Data Security Using Color Image Based on Beaufort Cipher, Column Transposition and Least Significant Bit (LSB)

Lekso Budi Handoko, Chaerul Umam

Abstract


One of cryptography algorithm which used is beaufort cipher. Beaufort cipher has simple encryption procedure, but this algorithm has good enough endurance to attack. Unauthorized people cannot break up decrypt without know matrix key used. This algorithm used to encrypt data in the form of text called plaintext. The result of this algorithm is string called ciphertext which difficult to understood that can causing suspicious by other people. Beaufort cipher encryption tested with avalanche effect algorithm with modified one, two, three and all key matrix which resulting maximum 31.25% with all key modification so another algorithm is needed to get more secure. Least Significant Bit (LSB) used to insert ciphertext created to form of image. LSB chosen because easy to use and simple, just alter one of last bit image with bit from message. LSB tested with RGB, CMYK, CMY and YUV color modes inserted 6142 characters resulting highest PSNR value 51.2546 on YUV color mode. Applying steganography technique has much advantage in imperceptibility, for example the image product very similar with original cover image so the difference can not differentiate image with human eye vision. Image that tested as much ten images, that consist of five 512 x 512 and five 16 x 16 image. While string message that used is 240, 480 and 960 character to test 512 x 512 image and 24, 48 and 88 character to test 16 x 16 image. The result of experiment measured with Mean Square Error (MSE) and Peak Signal Ratio (PSNR) which has minimum PSNR 51.2907 dB it means stego image that produced hood enough. Computation time calculation using tic toc in matlab resulting fastest value 0.041636 to encrypt 2000 character and the longest time is 4.10699 second to encrypt 6000 character and inserting to image. Amount of character and amount of multi algorithm can affecting computation time calculation.


Full Text:

PDF

References


K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” Journal of Applied Intelligent System, vol. 3, no. 1, pp. 28–38, 2018.

A. K. Sadasivuni, A. Chandrasekhar, D. Chaya, K. 2#, and S. A. Kumar, “SYMMETRIC KEY CRYPTOSYSTEM FOR MULTIPLE ENCRYPTIONS,” International Journal of Mathematics Trends and Technology, [Online]. Available: http://www.ijmttjournal.org

J. P. Sermeno, K. A. S. Secugal, and N. E. Mistio, “Modified Vigenere cryptosystem: An integrated data encryption module for learning management system,” International Journal of Applied Science and Engineering, vol. 18, no. 4(Special Issue), pp. 1–10, 2021, doi: 10.6703/IJASE.202106_18(4).003.

O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, and A. A. M. Khalaf, “Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Steganography Techniques to Hide Data,” Procedia Comput Sci, vol. 182, pp. 5–12, 2021, doi: 10.1016/j.procs.2021.02.002.

G. Swain and A. K. Sahu, “Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis,” International Journal of Electronic Security and Digital Forensics, vol. 11, no. 4, p. 458, 2019, doi: 10.1504/IJESDF.2019.10021739.

D. Suprihant et al., “Combination Vigenere Cipher and One Time Pad for Data Security,” International Journal of Engineering & Technology, vol. 7, no. 2, pp. 92–94, 2018.

R. Verma, A. Kumari, A. Anand, and V. S. S. Yadavalli, “Revisiting Shift Cipher Technique for Amplified Data Security”, doi: 10.47852/bonviewJCCE2202261.

R. Verma, A. Kumari, A. Anand, and V. S. S. Yadavalli, “Revisiting Shift Cipher Technique for Amplified Data Security,” Journal of Computational and Cognitive Engineering, 2022, doi: 10.47852/bonviewJCCE2202261.

E. Irfan Riaz Shohab Sandhu et al., “An Enhanced Vigenere Cipher For Data Security,” INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 5, no. 03, 2016, [Online]. Available: www.ijstr.org

E. W. Abood et al., “Audio steganography with enhanced LSB method for securing encrypted text with bit cycling,” Bulletin of Electrical Engineering and Informatics, vol. 11, no. 1, pp. 185–194, Feb. 2022, doi: 10.11591/eei.v11i1.3279.

B. B. Ahamed and M. Krishnamoorthy, “SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm,” Journal of the Operations Research Society of China, Aug. 2020, doi: 10.1007/s40305-020-00320-x.

M. Fadlan, Suprianto, Muhammad, and Y. Amaliah, “Double layered text encryption using beaufort and hill cipher techniques,” in 2020 5th International Conference on Informatics and Computing, ICIC 2020, Nov. 2020. doi: 10.1109/ICIC50835.2020.9288538.

E. J. Kusuma, O. R. Indriani, C. A. Sari, E. H. Rachmawanto, and D. R. I. M. Setiadi, “An imperceptible LSB image hiding on edge region using DES encryption,” in 2017 International Conference on Innovative and Creative Information Technology (ICITech), Nov. 2017, pp. 1–6. doi: 10.1109/INNOCIT.2017.8319132.

C. Irawan, E. H. Rachmawanto, C. A. Sari, and C. A. Sugianto, “SUPER ENKRIPSI FILE DOKUMEN MENGGUNAKAN BEAUFORT CIPHER DAN TRANSPOSISI KOLOM,” in Semnas LPPM UMP, 2020, pp. 556–563.

C. A. Sari, G. Ardiansyah, D. R. I. Moses Setiadi, and E. H. Rachmawanto, “An improved security and message capacity using AES and Huffman coding on image steganography,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 17, no. 5, pp. 2400–2409, 2019, doi: 10.12928/TELKOMNIKA.v17i5.9570.

E. H. Rachmawanto and C. A. Sari, “KEAMANAN FILE MENGGUNAKAN TEKNIK KRIPTOGRAFI SHIFT CIPHER,” Techno.COM, vol. 14, no. 4, pp. 329–335, 2015.

C. A. Sari, T. S. Sukamto, D. Eko, and H. Rachmawanto, “ANALISA ROBUSTNESS CITRA DIGITAL PADA WATERMARKING DCT-DWT,” in ProsidingSNST ke-9Tahun2018, 2018, pp. 19–22.

H. K. Ronaldo Cahyono, C. Atika Sari, D. R. Ignatius Moses Setiadi, and E. Hari Rachmawanto, “Dual Protection on Message Transmission based on Chinese Remainder Theorem and Rivest Cipher 4,” in 2019 International Conference on Information and Communications Technology (ICOIACT), Jul. 2019, pp. 74–78. doi: 10.1109/ICOIACT46704.2019.8938568.

E. H. Rachmawanto, K. Prasetyo, C. A. Sari, I. M. S. de Rosal, and N. Rijati, “Secured PVD Video Steganography Method based on AES and Linear Congruential Generator,” in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Nov. 2018, pp. 163–167. doi: 10.1109/ISRITI.2018.8864466.

L. B. Handoko and A. D. Krismawan, “SUPER ENCRYPTION APPLICATION OF CRYPTOGRAPHY USING COMBINATION OF COLUMNAR TRANSPOSITION AND VIGENERE CIPHER,” in Seminar Nasional LPPM UMP, 2020, pp. 534–539.

K. A. Darabkh, “A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB,” Information Technology And Control, vol. 46, no. 1, pp. 16–36, Apr. 2017, doi: 10.5755/j01.itc.46.1.15253.

S. Bukhari, M. S. Arif, M. R. Anjum, and S. Dilbar, “Enhancing security of images by Steganography and Cryptography techniques,” in 2016 Sixth International Conference on Innovative Computing Technology (INTECH), Aug. 2016, pp. 531–534. doi: 10.1109/INTECH.2016.7845050.

D. Tao, S. Di, X. Liang, Z. Chen, and F. Cappello, “Fixed-PSNR Lossy Compression for Scientific Data,” May 2018, [Online]. Available: http://arxiv.org/abs/1805.07384

X. Zhang, L. Wang, G. Cui, and Y. Niu, “Entropy-Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems,” Int J Opt, vol. 2019, pp. 1–13, Aug. 2019, doi: 10.1155/2019/3594534.

D. N. Aini, D. R. I. Moses Setiadi, S. N. Putro, E. H. Rachmawanto, and C. A. Sari, “Survey of Methods in the Spatial Domain Image Steganography based Imperceptibility and Payload Capacity,” in 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), Sep. 2019, pp. 434–439. doi: 10.1109/ISEMANTIC.2019.8884333.




DOI: https://doi.org/10.33633/jais.v8i2.7863

Article Metrics

Abstract view : 78 times
PDF - 40 times

Refbacks

  • There are currently no refbacks.


Flag Counter

 

 

 

 

Journal of Applied Intelligent System (e-ISSN : 2502-9401p-ISSN : 2503-0493) is published by Department of Informatics Universitas Dian Nuswantoro Semarang and IndoCEISS.

  

 

Journal of Applied Intelligent System indexed by :


This journal is under licensed of Creative Commons Attribution 4.0 International License.

Visitor Stats