scholarly journals STEGANOGRAFI PADA CITRA BITMAP MENGGUNAKAN METODE LEAST SIGNIFICANT BIT BERSILANG UNTUK TEKS TERENKRIPSI BASE64

2019 ◽  
Vol 17 (1) ◽  
pp. 73
Author(s):  
Albert Christie Giovani ◽  
Yustina Retno Wahyu Utami ◽  
Teguh Susyanto

The development of internet has become one of the most popular data communication media. The ease of use and complete facilities are the advantages possessed by the internet. However, along with the development of internet media and applications that use the Internet,  crime on information system increases as well. With various illegal information-gathering techniques developing, many are trying to access information that is not their right. There are several security techniques for sending messages confidentially and securedly, one of which is known as steganography. This study combined steganography and cryptography. The message was encrypted first using base64 then inserted using the LSB Crossed method. This method was aimed at making the process of extracting messages by unauthorized ones not easy. Embedding message into images was using the last binary number of the RGB value of an image by randomizing the placement of binary numbers by integrating base64 coding so that it combined base64 messages which next the text messages would be encrypted. The measurement results in the stego image using PSNR (Peak Signal to Noise Ratio) showed that the image quality after the insertion process was > 50 db

2018 ◽  
Vol 3 (1) ◽  
Author(s):  
Aditya Aziz Fikhri ◽  
Hendrawaty Hendrawaty

Abstrak - Informasi merupakan hal yang sangat penting dan berharga, dewasa ini informasi sering dipertukarkan melalui internet. Kemajuan teknologi smartphone terutama smartphone Android, memungkinkan penggunanya saling berkirim data/informasi melalui internet dengan mudah dan cepat menggunakan beberapa aplikasi yang ada pada smartphone seperti WhatsApp, E-Mail, Telegram, dan Facebook. Data/informasi yang dikirim melalui internet masih rawan terhadap pencurian dan penyadapan. Oleh karena itu dibutuhkan cara untuk mengamankan data/informasi yang akan dikirim. Steganografi merupakan salah  satu teknik yang dapat digunakan untuk mengamankan data/informasi. Steganografi adalah teknik yang digunakan untuk menyembunyikan pesan kedalam suatu media seperti gambar, audio dan video. Penelitian ini membahas tentang implementasi steganografi  pada smartphone Android yang dapat digunakan menyembunyikan pesan teks ke dalam media gambar RGB 24 bit (cover image), dan dapat juga digunakan untuk mengambil kembali pesan teks dari gambar  RGB 24 bit yang telah disisipi (Stego image). Media Gambar yang digunakan sebagai input (cover image) berformat JPEG dan PNG. Algoritma yang digunakan untuk penyembunyian dan pengambilan pesan teks ke dan dari gambar adalah One bit Least Significant Bit. Dari 5 sampel pesan teks dan 5 cover image, penyembunyian pesan teks kedalam cover image berhasil dengan baik, dengan tingkat keberhasilan 100% dan waktu rata-rata penyisipan yaitu 0,009 detik. Dari 5 sampel stego image yang telah bersisi pesan teks, pengambilan pesan juga berhasil  dengan tingkat keberhasilan 100 % dan waktu rata-rata ekstraksi yaitu 0,0036 detik. Waktu yang digunakan untuk ekstraksi lebih cepat dibandingkan dengan penyisipan, output gambar yang dihasilkan (stego image) berformat PNG, dengan ukuran 900 x 900 pixel.Kata Kunci: Steganografi, Stego Image, One Bit Least Significant Bit, AndroidAbstract - Information is very important and valuable, today information is often exchanged through the internet. The advancement of smartphone technology, especially Android smartphones, allows users to send data / information to each other via the internet easily and quickly using several applications on smartphones such as WhatsApp, E-Mail, Telegram, and Facebook. Data / information sent via the internet is still prone to theft and tapping. Therefore we need a way to secure data / information that will be sent. Steganography is a technique that can be used to secure data / information. Steganography is a technique used to hide messages into a medium such as images, audio and video. This study discusses the implementation of steganography on an Android smartphone that can be used to hide text messages into 24-bit RGB image media (cover image), and can also be used to retrieve text messages from inserted 24-bit RGB images (Stego image). Media Images used as input (cover image) format are JPEG and PNG. The algorithm used for hiding and retrieving text messages to and from images is One bit Least Significant Bit. From 5 samples of text messages and 5 cover images, hiding text messages into the cover image works well, with a success rate of 100% and an average insertion time of 0.009 seconds. of the 5 stego image samples that have side text messages, message retrieval was also successful with a 100% success rate and an average extraction time of 0.0036 seconds. The time used for extraction is faster than insertion, the output of the stego image is PNG format, with a size of 900 x 900 pixels.Keywords: Steganography, Stego Image, One Bit Least Significant Bit, Android


2018 ◽  
Vol 7 (2.5) ◽  
pp. 119
Author(s):  
Erick Fitra Wijayanto ◽  
Muhammad Zarlis ◽  
Zakarias Situmorang

There are many research has done a hybridization approach of text message insertion that has been compressed with Lempel-Ziv-Welch (LZW) algorithm and has also been encrypted. The text messages in ciphertext form are inserted into the image file using LSB (Least Significant Bit) method. The results of this study indicate that the value of Peak Signal to Noise Ratio (PSNR) lower than the LSB method of 0.94 times with a ratio of 20.33%, with Kekre's method of 10.04%. To improve the value of PSNR stego image of insertion, in this research is inserted audio samples using 5 bits to reduce the amount of data insertion, so it can get the value of MSE stego image low. Prior to insertion, the text file is compressed with the Lempel-Ziv-Welch (LZW) algorithm and encrypted with the Advanced Encryption Standard (AES) algorithm. Then, the insertion of compression and encrypted text files is done with the Modified Least Significant Bit (MLSB) algorithm. To performa test reliability of steganography, the image stego image is done by calculating Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). At extraction process with MLSB algorithm, decryption with AES algorithm and decompression with LZW algorithm. The experimental results show that the MSE values obtained are lower and the proposed PSNR method is better with (α) 1,044 times than the Kaur method, et al. The result of embed text file extraction from the stego image works well resulting in encrypted and uncompressed text files.  


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Nurmi Hidayasari ◽  
Febi Yanto

The method of steganography commonly used to hide data or information is Least Significant Bit (LSB) method. One of the relevant research is LSB using sequential Encoding - Decoding by David Pipkorn and Preston Weisbrot. In this research, an analysis of the LSB method using Sequential Encoding - Decoding by doing some testing. The tests are on the aspect of message security using tools StegSpy and enhanced LSB algorithm, testing on image quality by calculating the Peak Signal to Noise Ratio (PSNR) value and see the image histogram, testing on robustness of message by doing some image processing operations on stego image, like cropping, rotating, and etc, and then testing on capacity to check size of cover image and stego image and calculates the maximum size of data that can be hidden. From the testing process, we know that there are deficiencies in the aspects of security, robustness and capacity of a message. And then in this research we try to change the location of messages that are hidden in the image bits, which previous research used the 8th bit of each bytes, changed to the 7th bit. To be able to correct deficiencies in the security aspect. After repairing and testing like before, obtained better results in the security aspect. This can be seen from the image of the enhanced LSB algorithm process, the message is not detected, but unfortunately the image quality is reduced, with the low PSNR value generated.


Author(s):  
Ebrahim Alrashed ◽  
Suood Suood Alroomi

Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message.  In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.


Author(s):  
Samir Bandyopadhyay ◽  
Payal Bose ◽  
Vishal Goyel

In today’s digital media data communication over the internet increasing day by day. Therefore the data security becomes the most important issue over the internet. With the increase of data transmission, the number of intruders also increases. That’s the reason it is needed to transmit the data over the internet very securely. Steganography is a popular method in this field. This method hides the secret data with a cover medium in a way so that the intruders cannot predict the existence of the data. Here a steganography method is proposed which uses a video file as a cover medium. This method has five main steps. First, convert the video file into video frames. Then a particular frame is selected for embedded the secret data. Second, the Least Significant Bit (LSB) Coding technique is used with the double key security technique. Third, an 8 characters password verification process. Fourth, reverse the encrypted video. Fifth, signature verification process to verify the encryption and decryption process. These five steps are followed by both the encrypting and decrypting processes.


Author(s):  
Pascal Maniriho ◽  
Leki Jovial Mahoro ◽  
Zephanie Bizimana ◽  
Ephrem Niyigaba ◽  
Tohari Ahmad

Maintaining the privacy and security of confidential information in data communication has always been a major concern. It is because the advancement of information technology is likely to be followed by an increase in cybercrime, such as illegal access to sensitive data. Several techniques were proposed to overcome that issue, for example, by hiding data in digital images. Reversible data hiding is an excellent approach for concealing private data due to its ability to be applied in various fields. However, it yields a limited payload and the quality of the image holding data (Stego image), and consequently, these two factors may not be addressed simultaneously. This paper addresses this problem by introducing a new non-complexity difference expansion (DE) and block-based reversible multi-layer data hiding technique constructed by exploring DE. Sensitive data are embedded into the difference values calculated between the original pixels in each block with relatively low complexity. To improve the payload capacity, confidential data are embedded in multiple layers of grayscale medical images while preserving their quality. The experiment results prove that the proposed technique has increased the payload with an average of 369999 bits and kept the peak signal to noise ratio (PSNR) to the average of 36.506 dB using medical images' adequate security the embedded private data. This proposed method has improved the performance, especially the secret size, without reducing much the quality. Therefore, it is suitable to use for relatively big payloads.


In this growing internet world, secret data communication is increasing day by day. There are various methods to communicate secretly. Steganography is one of those techniques in which data is concealed within cover data such that it cannot get detected. Steganography is usually used today on pcs where digital data is the high-speed distribution channels for carriers and networks. Steganography is the skill of understanding of unnoticeable activity at intervals. Steganalysis is the science of concealed data detection. Steganography of data which is of any form like images, audio, video or text information is done by various techniques. Image steganography is done by various technique. Least Significant Bit (LSB) with XORing and Discrete Cosine Transform (DCT) are used to test the image steganography. Images are converted to grey scale to get better accuracy. Results are tested with mean square error (MSE) and peak signal-to-noise ratio (PSNR) values.


2019 ◽  
Vol 8 (2S9) ◽  
pp. 1049-1052

The security of the transmitted data over the internet has become one of the challenges sharing with data communication over computer network. In this paper, a new stegnography system is developed using Improved Least Significant Bit (ILSB) with preprocessing operation for concealing data. The system mixes several technological rules to enhance the performance of concealing scheme. The original secret image is divided into several segments then rearranged to even and odd. Rivest Cipher 4 (RC4) algorithm is applied on preprocessed image before concealing it on the cover image using ILSB. The proposed systems are simulated using MATLAB software package. The experimental results show that our suggested method successes of concealing data according to PSNR ratio, correlation and elapsed time. Preprocessing operation provides flexibility and robustness to the overall system. Improved LSB is simple and strong method for concealing images. Finally, the proposed system is very active to hide the gray scale image inside the color image


2020 ◽  
Vol 17 (12) ◽  
pp. 5279-5295
Author(s):  
S. Jahnavi ◽  
C. Nandini

With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image (magic sheet) is used along with cover image that reveals the secret data in the receiving end.


Sign in / Sign up

Export Citation Format

Share Document