Text Insertion and Encryption Using The Bit-Swapping Method in Digital Images

  • Kiswara Agung Santoso Universitas Jember
  • Muhammad Fahmil Fakih Universitas Jember
  • Ahmad Kamsyakawuni Universitas Jember
Keywords: Communication, Security, Cryptography, Steganography, Bit swapping

Abstract

Communication is an essential aspect of everyday life, involving the transmission of information through various media. Technological advances have made communication easier but have also increased privacy and data security risks. Several efforts are made to maintain the security of digital information, including coding information (cryptography) and hiding information (steganography). In this article, the author secures information through a combination of cryptography and steganography. To secure text data, we encrypt by exchanging bits between adjacent characters. Subsequently, the encrypted text is hidden within an image. The security analysis results show the successful reconstruction of the message from the stego image and the successful restoration of the message to its original form. The use of the bit swapping method in the text message encryption process has been proven to enhance the security level of the ciphertext, as indicated by the lower TPK calculation value of 0.33 compared to the TPK value in previous studies. Additionally, embedding the ciphertext into digital images has been demonstrated to further increase the security level of the message, evidenced by the NPCR calculation value of 0.0000109% and the UACI calculation value of 0.000000555%. These very small values indicate no significant changes.

Downloads

Download data is not yet available.

References

E. Setyaningsih, Kriptografi dan Implementasinya Menggunakan Matlab, 1 ed., vol. 1. Andi Yogyakarta, 2015.

R. Munir, “Kriptografi / Rinaldi Munir | OPAC Perpustakaan Nasional RI.,” Book. Diakses: 7 Agustus 2023. [Daring]. Tersedia pada: https://opac.perpusnas.go.id/DetailOpac.aspx?id=1240782#

K. A. Santoso, Fatmawati, dan H. Suprajitno, “On Max-Plus Algebra and Its Application on Image Steganography,” Scientific World Journal, vol. 2018, 2018, doi: 10.1155/2018/6718653.

K. Agung, Fatmawati, dan H. Suprajitno, “Image encryption based on pixel bit modification,” J Phys Conf Ser, vol. 1008, hlm. 012016, Apr 2018, doi: 10.1088/1742-6596/1008/1/012016.

J. Sekip, S. Sikambing, dan N. Sumatera, “Penyisipan Pesan Dengan Algoritma Pixel Value Differencing Dengan Algoritma Caesar Cipher Pada Proses Steganografi,” vol. V, no. 1, hlm. 6–11, 2016.

K. A. Santoso, A. Kamsyakawuni, dan A. Riski, “Hiding the Text into An Image by Max-Plus Algebra,” dalam Proceedings - 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering, ICOMITEE 2019, 2019. doi: 10.1109/ICOMITEE.2019.8921210.

A. L. Tungadi dan E. A. Lisangan, “Kajian Penerapan Semi-Automated Evaluation Based on Similarity pada Investigasi Digital Image Forensics,” vol. 1, no. 2, hlm. 7–12, 2016.

K. A. Santoso, A. Pradjaningsih, dan E. Delenia, “Pengaman Teks dengan Kombinasi Metode <i>Electronic Code Book </i>(ECB) dan Kode <i>Seven Segment Display</i>,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 11, no. 1, hlm. 85–94, Feb 2024, doi: 10.25126/jtiik.20241117448.

T. Musri dan A. Pradana, “Perancangan Enkripsi Keamanan Data Menggunakan Metode Least Significant Bit Dengan Teknik Modifikasi Random Data Encrypt Algorithm Untuk Audio Steganography,” Jurnal: Elektrika Borneo (JEB), vol. 6, no. 2, hlm. 48–53, 2020.

A. A. Wahyudi, “Implementasi Steganografi Berkas File Mp3 Menggunakan Metode LSB (Least Significant Bit) Pada Perangkat Mobile Android,” Universitas Islam Negara Sunan Kalijaga, Yogyakarta, 2014.

D. E. Kurniawan and N. Narupi, “Teknik Penyembunyian Data Menggunakan Kombinasi Kriptografi Rijndael dan Steganografi Least Significant Bit (LSB),” Jurnal Teknik Informatika dan Sistem Informasi, vol. 2, no. 3, Art. no. 3, Dec. 2016, doi: 10.28932/jutisi.v2i3.630.

Kiswara Santoso, Syarif Hidayatulloh, dan Ahmad Kamsyakawuni, “Image Security System Using Playfair Cipher and Modification of Electronic Code Book (ECB) Algorithm,” REFILKOM : Journal of Technology and Information Systems, vol. 1, no. 1, hlm. 12–20, Jul 2023, Diakses: 27 Oktober 2023. [Daring]. Tersedia pada: https://ejournal.katersipublisher.com/index.php/REFILKOM/article/view/11

K. A. Santoso, R. A. Sukmawati, dan A. Pradjaningsih, “Image security development using 3D playfair cipher combination and bit shift,” dalam AIP Conference Proceeding, Djogyakarta: AIP Conference Proceedings , Mar 2022, hlm. 020013. doi: 10.1063/5.0079220.

K. Santoso, F. Fatmawati, dan S. Herry, “Image Encryption Technique Based on Pixel Exchange and XOR Operation,” International Basic Science, vol. 01, no. 1, hlm. 286–288, Agu 2017.

L. Andriani, R. Rihartanto, dan A. B. W. Putra, “Optimasi Vigenere Cipher Menggunakan Bitswap dan Transposisi Acak pada Citra RGB,” Techno.Com, vol. 19, no. 2, 2020, doi: 10.33633/tc.v19i2.3322.

K. Agung Santoso, A. Tanto Wiraga, A. Riski, J. Matematika, F. Mipa, dan U. Jember, “Penyembunyian Pesan Terenkripsi pada Citra menggunakan Algoritma LSB dan Transposisi Kolom,” 2022. [Daring]. Tersedia pada: http://jurnal.polibatam.ac.id/index.php/JAIC

Published
2024-07-07
How to Cite
[1]
K. Santoso, M. F. Fakih, and A. Kamsyakawuni, “Text Insertion and Encryption Using The Bit-Swapping Method in Digital Images”, JAIC, vol. 8, no. 1, pp. 86-90, Jul. 2024.