Text Data Security Using LCG and CBC with Steganography Technique on Digital Image
Abstract
This research proposes a text data security method using a combination of Linear Congruential Generator (LCG), Advanced Encryption Standard (AES) Cipher Block Chaining (CBC) mode, and Least Significant Bit (LSB) steganography technique on digital images. The message scrambling process using LCG produces ASCII characters as noise that is inserted in the original message. After that, the message is encrypted using AES-256 CBC to provide additional security. The encryption result is then hidden in the digital image through LSB steganography technique. Tests were conducted on images with JPEG and BMP formats to measure the visual quality after the data insertion process, as measured by PSNR (Peak Signal-to-Noise Ratio). The test results show a PSNR value of 56.60 dB for JPEG images and 70.84 dB for BMP images. In addition, the insertion process in JPEG images degrades the image quality, mainly due to lossy compression, compared to the lossless BMP format. This study concludes that the proposed combination of methods is effective in hiding messages in images, but is susceptible to compression on lossy formats such as JPEG. The use of lossless image formats such as BMP or PNG is recommended to maintain data integrity.
Downloads
References
Putra Rahmadi and Hilda Dwi Yunita, “Implementasi Pengamanan Basis Data Dengan Teknik Enkripsi,” J. Cendikia, vol. 19, no. 1, pp. 413–418, 2020.
P. A. Rizky and S. Soim, “Implementasi Algoritma Kriptografi AES CBC Untuk Keamanan Komunikasi Data Pada Hardware,” vol. 3, no. 1, pp. 71–78, 2024.
D. N. Triwibowo, P. -, I. A. Ashari, A. S. Sandi, and Y. F. Rahman, “Enkripsi Pesan Menggunakan Algoritma Linear Congruential Generator (LCG) dan Konversi Kode Morse,” Bul. Ilm. Sarj. Tek. Elektro, vol. 3, no. 3, pp. 194–201, 2022, doi: 10.12928/biste.v3i3.5546.
A. Nugrahantoro, A. Fadlil, and I. Riadi, “Optimasi Keamanan Informasi Menggunakan Algoritma Advanced Encryption Standard (AES) Mode Chiper Block Chaining (CBC),” J. Ilm. FIFO, vol. 12, no. 1, p. 12, 2020, doi: 10.22441/fifo.2020.v12i1.002.
M. Afsari, D. I. Mulyana, A. Damaiyanti, and N. Sa’adah, “Implementasi Mode Operasi Kombinasi Cipher Block Chaining dan Metode LSB-1 Pada Pengamanan Data text,” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 70–82, 2022, doi: 10.47709/jpsk.v2i01.1381.
M. Siahaan and J. Manurung, “Perancangan Aplikasi Penyandian Teks Menggunakan Algoritma Triple DES,” J. Ilmu Komput. dan Sist. vol. 3, no. 3, pp. 197–201, 2021, [Online]. Available: http://ejournal.sisfokomtek.org/index.php/jikom/a rticle/view/116
M. Suwarni, J. Wahyudi, and K. Khairil, “Comparison of the DES Cryptographic Algorithm and the AES Algorithm in Securing Document Files,” J. Media Comput. Sci., vol. 2, no. 1, pp. 41–48, 2023, doi: 10.37676/jmcs.v2i1.3348.
C. Umam and M. Muslih, “Enkripsi Data Teks Dengan AES dan Steganografi DWT,” InComTech J. Telekomun. dan Komput., vol. 13, no. 1, p. 28, 2023, doi: 10.22441/incomtech.v13i1.15059.
W. Diaztary, D. Atmajaya, F. Umar, Purnawansyah, Harlinda, and S. M. Abdullah, “Tiny Encryption Algorithm on Discrete Cosine Transform Watermarking,” 3rd 2021 East Indones. Conf. Comput. Inf. Technol. EIConCIT 2021, pp. 415–420, 2021, doi: 10.1109/EIConCIT50028.2021.9431930.
B. O. Sinaga, S. Sinurat, and T. Zebua, “Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen,” J. Informatics …, vol. 1, no. 4, pp. 144–152, 2021.
M. Furqan, Sriani, and D. Vita, “Application Of RSA-CRT Cryptographic Methods And LSB- LCG Steganography Method In Message Security Systems With Video Media,” J. Infokum, vol. 10, no. 3, pp. 93–103, 2022.
A. Sudrajat, Y. H. Prasetyo, and M. Kusumawardani, “Implementasi Enkripsi Advanced Encryption Standard (AES-128) Mode Cipher Block Chaining (CBC) sebagai Keamanan Komunikasi Pergerakan Robot Humanoid KRSBI,” J. Jartel J. Jar. Telekomun., vol. 11, no. 1, pp. 6–11, 2021, doi: 10.33795/jartel.v11i1.16.
N. A. Ramadhani and I. Susilawati, “Penerapan Steganografi untuk Penyisipan Pesan Teks pada Citra Digital dengan Menggunakan Metode Least Significant Bit,” J. Multimed. Artif. Intell., vol. 4, no. 1, pp. 21–27, 2020.
A. P. Ratnasari and F. A. Dwiyanto, “Metode Steganografi Citra Digital,” Sains, Apl. Komputasi dan Teknol. Inf., vol. 2, no. 2, p. 52, 2020, doi: 10.30872/jsakti.v2i2.3300.
W. Mahmud and E. Mintorini, “Pengamanan Data Kombinasi Metode Cipher Block Chaining dan Modifikasi LSB,” Techno.Com, vol. 19, no. 1, pp. 97–102, 2020, doi: 10.33633/tc.v19i1.3375
D. E. Kurniawan and N. Narupi, “Teknik Penyembunyian Data Menggunakan Kombinasi Kriptografi Rijndael dan Steganografi Least Significant Bit (LSB)”, JuTISI, vol. 2, no. 3, Dec. 2016.
D. E. Kurniawan, N. R. Hartadi, and P. Prasetyawan, “Analisis Hasil Teknik Penyembunyian Hak Cipta Menggunakan Transformasi DCT dan RSPPMC pada Jejaring Sosial,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 3, Art. no. 3, Aug. 2018, doi: 10.25126/jtiik.201853692.
Copyright (c) 2024 Muhammad Wildan, Wahid Miftahul Ashari
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).