The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images
DOI:
https://doi.org/10.33633/jais.v8i1.7324Abstract
Security and confidentiality are essential aspects needed in the process of exchanging messages. Maintaining the message's security and confidentiality can be done by encrypting the message with cryptographic techniques to protect the message. However, the encrypted message (ciphertext) usually raises suspicion from eavesdroppers so that they try to unravel the contents of the message or damage the contents of the message or prevent the message from reaching the intended recipient. To avoid eavesdroppers' suspicion of encrypted messages, after encryption, the ciphertext can then be inserted into an image using steganography techniques so that eavesdroppers do not know whether there is a secret message in an image. In this research, the authors use the Improved AES-128 (Advanced Encryption Standard) Algorithm to encrypt messages and LSB (Least Significant Bit) Algorithm to insert ciphertext into an image. Where the AES Algorithm Improvement is made by adding a sending and receiving applications ID to modify the Key Schedule process, with modifications to the Key Schedule process, messages can only be read on the original recipient's cellphone by entering the correct key. The results of this study show that eavesdroppers do not easily know the existence of the ciphertext, besides that even if the eavesdroppers get the ciphertext and know the encryption key, the message remains unreadable on their cellphone because the ID of the application sending or receiving the message has changed.References
Putra, R. A. (2019). Tantangan Media Massa Dalam menghadapi era disrupsi teknologi informasi. JUSIFO (Jurnal Sistem Informasi), 5(1), 1-6.
Fatma, Y., Hafid, A., & Dani, H. O. (2020). Peningkatan Keamanan Pengiriman Pesan Teks: Kombinasi Advanced Encryption Standard (AES) 128 dan Least Significant Bit (LSB). JUSIFO (Jurnal Sistem Informasi), 6(2), 111-120.
Gunawan, C. E., & Fenando, F. (2018). Pengukuran Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Studi Kasus di PUSTIPD UIN Raden Fatah Palembang. JUSIFO (Jurnal Sistem Informasi), 4(2), 121-132.
Darmayanti, I., Astrida, D. N., & Ariyus, D. (2019). Penerapan Keamanan Pesan Teks Menggunakan Modifikasi Algoritma Caisar Chiper Kedalam Bentuk Sandi Morse. Jurnal Ilmiah IT CIDA, 4(1).
Alasi, T. S., Wanto, R., & Sitanggang, V. H. (2020). Implementasi Kriptografi Algoritma Idea Pada Keamanan Data Teks Berbasis Android. Jurnal Informasi Komputer Logika, 2(1).
Gustiawan, H., & Rian, H. (2022). Pengamanan Dokumen Digital Perusahaan Menggunakan Metode Least Significant Bit (LSB) Dan Algoritma RC4 Stream Chipher. Jurnal Teknologi Informatika dan Komputer, 8(1), 228-246.
Novianto, D., & Setiawan, Y. (2019). Aplikasi Pengamanan Informasi Menggunakan Metode Least Significant Bit (Lsb) dan Algoritma Kriptografi Advanced Encryption Standard (AES). Jurnal Informatika Global, 9(2).
Panwar, S., Kumar, M., & Sharma, S. (2019, May). Digital image steganography using modified lsb and aes cryptography. In International Conference on Internet of Things and Connected Technologies (pp. 366-375). Springer, Cham.
Irawan, C., & Rachmawanto, E. (2021). Keamanan Data Menggunakan Gabungan Kriptografi AES dan RSA. Proceeding SENDI_U, 567-573.
Fernando, E., Agustin, D., Irsan, M., Murad, D. F., Rohayani, H., & Sujana, D. (2019, September). Performance comparison of symmetries encryption algorithm AES and DES with raspberry pi. In 2019 International Conference on Sustainable Information Engineering and Technology (SIET) (pp. 353-357). IEEE.
Pabbi, A., Malhotra, R., & Manikandan, K. (2021, March). Implementation of Least Significant Bit Image Steganography with Advanced Encryption Standard. In 2021 International Conference on Emerging Smart Computing and Informatics (ESCI) (pp. 363-366). IEEE.
Gustiawan, H., & Rian, H. (2022). Pengamanan Dokumen Digital Perusahaan Menggunakan Metode Least Significant Bit (LSB) Dan Algoritma RC4 Stream Chipher. Jurnal Teknologi Informatika dan Komputer, 8(1), 228-246.
Wiranata, A. D., & Aldisa, R. T. (2021). Aplikasi Steganografi Menggunakan Least Significant Bit (LSB) dengan Enkripsi Caesar Chipper dan Rivest Code 4 (RC4) Menggunakan Bahasa Pemrograman JAVA. Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi), 5(3), 277-281.
Damrudi, M., & Aval, K. J. (2019). Image Steganography using LSB and Encrypted Message with AES, RSA, DES, 3DES and Blowfish. International Journal of Engineering and Advanced Technology (IJEAT), 8(6S3).
Anwar, F., Rachmawanto, E. H., & Sari, C. A. (2019, July). Stegocrypt scheme using LSB-AES base64. In 2019 International conference on information and communications technology (ICOIACT) (pp. 85-90). IEEE.
Yusfrizal, Y., Meizar, A., Kurniawan, H., & Agustin, F. (2018, August). Key management using combination of Diffie–Hellman key exchange with AES encryption. In 2018 6th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-6). IEEE.
Al-Hilali, A. A., Jumma, L. F., & Amory, I. A. (2019). High-Quality Image Security Implementation Using 128-Bit Based on Advanced Encryption Standard algorithm. Journal of Southwest Jiaotong University, 54(6).
Hamdy, A. (2021). Image Processing and AES for Secure Communications. (Bachelor Thesis, The German University in Cairo).
Downloads
Published
Issue
Section
License
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).