The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key

Main Article Content

Ilham Firman Ashari Eko Dwi Nugroho Dodi Devrian Andrianto M. Asyroful Nur Maulana Yusuf Makruf Alkarkhi


Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. Therefore, cryptography and steganography play pivotal roles. This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. The research methodology involves implementing 3DES + LSB using Image Citra and innovating 3DES + MD5 Hash in .txt files. The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. The more colors in the image to which the message will be inserted, the more pixel differences in the stego image will be. The images that stego objects can present are only images with .png and .jpeg extensions. Testing from the fidelity aspect, the average PSNR obtained is 66,365, meaning that the stego image quality is very good. Testing from the recovery aspect, from 4 tested stego images, showed that messages can be extracted again. Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. Testers of the computation time, from testing 1-1000 characters, show the average time required for computation is about 0.798 seconds.


Download data is not yet available.

Article Details

How to Cite
Ashari, I., Nugroho, E., Andrianto, D., Yusuf, M. A., & Alkarkhi, M. (2024, March 31). The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key. JITCE (Journal of Information Technology and Computer Engineering), 8(1), 8-18.


[1] J. Simamarta et al, Sistem Keamanan Data., 2022.
[2] A. Hidayat and A. Faizin, “Perbandingan Kriptografi Menggunakan Algoritma Data Encryption Standart (Des) Dan Algoritma Rivest Shamir Adleman (Rsa) Untuk Keamanan Data,” JASIEK (Jurnal Apl. Sains, Informasi, Elektron. dan Komputer), vol. 1, no. 2, pp. 143–148, 2019, doi: 10.26905/jasiek.v1i2.3451.
[3] I. F. Ashari, M. Alfarizi, M. N. K, and M. A. H, “Vulnerability Analysis and Proven On The neonime. co Website Using OWASP ZAP 4 and XSpear,” J. Teknol. Komput. dan Sist. Inf., vol. 5, no. 2, pp. 75–81, 2022.
[4] I. F. Ashari, L. Rizta Anugrah P, N. Andintya W, and S. T. Denira, “Analisis Celah Keamanan Dan Mitigasi Website E-Learning Itera Menggunakan Owasp Zed Attack Proxy (Zap) Vulnerability and Mitigation Analysis of the Itera E-Learning Website Using Owasp Zed Attack Proxy (Zap),” Din. Rekayasa, vol. 19, no. 1, pp. 29–35, 2023.
[5] I. F. Ashari, V. Oktariana, R. G. Sadewo, and S. Damanhuri, “Analysis of Cross Site Request Forgery ( CSRF ) Attacks on West Lampung Regency Websites Using OWASP ZAP Tools,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 11, no. 2, pp. 276–281, 2022.
[6] P. B. T. Kumbara and M. A. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Permainan Tradisional Rangku Alu,” J. Tek. Inform. dan Sist. Inf., vol. 5, no. 2, pp. 189–200, 2019, doi: 10.28932/jutisi.v5i2.1714.
[7] S. I. Febriani, S. Juanita, and M. Hardjianto, “Implementasi Kriptografi Teks pada SMS Menggunakan Algoritme Multiple Encryption dengan Metode RSA dan 3DES,” J. Telemat. Inst. Teknol. Harapan Bangsa, Bandung, vol. 15, no. 2, pp. 77–84, 2020.
[8] I. Gunawan, “Modifikasi Keamanan File dengan Algoritma Hill Cipher Untuk Mengantisipasi Dari Serangan Brute Force,” TECHSI - J. Tek. Inform., vol. 11, no. 2, p. 237, 2019, doi: 10.29103/techsi.v11i2.1272.
[9] P. H. Rantelinggi, E. Saputra, J. T. Informatika, U. Papua, and P. Korespondensi, “Algoritma Kriptografi Triple Des Dan Steganografi Lsb Sebagai Triple Des Cryptography Algorithm and Lsb Steganography As,” vol. 7, no. 4, 2020, doi: 10.25126/jtiik.202071838.
[10] T. R. Kuncoro and R. Aditama, “Analisis Kombinasi Algoritma Kriptografi Rsa Dan Algoritma Steganografi Least Significant Bit (Lsb) Dalam Pengamanan Pesan Digital,” Statmat J. Stat. Dan Mat., vol. 1, no. 2, pp. 60–82, 2019, doi: 10.32493/sm.v1i2.2947.
[11] I. F. Ashari, A. W. Bhagaskara, J. M. Cakrawarty, and P. R. Winata, “Image Steganography Analysis Using GOST Algorithm and PRNG Based on LSB,” Techno.Com, vol. 21, no. 3, pp. 700–713, 2022, doi: 10.33633/tc.v21i3.6331.
[12] I. F. Ashari, “The Evaluation of Image Messages in MP3 Audio Steganography Using Modified Low-Bit Encoding,” Telematika, vol. 15, 2021.
[13] I. F. Ashari, “Graph Steganography Based On Multimedia Cover To Improve Security and Capacity,” in 2018 International Conference on Applied Information Technology and Innovation (ICAITI), 2018, no. April 2019, pp. 194–201.
[14] I. F. Ashari, “The Evaluation of Audio Steganography to Embed Image Files Using Encryption and Snappy Compression,” Indones. J. Comput. Sci., vol. 11, no. 2, pp. 318–336, 2022.
[15] B. J. Simbolon, “Steganografi Penyisipan Pesan Pada File Citra Dengan Menggunakan Metode LSB (Least Significant Bit),” J. Nas. Komputasi dan Teknol. Inf., vol. 4, no. 1, pp. 1–6, 2021, doi: 10.32672/jnkti.v4i1.2656.
[16] Bakir and Hozairi, “Implementasi Metode Least Significant Bit ( LSB ) Dengan Enkripsi Cipher Caesar Pada Steganografi Menggunakan Image Processing,” JUSTINDO (Jurnal Sist. Teknol. Inf. Indones., vol. 3, pp. 75–81, 2018.
[17] E. Nirmala, “Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 36, 2020, doi: 10.32493/informatika.v5i1.4646.
[18] A. M. Hariman and R. Puspasari, “Penerapan Aplikasi Pengamanan Data/File Dengan Metode Enkripsi Dan Dekripsi Algoritma 3Des Dalam Jaringan Lokal Area,” Semin. Nas. Teknol. Inf. dan Multimed. 2017 - STMIK AMIKOM Yogyakarta, no. 2014, pp. 265–273.
[19] Z. Basim and P. Painem, “Implementasi Kriptografi Algoritma RC4 Dan 3DES dan Steganografi Dengan Algoritma EOF Untuk Keamanan Data Berbasis Desktop Pada SMK As-Su’udiyyah,” Skanika, vol. 3, no. 4, pp. 45–52, 2020.