Message Hiding Using the Least Significant Bit Method with Shifting Hill Cipher Security

Authors

DOI:

https://doi.org/10.33633/jais.v8i3.9321

Abstract

Technological developments go hand in hand with advances in digital messaging. In protecting the confidentiality of the message, it is necessary to double secure the data. This security can be done with a combination of steganography and cryptographic techniques. Steganography algorithm which is a technique for hiding messages well, one of which is Least Significant Bit (LSB). The LSB algorithm is a simple method because it only converts the value of the last bit in a message with the inserted message bit, which is a convenience of the LSB algorithm, but it becomes vulnerable to message theft attacks if not combined with other algorithms for security. So it is necessary to increase security. This research developed a combination method of LSB algorithm for steganography technique with Hill Cipher algorithm for cryptographic technique, Hill Cipher was developed with shifting (shifting) 2 (two) characters. With the development of this method, hackers will find it difficult to crack messages, and is expected to improve the performance of the algorithm in affecting image quality and travel time in running the algorithm. The results of this study will be tested using several evaluation tools MSE, PSNR, BER, CER, AE, and Entropy. With the development of this method, hackers will find it difficult to decipher messages, and from the results of this experiment has been able to improve the performance of the algorithm in maintaining image quality and can shorten travel time in running the algorithm.

References

Sari, J. I., Dan Sihotang, H. T., Implementasi Penyembunyian Pesan Pada Citra Digital Dengan Menggabungkan Algoritma HILL Cipher Dan Metode Least Significant BIT (LSB), Jurnal Mantik Penusa, 1(2).J. Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989, vol. 61. 2017.

Nofriansyah, D., Defit, S., Nurcahyo, G. W., Ganefri, G., Ridwan, R., Ahmar, A. S., and Rahim, R., A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm. In Journal of Physics: Conference Series (Vol. 954, p. 012003). IOP Publishing. 2018.

Sari, C. A., Rachmawanto, E. H., Utomo, D. W., dan Sani, R. R., Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting, Journal of Applied Intelligent System, 1(3), 179-190. 2016.

Pradipta, A., Implementasi Metode Caesar Chiper Alphabet Majemuk Dalam Kriptografi Untuk Pengamanan Informasi. Indones, J. Netw. Secur, 5(3), 3-6, 2016.

Basri, B., Kriptografi Simetris dan Asimetris dalam Perspektif Keamanan Data dan Kompleksitas Komputasi, Jurnal Ilmiah Ilmu Komputer, 2(2)., 2016.

Kusuma, E. J., Sari, C. A., Rachmawanto, E. H., and Moses Setiadi, D. R. I., A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography, Journal Of ICT Research & Applications, 12(2), 2018.

Kaur, A., A Review on Symmetric Key Cryptography Algorithms, International Journal of Advanced Research in Computer Science, 8(4), 2017.

Handoko, L. B., Umam, C., and Anindita, A. S., Upload file security on the server using LSB and Hill Cipher, Journal of Applied Intelligent System, 4(1), 28-38, 2019.

Mezher, Liqaa Saadi, and Ayam Mohsen Abbass. Mixed Hill Cipher methods with triple pass protocol methods. International Journal of Electrical and Computer Engineering 11.5 (2021): 4449.

Mfungo, Dani Elias, et al. Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map. Applied Sciences 13.6 (2023): 4034

Gunawan, I., Sumarno, S., Irawan, E., dan Tambunan, H. S., Pengamanan Berkas Dokumen Menggunakan Fungsi Algoritma Steganografi LSB. ALGORITMA: Jurnal Ilmu Komputer dan Informatika, 2(1), 2018.

Jatmoko, C., Handoko, L. B., dan Sari, C. A., Uji Performa Penyisipan Pesan Dengan Metode LSB dan MSB Pada Citra Digital Untuk Keamanan Komunikasi. Dinamika Rekayasa, 14(1), 47-56, 2018.

Adam, Riza Ibnu. Skema Penyembunyian Data pada Gambar Berbasis Interpolasi Kubik B-Spline Menggunakan Metode Least Significant Bit (LSB), JEPIN (Jurnal Edukasi dan Penelitian Informatika) 5.3, 255-260, 2019.

Harahap, Muhammad Khoiruddin, dan Nurul Khairina. Steganography Citra dengan Metode Least Significant Bit Random Placement, JEPIN (Jurnal Edukasi dan Penelitian Informatika) 6.2: 245-249, 2020.

Megantara, R. A., Rafrastara, F. A., and Mahendra, S. N., A combination of Hill CIPHER-LSB in RGB image encryption, Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 241-248, 2019.

Abdillah, Muhammad Oemar, Ogie Ariansah Pane, and Farhan Rusdy Asyhary Lubis. Implementasi Keamanan Aset Informasi Steganografi Menggunakan Metode Least Significant Bit (LSB), Jurnal Sains dan Teknologi (JSIT) 3.1, 40-46, 2023.

Pandey, A., Pandey, S., and Agarwal, A. K., Transpoly Hill Cipher--An Improvement Over Traditional Hill Cipher, International Journal of Advanced Research in Computer Science, 9(1), 2018.

Downloads

Published

2023-11-30