Upload File Security on the Server Using LSB and Hill Cipher

Lekso Budi Handoko, Chaerul Umam, Adelia Syifa Anindita

Abstract


The rapid development of technology not only has a positive impact, but also can have a negative impact such as the development of cyber crime that can cause messages to be unsafe. Message security can be protected using cryptography to convert messages into secret passwords. Steganography is a technique of hiding messages by inserting messages into images that are used to increase message security. In this study, it discusses a combination of hill cipher and LSB algorithms to secure messages. The message used is a 3-bit grayscale image for steganography and text messages with 32, 64 and 128 characters for cryptography. The measuring instruments used in this study are MSE, PSNR, Entropy and travel time (CPU time). Test results prove an increase in security without too damaging the image. This is evidenced by the results of the MSE trial which has a value far below the value 1, the PSNR is> 65 dB with a range of entropy values of 5 to 7, and travel times are almost the same.

Full Text:

PDF

References


D. Nofriansyah, S. Defit, G. W. Nurcahyo, G. Ganefri, R. Ridwan, A. S. Ahmar and R. Rahim, "A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm," Journal of Physiscs : Conference Series, vol. 954, 2018.

Sangeeta and A. Kaur, "A Review on Symmetric Key Cryptography Algorithms," International Journal of Advanced Research in Computer Science , vol. 8, no. 4, pp. 358-361, 2017.

A. Reddy, Vishnuvardhan and Madhuviswanatham, "A Modified Hill Cipher Based on Circulant Matrices," Procedia Technology, vol. 4, pp. 114-118, 2012.

S. Sun and Y. Guo, "A Novel Image Steganography Based on Contourlet Transform and Hill Cipher," Journal of Information Hiding and Multimedia Signal Processing, vol. 6, no. 5, pp. 889-897, 2015.

N. A. Abu, P. W. Adi and O. Mohd, "Robust Digital Image Steganography within Coefficient Difference on Integer Haar Wavelet Transform," International Journal of Video&Image Processing and Network Security IJVIPNS-IJENS, vol. XIV, no. 2, pp. 1-7, 2014.

C. Irawan, D. Setiadi, C. A. Sari and E. H. Rachmawanto, "Hiding and Securing Message on Edge Areas of Image using LSB Steganography and OTP Encryption," Semarang, 2017.

P. Malathi and T. Gireeshkumar, "Relating the embedding efficiency of LSB Steganography techniques in Spatial and Transform domains," Procedia Computer Science, vol. 93, p. 878 – 885, 2016.

E. H. Rachmawanto, R. S. Amin, D. Setiadi and C. A. Sari, "A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size," Semarang, 2017.

E. J. Kusuma, C. A. Sari, E. H. Rachmawanto and D. Setiadi, "A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography," J. ICT Res. Appl, vol. 12, no. 2, pp. 103-122, 2018.

G. Swain, "A steganographic method combining LSB substitution and PVD in a block," Procedia Computer Science, vol. 85, p. 39 – 44, 2016.

A. Devi, A. Sharma and A. Rangra, "A Review on DES, AES and Blowfish for Image Encryption & Decryption," International Journal of Computer Science and Information Technologies, vol. 6, no. 3, pp. 3034-3036, 2015.




DOI: https://doi.org/10.33633/jais.v4i1.2331

Article Metrics

Abstract view : 394 times
PDF - 292 times

Refbacks

  • There are currently no refbacks.


Flag Counter

 

 

 

 

Journal of Applied Intelligent System (e-ISSN : 2502-9401p-ISSN : 2503-0493) is published by Department of Informatics Universitas Dian Nuswantoro Semarang and IndoCEISS.

  

 

Journal of Applied Intelligent System indexed by :


This journal is under licensed of Creative Commons Attribution 4.0 International License.

Visitor Stats