Upload File Security on the Server Using LSB and Hill Cipher
DOI:
https://doi.org/10.33633/jais.v4i1.2331Abstract
The rapid development of technology not only has a positive impact, but also can have a negative impact such as the development of cyber crime that can cause messages to be unsafe. Message security can be protected using cryptography to convert messages into secret passwords. Steganography is a technique of hiding messages by inserting messages into images that are used to increase message security. In this study, it discusses a combination of hill cipher and LSB algorithms to secure messages. The message used is a 3-bit grayscale image for steganography and text messages with 32, 64 and 128 characters for cryptography. The measuring instruments used in this study are MSE, PSNR, Entropy and travel time (CPU time). Test results prove an increase in security without too damaging the image. This is evidenced by the results of the MSE trial which has a value far below the value 1, the PSNR is> 65 dB with a range of entropy values of 5 to 7, and travel times are almost the same.References
D. Nofriansyah, S. Defit, G. W. Nurcahyo, G. Ganefri, R. Ridwan, A. S. Ahmar and R. Rahim, "A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm," Journal of Physiscs : Conference Series, vol. 954, 2018.
Sangeeta and A. Kaur, "A Review on Symmetric Key Cryptography Algorithms," International Journal of Advanced Research in Computer Science , vol. 8, no. 4, pp. 358-361, 2017.
A. Reddy, Vishnuvardhan and Madhuviswanatham, "A Modified Hill Cipher Based on Circulant Matrices," Procedia Technology, vol. 4, pp. 114-118, 2012.
S. Sun and Y. Guo, "A Novel Image Steganography Based on Contourlet Transform and Hill Cipher," Journal of Information Hiding and Multimedia Signal Processing, vol. 6, no. 5, pp. 889-897, 2015.
N. A. Abu, P. W. Adi and O. Mohd, "Robust Digital Image Steganography within Coefficient Difference on Integer Haar Wavelet Transform," International Journal of Video&Image Processing and Network Security IJVIPNS-IJENS, vol. XIV, no. 2, pp. 1-7, 2014.
C. Irawan, D. Setiadi, C. A. Sari and E. H. Rachmawanto, "Hiding and Securing Message on Edge Areas of Image using LSB Steganography and OTP Encryption," Semarang, 2017.
P. Malathi and T. Gireeshkumar, "Relating the embedding efficiency of LSB Steganography techniques in Spatial and Transform domains," Procedia Computer Science, vol. 93, p. 878 – 885, 2016.
E. H. Rachmawanto, R. S. Amin, D. Setiadi and C. A. Sari, "A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size," Semarang, 2017.
E. J. Kusuma, C. A. Sari, E. H. Rachmawanto and D. Setiadi, "A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography," J. ICT Res. Appl, vol. 12, no. 2, pp. 103-122, 2018.
G. Swain, "A steganographic method combining LSB substitution and PVD in a block," Procedia Computer Science, vol. 85, p. 39 – 44, 2016.
A. Devi, A. Sharma and A. Rangra, "A Review on DES, AES and Blowfish for Image Encryption & Decryption," International Journal of Computer Science and Information Technologies, vol. 6, no. 3, pp. 3034-3036, 2015.
Downloads
Published
Issue
Section
License
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).