scholarly journals A Combination of Hill Cipher and LSB for Image Security

2020 ◽  
Vol 7 (1) ◽  
Author(s):  
Ibnu Utomo Wahyu Mulyono ◽  
Ajib Susanto ◽  
Muhamad Rizky Fajar Febrian ◽  
Ghaitsa Ardelia Rosyida

The maximum value obtained to test the encrypt hill cipher uses the avalanche effect with modification of one, two, three, and four key matrices 35.71%, therefore an additional security technique is needed. The Least Significant Bit (LSB) method is used to insert the ciphertext that has been generated from the hill cipher algorithm, has been testing using RGB, CMY, CMYK and YUV shapes with 6142 characters in 128 x 128 character images producing the highest PSNR value of 51.2826 dB in CMYK images. Steganography technique is applied because it has advantages in terms of imperceptibility, for example the results of a stego image are so similar to the original image that it is difficult to be distinguished by the human senses. Tests were carried out with 10 images, five images measuring 512 x 512 and five images measuring 16 x 16. While the messages to be inserted were 240, 480, and 960 characters for images measuring 512 x 512 and 24, 48 and 88 characters for images measuring 16 x16. Test results that I have done are calculated using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) with a minimum PSNR of 51.2907 dB which means the resulting image is quite good. Computation time is calculated using tic toc on Matlab by encrypting 2000 and 6000 characters, and also computation time.

2019 ◽  
Vol 16 (11) ◽  
pp. 4812-4825
Author(s):  
Mohsin N. Srayyih Almaliki

One of the crucial aspects of processes and methodologies in the information and communication technology era is the security of information. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies which are used, and they include steganography and cryptography. With cryptography, the secret message is converted into unintelligible text, but the existence of the secret message is noticed, nonetheless, steganography involves hiding the secret message in a way that its presence cannot be noticed. In this paper, a new secure image steganography framework which is known as an adaptive stego key LSB (ASK-LSB) framework is proposed. The construction of the proposed framework was carried out in four phases with the aim of improving the data-hiding algorithm in cover images by using capacity, image quality, and security. To achieve this, the Peak Signal-to-Noise Ratio (PSNR) of the steganography framework was maintained. The four phases began with the image preparation phase, followed by the secret message preparation phase, embedding phase and finally extraction phase. The secure image steganography framework that is proposed in this study is based on a new adaptive of least significant bit substitution method, combination random function, and encryption method. In the proposed work, the secret bits are inserted directly or inversely, thereby enhancing the imperceptibility and complexity of the process of embedding. Results from the experiment reveal that the algorithm has better image quality index, peak signal-to-noise ratio, and payload used in the evaluation of the stego image.


2018 ◽  
Vol 7 (2.5) ◽  
pp. 119
Author(s):  
Erick Fitra Wijayanto ◽  
Muhammad Zarlis ◽  
Zakarias Situmorang

There are many research has done a hybridization approach of text message insertion that has been compressed with Lempel-Ziv-Welch (LZW) algorithm and has also been encrypted. The text messages in ciphertext form are inserted into the image file using LSB (Least Significant Bit) method. The results of this study indicate that the value of Peak Signal to Noise Ratio (PSNR) lower than the LSB method of 0.94 times with a ratio of 20.33%, with Kekre's method of 10.04%. To improve the value of PSNR stego image of insertion, in this research is inserted audio samples using 5 bits to reduce the amount of data insertion, so it can get the value of MSE stego image low. Prior to insertion, the text file is compressed with the Lempel-Ziv-Welch (LZW) algorithm and encrypted with the Advanced Encryption Standard (AES) algorithm. Then, the insertion of compression and encrypted text files is done with the Modified Least Significant Bit (MLSB) algorithm. To performa test reliability of steganography, the image stego image is done by calculating Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). At extraction process with MLSB algorithm, decryption with AES algorithm and decompression with LZW algorithm. The experimental results show that the MSE values obtained are lower and the proposed PSNR method is better with (α) 1,044 times than the Kaur method, et al. The result of embed text file extraction from the stego image works well resulting in encrypted and uncompressed text files.  


2019 ◽  
Vol 5 (2) ◽  
pp. 137-146
Author(s):  
Andre Hernandes ◽  
Hartini Hartini ◽  
Dewi Sartika

Steganografi merupakan sebuah cara yang digunakan untuk menyembunyi-kan pesan rahasia dari orang yang tidak berhak mengetahuinya. Pada penelitian ini penulis menggunakan salah satu metode steganografi yaitu metode least significant bit (LSB) untuk menyisipkan bit-bit pesan rahasia berupa teks kedalam citra digital RGB berekstensi file bitmap, dengan cara menggabungkan metode LSB dan linear congruential generator (LCG) untuk membangkitkan bilangan acak dari posisi pixel yang akan disisipkan pesan rahasia. Hasil dari penelitian ini penulis berhasil membangun aplikasi steganografi dengan bahasa pemrograman java dan menguji kualitas stego image yang menghasilkan nilai rata-rata Peak Signal to Noise Ratio (PSNR) yang mencapai 51 dB. Dari penilaian ini, disimpulkan bahwa stego image yang dihasilkan dalam kualitas baik dan tidak mengalami perubahan yang signifikan.


In today’s world, confidential information is growing due to various areas of works. Internet is the main area of transmission of digital data, so security must be more considered. Two common ways of providing security is cryptography and steganography. Employing a hybrid of cryptography and steganography enhances the security of data. This paper employs LSB (Least significant Bit) as the steganography algorithm and AES, RSA, DES, 3DES, and Blowfish algorithms as cryptographic algorithms to encrypt a message that should be hidden in a cover image. The results are represented in the form of execution time, PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error) and the histogram of main and covered image. The experimental results reveal that all the algorithms achieve appropriate quality of stego image. They can be used as cryptographic algorithms to encrypt a message before applying steganography algorithms.


2018 ◽  
Vol 8 (2) ◽  
pp. 109-122
Author(s):  
Hillman Akhyar Damanik ◽  
Merry Anggraeni

Internet adalah media komunikasi paling populer saat ini, tetapi komunikasi melalui internet menghadapi beberapa masalah seperti keamanan data, kontrol hak cipta, kapasitas ukuran data, otentikasi dan lain sebagainya. Pada penelitian ini peneliti memperkenalkan skema untuk menyembunyikan data yang terenkripsi. Dengan menggunakan citra sebagai embedding dan cover image untuk text hiding. Fitur utama skema adalah cara penyematan data teks ke cover image terenkripsi. Peneliti berkonsentrasi menggunakan metode Red-Green-Blue Least Significant Bit (RGB-LSB). Penyematan data teks dan memverifikasi kinerja menggunakan metode RGB-LSB dalam hal indeks kualitas yaitu Peak Signal-to-Noise Ratio (PSNR) dan Mean Square Error (MSE) , imperceptibility dan indeks recovery. Nilai SME pada jumlah pesan yang disisipi sebanyak 407 kata adalah nilai MSE 0.8310 dan nilai PSNR 48.9348. pada jumlah pesan yang disisipi sebanyak 507 kata adalah nilai MSE 0.8322 dan nilai PSNR 48.9285. Nilai kriteria imperceptibility pada stego image menghasilkan image dan nilai-nilai pixel pada masing-masing cover image tidak mengalami perubahan. Aspek recovery pada penyembunyian pesan teks pada masing-masing cover image pada proses embedding, dimensi citra yang berbeda dan sampai proses ekstraksi juga menghasilkan panjang pesan asli terungkap. Berdasarkan hasil perbandingan ini dapat diketahui bahwa algoritma LSB memiliki hasil yang baik pada teknik penyisipan sebuah pesan pada file citra.


2018 ◽  
Vol 8 (2) ◽  
pp. 109
Author(s):  
Hillman Akhyar Damanik ◽  
Merry Anggraeni

<p><strong>Internet adalah media komunikasi paling populer saat ini, tetapi komunikasi melalui internet menghadapi beberapa masalah seperti keamanan data, kontrol hak cipta, kapasitas ukuran data, otentikasi dan lain sebagainya. Pada penelitian ini peneliti memperkenalkan skema untuk menyembunyikan data yang terenkripsi. Dengan menggunakan citra sebagai <em>embedding</em> dan <em>cover image</em> untuk <em>text hiding</em>. Fitur utama skema adalah cara penyematan data teks ke <em>cover image</em> terenkripsi. Peneliti berkonsentrasi menggunakan metode Red-Green-Blue Least Significant Bit (RGB-LSB</strong>).<strong> Penyematan data teks dan memverifikasi kinerja menggunakan metode RGB-LSB dalam hal indeks kualitas yaitu </strong><strong>Peak Signal-to-Noise Ratio (PSNR) dan</strong><em> </em><strong>Mean Square Error<em> </em>(MSE)</strong><strong> </strong><strong>, <em>imperceptibility</em> dan indeks<em> recovery</em>. Nilai SME pada jumlah pesan yang disisipi sebanyak 407 kata adalah nilai MSE 0.8310 dan nilai PSNR 48.9348. pada jumlah pesan yang disisipi sebanyak 507 kata adalah nilai MSE 0.8322 dan nilai PSNR 48.9285. Nilai kriteria <em>imperceptibility</em> pada <em>stego image</em> menghasilkan <em>image</em> dan nilai-nilai <em>pixel </em>pada masing-masing <em>cover image</em> tidak mengalami perubahan. Aspek <em>recovery</em> pada penyembunyian pesan teks pada masing-masing <em>cover image</em> pada proses <em>embedding</em>, dimensi citra yang berbeda dan sampai proses ekstraksi juga menghasilkan panjang pesan asli terungkap. Berdasarkan hasil perbandingan ini dapat diketahui bahwa algoritma LSB memiliki hasil yang baik pada teknik penyisipan sebuah pesan pada file citra.</strong></p>


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


2021 ◽  
Author(s):  
Ching-Yu Yang ◽  
Wen-Fong Wang

Abstract In this work, we present an improved steganography for electrocardiogram (ECG) hosts to solve the issues of existing ECG steganographic methods, which have less hiding capacity and insufficient signal-to-noise ratio (SNR)/ peak SNR (PSNR). Based on the integer wavelet transform (IWT) domain, sensitive (or private) data such as patients’ data and personal information can be efficiently embedded in an ECG host via the IWT coefficient adjustment and the least significant bit (LSB) technique. Simulations confirmed that the SNR/ PSNR, and payload of the proposed method outperform those of existing techniques. In addition, the proposed method is capable of resisting attacks, such as cropping, Gaussian noise-addition inversion, scaling, translation, and truncation attacks from third parties (or adversaries). Due to the fast computation time, the proposed method can be employed in portable biometric devices or wearable electronics.


Author(s):  
Nurmi Hidayasari ◽  
Febi Yanto

The method of steganography commonly used to hide data or information is Least Significant Bit (LSB) method. One of the relevant research is LSB using sequential Encoding - Decoding by David Pipkorn and Preston Weisbrot. In this research, an analysis of the LSB method using Sequential Encoding - Decoding by doing some testing. The tests are on the aspect of message security using tools StegSpy and enhanced LSB algorithm, testing on image quality by calculating the Peak Signal to Noise Ratio (PSNR) value and see the image histogram, testing on robustness of message by doing some image processing operations on stego image, like cropping, rotating, and etc, and then testing on capacity to check size of cover image and stego image and calculates the maximum size of data that can be hidden. From the testing process, we know that there are deficiencies in the aspects of security, robustness and capacity of a message. And then in this research we try to change the location of messages that are hidden in the image bits, which previous research used the 8th bit of each bytes, changed to the 7th bit. To be able to correct deficiencies in the security aspect. After repairing and testing like before, obtained better results in the security aspect. This can be seen from the image of the enhanced LSB algorithm process, the message is not detected, but unfortunately the image quality is reduced, with the low PSNR value generated.


Sign in / Sign up

Export Citation Format

Share Document