skip to main content

Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA

Message Concealment and Encryption Technique in Digital Image with Combination of LSB and RSA Methods

Department of Informatics, Universitas Dian Nuswantoro, Indonesia

Received: 27 Nov 2017; Published: 1 Feb 2018.
Open Access Copyright (c) 2018 Jurnal Teknologi dan Sistem Komputer under http://creativecommons.org/licenses/by-sa/4.0.

Citation Format:
Abstract

This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to digital imagery. Digital image pixel values range from 0 to 255, making the keys used in RSA limited enough and less secure. So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. This was shown by the results of PSNR 57.2258dB and MSE 0.1232dB. This method was also resistant to salt and pepper attacks.

Keywords: Steganography;cryptography;LSB;RSA;image encryption

Article Metrics:

  1. D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari, "Secure Image Steganography Algorithm Based on DCT with OTP Encryption," Journal of Applied Intelliegent System, vol. 2, no. 1, pp. 1-11, 2017
  2. A. Susanto, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, "Hybrid Method using HWT-DCT for Image Watermarking," in International Conference on Information Technology for Cyber and IT Service Management (CITSM), Denpasar, 2017
  3. E. H. Rachmawanto, R. S. Amin, D. R. I. M. Setiadi, and C. A. Sari, "A Performance Analysis StegoCrypt Algorithm based on LSB-AES 128 bit in Various Image Size," in International Seminar on Technology for Technology of Information and Communication (iSemantic), Semarang, 2017
  4. R. D. Ardy, O. R. Indriani, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, "Digital Image Signature using Triple Protection Cryptosystem (RSA, Vigenere, and MD5)," in International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS), Yogyakarta, 2017
  5. D. R. I. M. Setiadi, T. Sutojo, E. H. Rachmawanto, and C. A. Sari, "Fast and Efficient Image Watermarking Algorithm using Discrete Tchebichef Transform," in International Conference on Information Technology for Cyber and IT Service Management (CITSM), Denpasar, 2017
  6. C. Irawan, D. R. I. M. Setiadi, C. A. Sari and E. H. Rachmawanto, "Hiding and Securing Message on Edge Areas of Image using LSB Steganography and OTP Encryption," in International Conference on Informatics and Computational Sciences (ICICoS), Semarang, 2017
  7. M. Najih, D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, and S. Astuti, "An Improved Secure Image Hiding Technique Using PN-Sequence Based On DCT-OTP," in International Conference on Informatics and Computational Sciences (ICICoS), Semarang, 2017
  8. A. Setyono, D. R. I. M. Setiadi, and Muljono, "StegoCrypt Method using Wavelet Transform and One-Time Pad for Secret Image Delivery," in International Conference on Information Technology, Computer and Electrical Engineering (ICITACEE), Semarang, 2017
  9. T. Shahana, "A Secure DCT Image Steganography based on Public-Key Cryptography," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 2039-2043, 2013
  10. M. S. Lahase, and S. A. Dhole, "Hybrid Encryption and Decryption Method Using LSB and RSA in Steganography," International Journal of Advances in Science, Engineering and Technology(IJASEAT), vol. 5, no. 3, pp. 68-70, 2015
  11. M. F. Alamsyah, "Implementasi Metode Steganografi Least Significant Bit dengan Algoritma RSA pada Citra BMP," Skripsi, Universitas Dian Nuswantoro, 2015
  12. O.R. Arifin, and T. Lucky, "Implementasi Kriptografi dan Steganografi menggunakan Algoritma RSA dan metode LSB," Skripsi, Universitas Negeri Malang, 2013
  13. B. J. Saha, C. Pradhan, K. K. Kabi, and A. K. Bisoi, "Robust Watermarking Technique using Arnold's Transformation and RSA in Discrete Wavets," in International Conference on Information Systems and Computer Networks (ISCON), Mathura, 2014

Last update:

  1. Implementation of vigenere cipher 128 and square rotation in securing text messages

    Rihartanto Rihartanto, Riris Kurnia Ningsih, Achmad Fanany Onnilita Gaffar, Didi Susilo Budi Utomo. Jurnal Teknologi dan Sistem Komputer, 8 (3), 2020. doi: 10.14710/jtsiskom.2020.13476
  2. Kombinasi Least Significant Bit (LSB-1) Dan Rivest Shamir Adleman (RSA) Dalam Kriptografi Citra Warna

    Christy Atika Sari, Wellia Shinta Sari. Jurnal Masyarakat Informatika, 13 (1), 2022. doi: 10.14710/jmasif.13.1.43314

Last update: 2024-11-03 13:17:26

No citation recorded.