Steganografi Least Significant Bit (LSB),” Jurnal Teknik Informatika dan Sistem Informasi, vol. 2, no. 3, Art. no. 3, Dec. 2016, doi: 10.28932/jutisi.v2i3.630.
Kiswara Santoso, Syarif Hidayatulloh, dan Ahmad Kamsyakawuni, “Image Security System Using Playfair Cipher and Modification of Electronic Code Book (ECB) Algorithm,” REFILKOM : Journal of Technology and Information Systems, vol. 1, no. 1, hlm. 12–20, Jul 2023, Diakses: 27 Oktober 2023. [Daring]. Tersedia pada: https://ejournal.katersipublisher.com/index.php/REFILKOM/article/view/11
K. A. Santoso, R. A. Sukmawati, dan A. Pradjaningsih, “Image security development using 3D playfair cipher combination and bit shift,” dalam AIP Conference Proceeding, Djogyakarta: AIP Conference Proceedings , Mar 2022, hlm. 020013. doi: 10.1063/5.0079220.
K. Santoso, F. Fatmawati, dan S. Herry, “Image Encryption Technique Based on Pixel Exchange and XOR Operation,” International Basic Science, vol. 01, no. 1, hlm. 286–288, Agu 2017.
L. Andriani, R. Rihartanto, dan A. B. W. Putra, “Optimasi Vigenere Cipher Menggunakan Bitswap dan Transposisi Acak pada Citra RGB,” Techno.Com, vol. 19, no. 2, 2020, doi: 10.33633/tc.v19i2.3322.
K. Agung Santoso, A. Tanto Wiraga, A. Riski, J. Matematika, F. Mipa, dan U. Jember, “Penyembunyian Pesan Terenkripsi pada Citra menggunakan Algoritma LSB dan Transposisi Kolom,” 2022. [Daring]. Tersedia pada: http://jurnal.polibatam.ac.id/index.php/JAIC
Copyright (c) 2024 Kiswara Agung Santoso, Muhammad Fahmil Fakih, Ahmad Kamsyakawuni
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).