IMPLEMENTATION OF STEGANOGRAPHY ON DIGITAL IMAGE WITH MODIFIED VIGENERE CIPHER ALGORITHM AND LEAST SIGNIFICANT BIT (LSB) METHOD

  • Gilang Miftakhul Fahmi Informatika, Fakultas Ilmu Komputer, Universitas Amikom Purwokerto, Indonesia
  • Khairunnisak Nur Isnaini Informatika, Fakultas Ilmu Komputer, Universitas Amikom Purwokerto, Indonesia
  • Didit Suhartono Informatika, Fakultas Ilmu Komputer, Universitas Amikom Purwokerto, Indonesia
Keywords: Cryptographic Algorithm, Digital Image, Least Significant Bit (LSB), Steganography

Abstract

Digital image can be utilized as a media to hide messages. There should be a special treatment in securing the messages so that the information accessibility can be controlled. Hiding messages to an image can be conducted using steganography. It can be combined with cryptography algorithms in order to make it harder to be accessed by unauthorized parties. The modification of cryptography algorithms can improve the confidentiality of the message content. This research is aimed to know the implementation of steganography in desktop applications using Least Significant Bit (LSB) that is combined with the modification of Vigenere Cipher algorithms. The developed software namely waterfall supports the creation of applications. The result of the research shows that the encrypted picture will change into gray or display in grayscale so that the hidden message will be more difficult to be accessed by the attacker. The encrypted picture will also have a bigger size file than the original version and the extended file. The LSB method will work precisely according to the formula of the modified cryptography algorithm. The further research is suggested to focus on the variation of media for content message and the picture format in their encryption.

Downloads

Download data is not yet available.

References

N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.

M. B. Akbar and E. V Haryanto, “Aplikasi Steganografi dengan Menggunakan Metode F5,” … Sist. Inf. dan Teknol. …, no. April 2013, pp. 165–178, 2015, [Online]. Available: https://ejurnal.dipanegara.ac.id/index.php/jusiti/article/view/58.

K. Khairunnisak, H. Ashari, and A. P. Kuncoro, “Analisis Forensik Untuk Mendeteksi Keaslian Citra Digital Menggunakan Metode Nist,” J. Resist. (Rekayasa Sist. Komputer), vol. 3, no. 2, pp. 72–81, 2020, doi: 10.31598/jurnalresistor.v3i2.634.

K. Lysander, A. M. Simarmata, D. Lusandy, and I. Iswandi, “Pengamanan Citra Dengan Kombinasi Modified Serpent IWT Dengan Modified Logistic Chaotic Map,” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 8, no. 3, pp. 1090–1104, 2021, doi: 10.35957/jatisi.v8i3.1019.

D. Alamsyah, “Pengenalan Mobil pada Citra Digital Menggunakan HOG-SVM,” Jatisi, vol. 1, no. 2, pp. 162–168, 2017.

Hermansa, R. Umar, and A. Yudhana, “Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra,” J. Sains Komput. Mat., vol. Vol 4, pp. 1–13, 2020.

A. P. Saputra and N. Widiyasono, “Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba),” J. Tek. Inform. dan Sist. Inf., vol. 3, no. 1, pp. 179–190, 2017, doi: 10.28932/jutisi.v3i1.594.

S. Gallagher, “Steganography: how al-Qaeda hid secret documents in a porn video,” arstechnica.com, 2012. https://arstechnica.com/information-technology/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video/ (accessed May 20, 2022).

M. Saravanan and A. Priya, “An Algorithm for Security Enhancement in Image Transmission Using Steganography,” J. Inst. Electron. Comput., vol. 1, no. 1, pp. 1–8, 2019, doi: 10.33969/jiec.2019.11001.

A. Hafiz, “Steganografi Berbasis Citra Digital Untuk Menyembunyikan Data Menggunakan Metode Least Significant Bit (Lsb),” J. Cendikia, vol. 17, no. 1 April, pp. 194–198, 2019, [Online]. Available: https://jurnal.dcc.ac.id/index.php/JC/article/view/201.

A. K. Agrahari et al., “Comprehensive Survey on Image Stegnography Using LSB With AES,” vol. 13, no. 8, pp. 5841–5844, 2018.

P. Hernawandra, S. Supriyadi, and U. T. Lenggana, “Aplikasi Steganografi Menggunakan LSB 4 Bit Sisipan dengan Kombinasi Algoritme Substitusi dan Vigenere Berbasis Android,” J. Teknol. dan Sist. Komput., vol. 6, no. 2, pp. 44–50, 2018, doi: 10.14710/jtsiskom.6.2.2018.44-50.

B. E. Widodo and A. S. Purnomo, “Implementasi Advanced Encryption Standard Pada Enkripsi Dan Dekripsi Dokumen Rahasia Ditintelkam Polda Diy,” J. Tek. Inform., vol. 1, no. 2, pp. 69–77, 2020, doi: 10.20884/1.jutif.2020.1.2.21.

T. Rijanandi et al., “Web-Based Application with SDLC Waterfall Method on Population Administration and Registration Information System (Case Study: Karangklesem Village, Purwokerto),” J. Tek. Inform., vol. 3, no. 1, pp. 99–104, 2022, [Online]. Available: https://doi.org/10.20884/1.jutif.2022.3.1.145.

D. Djesmedi, F. Firdalius, and M. R. Aditia, “MULTIMEDIA-BASED INTERACTIVE LEARNING MEDIA FOR DEAF AND MENTALLY DISABLED ELEMENTARY STUDENTS ON SLBN 1 LENGAYANG MEDIA PEMBELAJARAN INTERAKTIF BERBASIS MULTIMEDIA UNTUK SISWA SDLB TUNARUNGU DAN TUNAGRAHITA PADA SLBN 1 LENGAYANG,” vol. 3, no. 2, pp. 437–445, 2022.

E. N. T. Guruh M Arindra Pratama, “MODIFIKASI ALGORITMA VIGENERE CIPHER MENGGUNAKAN METODE CATALAN NUMBER DAN DOUBLE COLUMNAR TRANSPOSITION,” J. Teknol. Yogyakarta, vol. 4, no. 5, pp. 31–40, 2015.

P. Fitrian and T. S. Alasi, “PENGAMANAN PESAN DENGAN TEKNIK STEGANOGRAFI MENGGUNAKAN METODE LEAST SIGNIFICANT BIT PADA CITRA DIGITAL,” vol. I, no. 2, pp. 35–38, 2019.

S. Herwindyo, H. A. Wibawa, and U. Diponegoro, “Steganografi pesan teks ke dalam citra dengan metode lsb pada ruang warna ycocg terdekomposisi iwt,” vol. 9, pp. 18–23, 2017.

Y. Nyura, “Pembuatan Aplikasi Pembelajaran Bahasa Inggris Pada Handphone dengan J2ME,” J. Inform. Mulawarman, vol. 5, no. 3, pp. 18–27, 2010.

D. I. D. Merangin et al., “PERANCANGAN DAN PENERAPAN SISTEM INVENTORY BARANG PADA TOKO BIG STORE PADANG DENGAN MENGGUNAKAN BAHASA PEMROGRAMAN JAVA DAN MYSQL,” J. Inf. Technol. Comput. Sci., vol. 2, no. 2, p. 2016, 2018, [Online]. Available: https://doi.org/10.1016/j.gecco.2019.e00539%0Ahttps://doi.org/10.1016/j.foreco.2018.06.029%0Ahttp://www.cpsg.org/sites/cbsg.org/files/documents/Sunda Pangolin National Conservation Strategy and Action Plan %28LoRes%29.pdf%0Ahttps://doi.org/10.1016/j.forec.

N. D. Dzikrillah, “Aplikasi Pelayanan Jasa Laundry Di Zazi Laundry Berbasis Web Dan Nexmo Sms Api,” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 8, no. 4, pp. 1854–1867, 2021, doi: 10.35957/jatisi.v8i4.1195.

M. Tabrani, “Penerapan Metode Waterfall Pada Sistem Informasi Inventori Pt. Pangan Sehat Sejahtera,” J. Inkofar, vol. 1, no. 2, pp. 30–40, 2018, doi: 10.46846/jurnalinkofar.v1i2.12.

L. Woolcott, Understanding Metadata: What is Metadata, and What is it For? , , vol. 55, no. 7–8. 2017.

J. Junaedy and A. Munir, “Rancang Bangun Sistem Pengelolaan Data Kuliah Kerja Lapang Plus Memanfaatkan Framework Codeigniter Dengan Menggunakan Metode Waterfall,” Ilk. J. Ilm., vol. 9, no. 2, pp. 203–210, 2017, doi: 10.33096/ilkom.v9i2.141.203-210.

Khairunnisak, Alvi, and Dony, “Steganografi Gambar dengan Modifikasi Vigenere Chiper Huruf Arab ( Hijaiyah ) dan Teknik Least Significant Bit ( LSB ),” pp. 1–8, 2018.

A. Susanto, U. Kahuripan, and K. Indonesia, “Peningkatan Deteksi Steganografi Algoritma Least Significant Bit pada Citra Peningkatan Deteksi Steganografi Algoritma Least Significant Bit pada Citra Grayscale,” no. July, pp. 0–8, 2019.

L. M. Jannah, I. Santoso, and Y. Christyono, “Kinerja Steganografi Metode End of File Pada Data Citra Digital,” Transient, vol. 7, no. 1, p. 34, 2018, doi: 10.14710/transient.7.1.34-39.

Published
2023-03-23
How to Cite
[1]
G. Miftakhul Fahmi, K. N. Isnaini, and D. Suhartono, “IMPLEMENTATION OF STEGANOGRAPHY ON DIGITAL IMAGE WITH MODIFIED VIGENERE CIPHER ALGORITHM AND LEAST SIGNIFICANT BIT (LSB) METHOD ”, J. Tek. Inform. (JUTIF), vol. 4, no. 2, pp. 333-344, Mar. 2023.