STEGANOGRAFI DENGAN MENGGUNAKAN METODE LSB DAN ALGORITMA HILL CIPHER

2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit

2020 ◽  
Vol 4 (3) ◽  
pp. 1
Author(s):  
Desimeri Laoli ◽  
Bosker Sinaga ◽  
Anita Sindar R M Sinaga

Nowadays people exchange information in digital media such as text, audio, video and imagery. The development of Information and Communication makes the delivery of information and data more efficient. Current developments in technology which are very significant have an impact on the community in exchanging information and communicating. Confidential hidden data can also be in the form of image, audio, text, or video. The Hill Chiper algorithm uses a matrix of size m x m as a key for encryption and decryption. One way to recover the original text is of course to guess the decryption key, so the process of guessing the decryption key must be difficult. break ciphertext into palintext without knowing which key to use. The LSB part that is converted to the value of the message to be inserted. After affixing a secret message, each pixel is rebuilt into a whole image that resembles the original image media. The Hill Cipher algorithm is used to determine the position of the plaintext encryption into a random ciphertext. 2. Testing text messages using the hill cipher algorithm successfully carried out in accordance with the flow or the steps so as to produce a ciphertext in the form of randomization of the letters of the alphabet.   


2018 ◽  
Vol 3 (1) ◽  
Author(s):  
Aditya Aziz Fikhri ◽  
Hendrawaty Hendrawaty

Abstrak - Informasi merupakan hal yang sangat penting dan berharga, dewasa ini informasi sering dipertukarkan melalui internet. Kemajuan teknologi smartphone terutama smartphone Android, memungkinkan penggunanya saling berkirim data/informasi melalui internet dengan mudah dan cepat menggunakan beberapa aplikasi yang ada pada smartphone seperti WhatsApp, E-Mail, Telegram, dan Facebook. Data/informasi yang dikirim melalui internet masih rawan terhadap pencurian dan penyadapan. Oleh karena itu dibutuhkan cara untuk mengamankan data/informasi yang akan dikirim. Steganografi merupakan salah  satu teknik yang dapat digunakan untuk mengamankan data/informasi. Steganografi adalah teknik yang digunakan untuk menyembunyikan pesan kedalam suatu media seperti gambar, audio dan video. Penelitian ini membahas tentang implementasi steganografi  pada smartphone Android yang dapat digunakan menyembunyikan pesan teks ke dalam media gambar RGB 24 bit (cover image), dan dapat juga digunakan untuk mengambil kembali pesan teks dari gambar  RGB 24 bit yang telah disisipi (Stego image). Media Gambar yang digunakan sebagai input (cover image) berformat JPEG dan PNG. Algoritma yang digunakan untuk penyembunyian dan pengambilan pesan teks ke dan dari gambar adalah One bit Least Significant Bit. Dari 5 sampel pesan teks dan 5 cover image, penyembunyian pesan teks kedalam cover image berhasil dengan baik, dengan tingkat keberhasilan 100% dan waktu rata-rata penyisipan yaitu 0,009 detik. Dari 5 sampel stego image yang telah bersisi pesan teks, pengambilan pesan juga berhasil  dengan tingkat keberhasilan 100 % dan waktu rata-rata ekstraksi yaitu 0,0036 detik. Waktu yang digunakan untuk ekstraksi lebih cepat dibandingkan dengan penyisipan, output gambar yang dihasilkan (stego image) berformat PNG, dengan ukuran 900 x 900 pixel.Kata Kunci: Steganografi, Stego Image, One Bit Least Significant Bit, AndroidAbstract - Information is very important and valuable, today information is often exchanged through the internet. The advancement of smartphone technology, especially Android smartphones, allows users to send data / information to each other via the internet easily and quickly using several applications on smartphones such as WhatsApp, E-Mail, Telegram, and Facebook. Data / information sent via the internet is still prone to theft and tapping. Therefore we need a way to secure data / information that will be sent. Steganography is a technique that can be used to secure data / information. Steganography is a technique used to hide messages into a medium such as images, audio and video. This study discusses the implementation of steganography on an Android smartphone that can be used to hide text messages into 24-bit RGB image media (cover image), and can also be used to retrieve text messages from inserted 24-bit RGB images (Stego image). Media Images used as input (cover image) format are JPEG and PNG. The algorithm used for hiding and retrieving text messages to and from images is One bit Least Significant Bit. From 5 samples of text messages and 5 cover images, hiding text messages into the cover image works well, with a success rate of 100% and an average insertion time of 0.009 seconds. of the 5 stego image samples that have side text messages, message retrieval was also successful with a 100% success rate and an average extraction time of 0.0036 seconds. The time used for extraction is faster than insertion, the output of the stego image is PNG format, with a size of 900 x 900 pixels.Keywords: Steganography, Stego Image, One Bit Least Significant Bit, Android


Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Computer security aims to help users prevent fraud or detect fraud in an information-based system. The information must be secured to be free from threats. Cryptographic techniques can prevent data theft. One cryptographic algorithm is Hill Cipher. This algorithm is one symmetric cryptography algorithm. The Hill Cipher algorithm uses an m x m sized matrix as the key to encryption and decryption. The fundamental matrix theory used in Hill Cipher is multiplication between matrices and inverses the matrix. Hill Cipher has two types of matrices in general, 2 x 2 and 3 x 3. This study discusses the order 2 x 2. The application of Hill Cipher in text-shaped media is highly recommended because it has fast encryption and decryption speeds. This method is very good at securing data that will be transmitted on an open network.


MATICS ◽  
2016 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Ali Mahmudi ◽  
Sandy Nataly Mantja ◽  
Achmad Rozikin

<p style="text-align: justify;"> With the development of technology, especially in the IT field, the more developed also the current exchange of information using internet technology. Security of information transmitted via the Internet network is a must to maintain the confidentiality and originality of the information. Technology to maintain the security of the information used in this paper is a cryptography and steganography. Application cryptography to secure information on the text, then the information is hidden in digital images. So that only users who have a lock / unlock passwords only, can read the message in greeting such information.</p>


Author(s):  
Rama Aria Megantara ◽  
Fauzi Adi Rafrastara ◽  
Syafrie Naufal Mahendra

The progress of the development of digital technology today, many people communicate by sending and receiving messages. However, along with extensive technological developments, many crimes were committed. In avoiding these crimes, data security needs to be done. Form of data security in the form of cryptography and steganography. One of the cryptographic techniques is the hill cipher algorithm. Hill ciphers include classic cryptographic algorithms that are very difficult to solve. While the most popular steganography technique is Least Significant Bit (LSB). Least Significant Bit (LSB) is a spatial domain steganography technique using substitution methods. This study discusses the merging of message security with hill cipher and LSB. The message used is 24-bit color image for steganography and text with 32, 64 and 128 characters for cryptography. The measuring instruments used in this study are MSE, PSNR, Entropy and travel time (CPU time). Test results prove an increase in security without too damaging the image. This is evidenced by the results of the MSE trial which has a value far below the value 1, the PSNR is> 64 db, the entropy value ranges from 5 to 7 and the results of travel time <1 second.


2020 ◽  
Vol 55 (2) ◽  
Author(s):  
Azal Habeeb

Information is always being transmitted through the internet. Securing that information is an important issue that programmers need to take into consideration. There are several ways to protect digital images, one of which is steganography, a method of encryption that encrypts information inside another type of information such as images. In this research, we propose a new technique to protect information from hacking. We have used the process of hiding. There are many techniques to secure the image such as hiding information inside other information as in steganography. In this paper, we introduce a new method to protect the information from theft. We used encryption to encrypt the text by using the password between the sender and the receiver. After that we used the least significant bit technique to hide the text in the image. Finally, we applied the proposed method in the MATLAB program.


2018 ◽  
Vol 1 (2) ◽  
pp. 11-20
Author(s):  
Indra Pratistha ◽  
Paholo Iman Prakoso

Current information can be delivered quickly without knowing the geographical boundaries using the internet. However, the information transmitted can be intercepted by the middle of the road which is not desired, then the security of the data actually becomes a very important issue. The development of computer systems and networks and the interconnection through the Internet has increased, of course, require data security and reliable message in order to avoid the attack. To secure internet data or message network necessary cryptographic encryption methods, one method of data encryption that there is a method of data encryption standard (DES) and subsequently inserted into the Lakeside digital images (steganography) using the method of least significant bit (LSB).


2020 ◽  
Vol 4 (2) ◽  
pp. 92-97
Author(s):  
Abd Charis Fauzan ◽  
Veradella Yuelisa Mafula

Security and confidentiality of documents stored on a computer is an important aspect in the field of computer or information system security. Documents will no longer be useful if they are intercepted or hijacked by unauthorized people, they will even endanger the document owner, if documents containing important information are misused by irresponsible people. Therefore the documents on the computer must be preserved so that they are only accepted and used by interested persons. One of the solutions to prevent eavesdropping of documents is to use cryptography. This study aims to increase cryptographic complexity using a combination of hill cipher algorithms and block chaining cipher modes. The combination of the two methods is expected to be able to cover the shortcomings of each method so that the cryptographic complexity can be increased. The method in this study consists of two stages, namely the document encryption and document decryption stages. The encryption stage is to change the plaintext document into a ciphertext document, on the other hand, the decryption stage is to change the ciphertext document back into a plaintext document. The stages for document encryption include; 1) retrieve plain text messages in the document so that they can be processed by the system (parsing); 2) encryption to convert plaintext documents into ciphertext documents using the hill cipher algorithm; 3) encryption to convert plaintext documents into cipher text documents using cipher block chaining mode. While the methods for decryption are 1) taking the ciphertext message in the document so that it can be processed by the system (parsing); 2) decryption to convert ciphertext documents into plaintext documents using cipher block chaining mode; 3) decryption to convert ciphertext documents into plaintext documents using a hill cipher.


2019 ◽  
Vol 17 (1) ◽  
pp. 73
Author(s):  
Albert Christie Giovani ◽  
Yustina Retno Wahyu Utami ◽  
Teguh Susyanto

The development of internet has become one of the most popular data communication media. The ease of use and complete facilities are the advantages possessed by the internet. However, along with the development of internet media and applications that use the Internet,  crime on information system increases as well. With various illegal information-gathering techniques developing, many are trying to access information that is not their right. There are several security techniques for sending messages confidentially and securedly, one of which is known as steganography. This study combined steganography and cryptography. The message was encrypted first using base64 then inserted using the LSB Crossed method. This method was aimed at making the process of extracting messages by unauthorized ones not easy. Embedding message into images was using the last binary number of the RGB value of an image by randomizing the placement of binary numbers by integrating base64 coding so that it combined base64 messages which next the text messages would be encrypted. The measurement results in the stego image using PSNR (Peak Signal to Noise Ratio) showed that the image quality after the insertion process was > 50 db


Sign in / Sign up

Export Citation Format

Share Document