Keamanan Pesan Menggunakan Kriptografi dan Steganografi Least Significant Bit pada File Citra Digital

Dian Eka Wijayanti, Wulansari Romadlon

Abstract


In the current era, data security disturbances often occur, such as data theft by unwanted people. To overcome security problems can be handled using cryptography and steganography methods. The cryptography process generates random writing that can obscure the message making it difficult for others to read. However, cryptography itself is still too weak to secure messages, so steganography is needed to disguise the existence of the message so that it is not visible to the human eye. Apart from hiding messages, another goal is to know the impact of message insertion. In this study, the encryption steps were followed by insertion and decryption followed by extraction. In the secret message encryption process using two algorithms, namely Vigenere Cipher and Playfair Cipher. In the process of inserting a secret message using Least Significant Bit (LSB) steganography. The results of the combination of cryptography and steganography are able to secure secret messages without causing significant changes even though the digital image used before and after the steganography process has increased in size, the Mean Square Error (MSE) value obtained is 0.000136 and the Peak Signal to Noise Ratio (PSNR) value is obtained. 86.8062 dB and the result of message encryption is enough to obscure the relationship pattern in the modified secret message with an avalanche effect value of 53.06%.


Keywords


Cryptography; Vigenere Cipher; Playfair Cipher; Steganography; Least Significant Bit; Digital Image

Full Text:

PDF

References


R. K. Choubey and A. Hashmi, “Cryptographic Techniques in Information Security,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 1, no. 3, pp. 2456–3307, 2018, [Online]. Available: www.ijsrcseit.com

A. E. Handoyo, D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, and A. Susanto, “Message Concealment and Encryption Technique in Digital Image with Combination of LSB and RSA Methods,” J. Teknol. dan Sist. Komput., vol. 6, no. 1, pp. 37–43, Feb. 2018, doi: 10.14710/jtsiskom.6.1.2018.37-43.

A. Hafiz, “Steganografi Berbasis Citra Digital Untuk Menyembunyikan Data Menggunakan Metode Least Significant Bit (LSB),” J. Cendikia, vol. XVII, 2019.

A. Claudy Frobenius and E. S. Rachmat Hidayat H S, “Steganografi LSB dengan Modifikasi Kriptografi: Caesar, Vigenere, Hill Cipher Dan Playfair Pada Image,” Melek IT Inf. Technol. Journal., vol. 6, no. 1, pp. 33–40, 2020.

L. Budi Handoko, “Sekuriti Teks Menggunakan Vigenere Cipher Dan Hill Cipher,” 2022.

A. PANDEY and N. Badal, “A Modified Circular Version of Playfair Cipher,” SSRN Electron. J., 2019, doi: 10.2139/ssrn.3351022.

A. O. Modupe, A. E. Adedoyin, and A. O. Titilayo, “A Comparative Analysis of LSB, MSB and PVD Based Image Steganography,” Int. J. Res. Rev., vol. 8, no. 9, pp. 373–377, Sep. 2021, doi: 10.52403/ijrr.20210948.

R. Indrayani and Subektiningsih, “Perbandingam Metode LSB, MSB, dan EoF pada Implementasi Steganografi Citra dengan Format JPEG,” vol. 12, 2022.

B. K. Yakti and R. H. Prayitno, “Perbandingan Dan Analisa Gambar Pada Steganografi Berdasarkan MSE Dan PSNR,” ICIT J., vol. 6, no. 2, pp. 138–152, 2020, doi: 10.33050/icit.v6i2.1105.

B. Deepa, V. Maheswari, and V. Balaji, “An Efficient Cryptosystem Using Playfair Cipher Together with Graph Labeling Techniques,” J. Phys. Conf. Ser., vol. 1964, no. 2, 2021, doi: 10.1088/1742-6596/1964/2/022016.

Aminudin, A. F. Helmi, and S. Arifianto, “Analisa Kombinasi Algoritma Merkle-Hellman Knapsack Dan Logaritma Diskrit Pada Aplikasi Chat,” J Surg CI Res, vol. 5, no. 1, pp. 47–55, 2014.

R. Kumar, G. Sharma, and V. Sanduja, “A Real Time Approach to Compare PSNR and MSE Value of Different Original Images and Noise ( Salt and Pepper, Speckle, Gaussian) Added Images,” 2018. [Online]. Available: www.ijltemas.in

K. Hani, “Algoritma Kriptografi dan Steganografi Untuk Pengamanan Pesan Ke Dalam Citra,” Universitas Islam Negeri Maulana Malik Ibrahim Malang, 2020.




DOI: https://doi.org/10.37905/euler.v10i2.16646

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Dian Eka Wijayanti, Wulansari Romadlon

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.


Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi has been indexed by:


                         EDITORIAL OFFICE OF EULER : JURNAL ILMIAH MATEMATIKA, SAINS, DAN TEKNOLOGI

 Department of Mathematics, Faculty of Mathematics and Natural Science, Universitas Negeri Gorontalo
Jl. Prof. Dr. Ing. B. J. Habibie, Tilongkabila, Kabupaten Bone Bolango 96554, Gorontalo, Indonesia
 Email: euler@ung.ac.id
 +6287743200854 (Call/SMS/WA)
 Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi (p-ISSN: 2087-9393 | e-ISSN:2776-3706) by Department of Mathematics Universitas Negeri Gorontalo is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.  Powered by Public Knowledge Project OJS.