scholarly journals Aplikasi Pengamanan Informasi Menggunakan Metode Least Significant Bit (Lsb) dan Algoritma Kriptografi Advanced Encryption Standard (AES)

2019 ◽  
Vol 9 (2) ◽  
Author(s):  
Dian Novianto ◽  
Yohanes Setiawan

<p align="center"><strong><em>Abstract</em></strong></p><p><em>There are several security aspects of the data that must be maintained, such as: authentication, integrity, non repudiation, authority, confidentialty, privacy and access control. One of the vulnerable parts of data security is when sending data to the destination. At the time of delivery, tapping of data can occur, so that people who are not entitled to get that information can find out. Therefore, an information needs to be secured so that only people who have access rights can know or get that information. And to maintain the confidentiality of the information, one of the ways is to insert the data into other objects, so that other people do not realize if the object contains important data or information. This hiding method is also known as steganography, and cryptography is added to strengthen the security of the data, that is a science and art to maintain the confidentiality of the message by encoding it in a form that is incomprehensible. The method used in steganography is Least Significant Bit (LSB), the algorithm used in cryptography is the Advanced Encryption Standard (AES), and the software development method used is prototype. The results of this study are all aspects of data security can be achieved, including when passing through the process of sending data through media such as the internet.</em></p><p><strong><em>Keyword: </em></strong><em>Steganography, Criptography, Prototype.</em></p><p align="center"><strong><em>Abstrak</em></strong></p><p><em>Ada beberapa aspek keamanan data yang harus dijaga, seperti: otentikasi, integritas, non repudiation, otoritas, kerahasiaan, privasi, dan kontrol akses. Salah satu bagian yang rentan dari keamanan data adalah ketika mengirim data ke tujuan. Pada saat pengiriman, penyadapan data dapat terjadi, sehingga orang yang tidak berhak mendapatkan informasi tersebut dapat mengetahuinya. Oleh karena itu, suatu informasi perlu diamankan sehingga hanya orang yang memiliki hak akses yang dapat mengetahui atau mendapatkan informasi tersebut. Dan untuk menjaga kerahasiaan informasi, salah satu caranya adalah dengan memasukkan data ke objek lain, sehingga orang lain tidak menyadari jika objek tersebut berisi data atau informasi penting. Metode persembunyian ini juga dikenal sebagai steganografi, dan kriptografi ditambahkan untuk memperkuat keamanan data, yaitu ilmu dan seni untuk menjaga kerahasiaan pesan dengan menyandikannya dalam bentuk yang tidak dapat dipahami. Metode yang digunakan dalam steganografi adalah Least Significant Bit (LSB), algoritma yang digunakan dalam kriptografi adalah Advanced Encryption Standard (AES), dan metode pengembangan perangkat lunak yang digunakan adalah prototipe. Hasil dari penelitian ini adalah semua aspek keamanan data dapat dicapai, termasuk ketika melewati proses pengiriman data melalui media seperti internet.</em></p><strong><em>Kata kunci:</em></strong><em> Steganografi, kriptografi, Prototipe</em>

Author(s):  
Musa. M. Yahaya ◽  
Aminat Ajibola

Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.


2020 ◽  
Vol 1 (1) ◽  
pp. 11-22
Author(s):  
Asaad A. Hani

There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce a method to provide higher security for data transferred over the internet, or information based in the cloud. The introduced method for the most part depends on the Advanced Encryption Standard (AES) algorithm, which is currently the standard for secret key encryption. A standardized version of the algorithm was used by The Federal Information Processing Standard 197 called Rijndael for the AES. The AES algorithm processes data through a combination of exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and MixColumn operations. The fact that the algorithm could be easily implemented and run on a regular computer in a reasonable amount of time made it highly favorable and successful. In this paper, the proposed method provides a new dimension of security to the AES algorithm by securing the key itself such that even when the key is disclosed; the text cannot be deciphered. This is done by enciphering the key using Output Feedback Block Mode Operation. This introduces a new level of security to the key in a way, in which deciphering the data requires prior knowledge of the key and the algorithm used to encipher the key for the purpose of deciphering the transferred text.


2018 ◽  
Vol 3 (2) ◽  
pp. 92-98
Author(s):  
Dian Novianto

AbstractData security is an important factor in an electronic transaction, because the data sent must only be known to the person who is entitled to receive the information. There are several security aspects of the data that must be maintained, such as: authentication, integrity, non repudiation, authority, confidentialty, privacy and access control. Therefore we are need for a system that is capable of carrying out some of these aspects. One technique that can be used in maintaining data security is steganography with the LSB (Least Significant Bit) method. In addition, to strengthen the confidentiality of the hidden information in steganography needed Additional techniques in the form of cryptography namely RC4 (Rivest Code 4). In this research,, the researcher  used a software development model is a prototype. And for the tools used in developing this application is an Unified Modeling Language. The results of the research conducted by researchers are the application of steganography using the LSB (Least Significant Bit) method combined with RC4 cryptography (Rivest Code 4) proven to be able to hide and secure important information from people who do not have access rights to that information. Keywords: Steganography, Criptography, Data Security


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Data security is a way to ensure that stored data is safe from corruption and that access to it is accordingly controlled. Data security helps to ensure privacy. It also helps protect personal data from theft. Data theft is one that often occurs on global computer networks. It includes criminal acts in the internet world. Chronology of theft is that an intruder enters a system and retrieves essential information without the owner's knowledge. Intruders use data that has been taken for various crimes. Various ways that intruders take to retrieve the data. This action is proven by the amount of internet traffic that is looking for a gap to infiltrate a system. Cryptography is needed to protect essential data. One of the classic algorithms used is Gronsfeld Cipher. This algorithm works by exchanging characters in messages using substitution tables. The key used is a number that determines the shift of plaintext and key. The resulting ciphertext is the result of plaintext substitution with the key table. This algorithm is constructive for users to secure their essential information when it will be sent through a global network.


Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Cakra Aminuddin Hamka ◽  
Haruno Sajati ◽  
Yuliani Indrianingsih

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.


Author(s):  
Ibnu Utomo Wahyu Mulyono ◽  
Ajib Susanto ◽  
Tiara Anggraeny ◽  
Christy Atika Sari

 The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096.


2018 ◽  
Vol 1 (2) ◽  
pp. 11-20
Author(s):  
Indra Pratistha ◽  
Paholo Iman Prakoso

Current information can be delivered quickly without knowing the geographical boundaries using the internet. However, the information transmitted can be intercepted by the middle of the road which is not desired, then the security of the data actually becomes a very important issue. The development of computer systems and networks and the interconnection through the Internet has increased, of course, require data security and reliable message in order to avoid the attack. To secure internet data or message network necessary cryptographic encryption methods, one method of data encryption that there is a method of data encryption standard (DES) and subsequently inserted into the Lakeside digital images (steganography) using the method of least significant bit (LSB).


2018 ◽  
Vol 17 (1) ◽  
pp. 66
Author(s):  
Ida Bagus Adisimakrisna Peling ◽  
Nyoman Putra Sastra

Ease of accessing and delivering information makes the Internet more and more needed. But the ease also provides greater opportunities for leaking of information that is confidential. To handle the security of information exchange that is confidential then developed the method of data security on audio using AES (Advanced Encryption Standard) and EAS (Enhanced Audio Steganography) algorithm. From the research results can be concluded by using AES method as cryptography and EAS as steganography, audio file quality can be said good because of the overall test scenario conducted the lowest SNR value obtained is 49.33dB while the highest SNR value is 51.10dB.


Author(s):  
Bakhan Tofiq Ahmed

<p>Information is a vitalthing that needs to be secured and well protected during transmission between two or more parties over the internet. This can be achieved by steganography technology. Steganography is the concealing science in which the information is concealed inside other information in a way that the concealed information cannot be detectable by the human eye. Many ways are available to hide data inside a cover media for example text, image, and audio steganography, but image steganography is the most utilized technique among the others. Secure image steganography has a high-security level than traditional technique by combining steganography with cryptography due to encrypting secret information by cryptography algorithm before embedding it into the cover media by steganography algorithm. In this paper,a systematic review has been presented about secure image steganography and its renowned types. Many researchers proposed secure image steganography by using various cryptography and steganography algorithms which have been reviewed. The least significant bit ‘LSB’ was the renowned steganography algorithm which has been used by researchers due to its simplicity, while various cryptography algorithms like advanced encryption standard (AES) and blowfishhave been used to propose secure image steganography in the reviewed papers. The comparison among the reviewed papers indicated that the LSB with hash-RSA gave a greater peak signal-noise ratio ‘PSNR’ value than the others which was 74.0189 dB.</p>


Author(s):  
Dian Ahkam Sani ◽  
Mohammad Zoqi Sarwani ◽  
Muhamad Agus Setiawan

Around the world, the internet (interconnection network) has developed into one of the most popular data communication media. With a variety of illegal information retrieval techniques that are developing, many people are trying to access information that is not their right. Various techniques to protect confidential information from unauthorized persons have been carried out to secure important data. Steganography is a science and art for writing hidden messages so that no other party knows the existence of the message. The three results of tests conducted by the LSB method can be used to hide messages into images. The first test was successful by writing a message that less than 31 characters stored in the picture, the second succeeded in writing a message equal to 31 characters stored in the picture, the third failed to write a message of more than 31 characters stored in the picture.


Sign in / Sign up

Export Citation Format

Share Document