Crypto-Stegano Color Image Based on Rivest Cipher 4 (RC4) and Least Significant Bit (LSB)

Authors

  • Eko Hari Rachmawanto Universitas Dian Nuswantoro http://orcid.org/0000-0001-6014-1903
  • Hanif Maulana Hasbi Universitas Dian Nuswantoro
  • Christy Atika Sari Universitas Dian Nuswantoro
  • Candra Irawan Universitas Dian Nuswantoro
  • Reza Bayu Ahmad Inzaghi Universitas Dian Nuswantoro
  • Ilham Januar Akbar Universitas Dian Nuswantoro

DOI:

https://doi.org/10.33633/jais.v8i2.8497

Abstract

Rivest Cipher 4 (RC4) has the main factors that make this algorithm widely used, namely its speed and simplicity, so it is known to be easy for efficient implementation. The nature of the key in the RC4 algorithm is symmetrical and performs a plain per digit or byte per byte encryption process with binary operations (usually XOR) with a semirandom number. To improve the visual image after the encryption process, in this article we use the Least Significant Bit (LSB). In this study, the quality of the stego image and the original image has been calculated using MSE, PSNR and Entropy. Experiments were carried out by images with a size of 128x128 pixels to 2048x2048 pixels. Experiments using imperceptibility prove that the stego image quality is very good. This is evidenced by the image quality which has an average PSNR value above 53 dB, while the lowest PSNR value is 48 dB with a minimum dimension of 128x128 pixels.

References

J. P. Sermeno, K. A. S. Secugal, and N. E. Mistio, “Modified Vigenere cryptosystem: An integrated data encryption module for learning management system,” International Journal of Applied Science and Engineering, vol. 18, no. 4(Special Issue), pp. 1–10, 2021, doi: 10.6703/IJASE.202106_18(4).003.

A. K. Sadasivuni, A. Chandrasekhar, D. Chaya, K. 2#, and S. A. Kumar, “SYMMETRIC KEY CRYPTOSYSTEM FOR MULTIPLE ENCRYPTIONS,” International Journal of Mathematics Trends and Technology, [Online]. Available: http://www.ijmttjournal.org

O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, and A. A. M. Khalaf, “Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Steganography Techniques to Hide Data,” Procedia Comput Sci, vol. 182, pp. 5–12, 2021, doi: 10.1016/j.procs.2021.02.002.

K. Prasad and H. Mahato, “Cryptography using generalized Fibonacci matrices with Affine-Hill cipher,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 8, pp. 2341–2352, Nov. 2022, doi: 10.1080/09720529.2020.1838744.

H. K. Ronaldo Cahyono, C. Atika Sari, D. R. Ignatius Moses Setiadi, and E. Hari Rachmawanto, “Dual Protection on Message Transmission based on Chinese Remainder Theorem and Rivest Cipher 4,” in 2019 International Conference on Information and Communications Technology (ICOIACT), IEEE, Jul. 2019, pp. 74–78. doi: 10.1109/ICOIACT46704.2019.8938568.

A. H. Khaleel and I. Q. Abduljaleel, “Secure image hiding in speech signal by steganography-mining and encryption,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 3, p. 1692, Mar. 2021, doi: 10.11591/ijeecs.v21.i3.pp1692-1703.

S. Goel, A. Rana, and M. Kaur, “A review of comparison techniques of image steganographyn A Review of Comparison Techniques of Image Steganography,” Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc, vol. 13, 2013, [Online]. Available: https://www.researchgate.net/publication/335972811

I. Gunawan, Sumarno, H. S. Tambunan, E. Irawan, H. Qurniawan, and D. Hartama, “Combination of Caesar Cipher Algorithm and Rivest Shamir Adleman Algorithm for Securing Document Files and Text Messages,” in Journal of Physics: Conference Series, Institute of Physics Publishing, Sep. 2019. doi: 10.1088/1742-6596/1255/1/012077.

K. A. Darabkh, “A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB,” Information Technology And Control, vol. 46, no. 1, pp. 16–36, Apr. 2017, doi: 10.5755/j01.itc.46.1.15253.

K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” Journal of Applied Intelligent System, vol. 3, no. 1, pp. 28–38, 2018.

N. Laila and A. S. Rms, “IMPLEMENTASI STEGANOGRAFI LSB DENGAN ENKRIPSI VIGENERE CIPHER PADA CITRA,” Computer Science Informatics Journal, vol. 1, no. 2, 2018.

M. H. Al Kamali, B. Hidayat, and N. Andini, “STEGANOGRAFI GANDA PADA CITRA BERBASISKAN METODE LSB DAN DCT DENGAN MENGGUNAKAN DERET FIBONACCI,” in Seminar Nasional Teknologi Informasi dan Multimedia, 2018.

S. Bukhari, M. S. Arif, M. R. Anjum, and S. Dilbar, “Enhancing security of images by Steganography and Cryptography techniques,” in 2016 Sixth International Conference on Innovative Computing Technology (INTECH), IEEE, Aug. 2016, pp. 531–534. doi: 10.1109/INTECH.2016.7845050.

E. Narayan, A. Mishra, and S. Kr Singh, “Cryptography Protection of Digital Signals using Fibonacci-Pell Transformation via Golden Matrix,” Int J Eng Adv Technol, 2020, doi: 10.35940/ijeat.B2069.1210220.

K. Joshi and R. Yadav, “A new LSB-S image steganography method blend with Cryptography for secret communication,” in 2015 Third International Conference on Image Information Processing (ICIIP), IEEE, Dec. 2015, pp. 86–90. doi: 10.1109/ICIIP.2015.7414745.

L. B. Handoko and A. D. Krismawan, “SUPER ENCRYPTION APPLICATION OF CRYPTOGRAPHY USING COMBINATION OF COLUMNAR TRANSPOSITION AND VIGENERE CIPHER,” in Seminar Nasional LPPM UMP, 2020, pp. 534–539.

I. Gede, A. Putra Dewangga, T. W. Purboyo, and R. A. Nugrahaeni, “A New Approach of Data Hiding in BMP Image Using LSB Steganography and Caesar Vigenere Cipher Cryptography,” 2017. [Online]. Available: http://www.ripublication.com

K. Muhammad, J. Ahmad, N. U. Rehman, Z. Jan, and M. Sajjad, “CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method,” Multimed Tools Appl, vol. 76, no. 6, pp. 8597–8626, Mar. 2017, doi: 10.1007/s11042-016-3383-5.

G. Swain, “A Steganographic Method Combining LSB Substitution and PVD in a Block,” Procedia Comput Sci, vol. 85, pp. 39–44, 2016, doi: 10.1016/j.procs.2016.05.174.

A. Apriansyah, M. Unik, and H. Mukhtar, “Implementasi Sistem Keamanan Pesan Text Dengan Teknik Steganografi Menggunakan Metode Least Significant Bit (LSB),” Jurnal Computer Science and Information Technology, vol. 1, no. 1, pp. 8–12, 2020.

D. Darwis, N. B. Pamungkas, and Wamiliana, “Comparison of Least Significant Bit, Pixel Value Differencing, and Modulus Function on Steganography to Measure Image Quality, Storage Capacity, and Robustness,” in Journal of Physics: Conference Series, IOP Publishing Ltd, Jan. 2021. doi: 10.1088/1742-6596/1751/1/012039.

Downloads

Published

2023-07-31