The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
How to cite (IJASEIT) :
Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. Therefore, cryptography and steganography play pivotal roles. This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. The research methodology involves implementing 3DES + LSB using Image Citra and innovating 3DES + MD5 Hash in .txt files. The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. The more colors in the image to which the message will be inserted, the more pixel differences in the stego image will be. The images that stego objects can present are only images with .png and .jpeg extensions. Testing from the fidelity aspect, the average PSNR obtained is 66,365, meaning that the stego image quality is very good. Testing from the recovery aspect, from 4 tested stego images, showed that messages can be extracted again. Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. Testers of the computation time, from testing 1-1000 characters, show the average time required for computation is about 0.798 seconds.
[2] A. Hidayat and A. Faizin, “Perbandingan Kriptografi Menggunakan Algoritma Data Encryption Standart (Des) Dan Algoritma Rivest Shamir Adleman (Rsa) Untuk Keamanan Data,” JASIEK (Jurnal Apl. Sains, Informasi, Elektron. dan Komputer), vol. 1, no. 2, pp. 143–148, 2019, doi: 10.26905/jasiek.v1i2.3451.
[3] I. F. Ashari, M. Alfarizi, M. N. K, and M. A. H, “Vulnerability Analysis and Proven On The neonime. co Website Using OWASP ZAP 4 and XSpear,” J. Teknol. Komput. dan Sist. Inf., vol. 5, no. 2, pp. 75–81, 2022.
[4] I. F. Ashari, L. Rizta Anugrah P, N. Andintya W, and S. T. Denira, “Analisis Celah Keamanan Dan Mitigasi Website E-Learning Itera Menggunakan Owasp Zed Attack Proxy (Zap) Vulnerability and Mitigation Analysis of the Itera E-Learning Website Using Owasp Zed Attack Proxy (Zap),” Din. Rekayasa, vol. 19, no. 1, pp. 29–35, 2023.
[5] I. F. Ashari, V. Oktariana, R. G. Sadewo, and S. Damanhuri, “Analysis of Cross Site Request Forgery ( CSRF ) Attacks on West Lampung Regency Websites Using OWASP ZAP Tools,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 11, no. 2, pp. 276–281, 2022.
[6] P. B. T. Kumbara and M. A. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Permainan Tradisional Rangku Alu,” J. Tek. Inform. dan Sist. Inf., vol. 5, no. 2, pp. 189–200, 2019, doi: 10.28932/jutisi.v5i2.1714.
[7] S. I. Febriani, S. Juanita, and M. Hardjianto, “Implementasi Kriptografi Teks pada SMS Menggunakan Algoritme Multiple Encryption dengan Metode RSA dan 3DES,” J. Telemat. Inst. Teknol. Harapan Bangsa, Bandung, vol. 15, no. 2, pp. 77–84, 2020.
[8] I. Gunawan, “Modifikasi Keamanan File dengan Algoritma Hill Cipher Untuk Mengantisipasi Dari Serangan Brute Force,” TECHSI - J. Tek. Inform., vol. 11, no. 2, p. 237, 2019, doi: 10.29103/techsi.v11i2.1272.
[9] P. H. Rantelinggi, E. Saputra, J. T. Informatika, U. Papua, and P. Korespondensi, “Algoritma Kriptografi Triple Des Dan Steganografi Lsb Sebagai Triple Des Cryptography Algorithm and Lsb Steganography As,” vol. 7, no. 4, 2020, doi: 10.25126/jtiik.202071838.
[10] T. R. Kuncoro and R. Aditama, “Analisis Kombinasi Algoritma Kriptografi Rsa Dan Algoritma Steganografi Least Significant Bit (Lsb) Dalam Pengamanan Pesan Digital,” Statmat J. Stat. Dan Mat., vol. 1, no. 2, pp. 60–82, 2019, doi: 10.32493/sm.v1i2.2947.
[11] I. F. Ashari, A. W. Bhagaskara, J. M. Cakrawarty, and P. R. Winata, “Image Steganography Analysis Using GOST Algorithm and PRNG Based on LSB,” Techno.Com, vol. 21, no. 3, pp. 700–713, 2022, doi: 10.33633/tc.v21i3.6331.
[12] I. F. Ashari, “The Evaluation of Image Messages in MP3 Audio Steganography Using Modified Low-Bit Encoding,” Telematika, vol. 15, 2021.
[13] I. F. Ashari, “Graph Steganography Based On Multimedia Cover To Improve Security and Capacity,” in 2018 International Conference on Applied Information Technology and Innovation (ICAITI), 2018, no. April 2019, pp. 194–201.
[14] I. F. Ashari, “The Evaluation of Audio Steganography to Embed Image Files Using Encryption and Snappy Compression,” Indones. J. Comput. Sci., vol. 11, no. 2, pp. 318–336, 2022.
[15] B. J. Simbolon, “Steganografi Penyisipan Pesan Pada File Citra Dengan Menggunakan Metode LSB (Least Significant Bit),” J. Nas. Komputasi dan Teknol. Inf., vol. 4, no. 1, pp. 1–6, 2021, doi: 10.32672/jnkti.v4i1.2656.
[16] Bakir and Hozairi, “Implementasi Metode Least Significant Bit ( LSB ) Dengan Enkripsi Cipher Caesar Pada Steganografi Menggunakan Image Processing,” JUSTINDO (Jurnal Sist. Teknol. Inf. Indones., vol. 3, pp. 75–81, 2018.
[17] E. Nirmala, “Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 36, 2020, doi: 10.32493/informatika.v5i1.4646.
[18] A. M. Hariman and R. Puspasari, “Penerapan Aplikasi Pengamanan Data/File Dengan Metode Enkripsi Dan Dekripsi Algoritma 3Des Dalam Jaringan Lokal Area,” Semin. Nas. Teknol. Inf. dan Multimed. 2017 - STMIK AMIKOM Yogyakarta, no. 2014, pp. 265–273.
[19] Z. Basim and P. Painem, “Implementasi Kriptografi Algoritma RC4 Dan 3DES dan Steganografi Dengan Algoritma EOF Untuk Keamanan Data Berbasis Desktop Pada SMK As-Su’udiyyah,” Skanika, vol. 3, no. 4, pp. 45–52, 2020.
Please find the rights and licenses in the Journal of Information Technology and Computer Engineering (JITCE).
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)’ Warranties
The author(s) warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary permissions to quote from other sources have been obtained by the author(s).
3. User Rights
JITCE adopts the spirit of open access and open science, which disseminates articles published as free as possible under the Creative Commons license. JITCE permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and JITCE on distributing works in the journal.
4. Rights of Authors
Authors retain the following rights:
- Copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in future own works, including lectures and books,
- the right to reproduce the article for own purposes,
- the right to self-archive the article.
- the right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Journal of Information Technology and Computer Engineering).
5. Co-Authorship
If the article was jointly prepared by other authors; upon submitting the article, the author is agreed on this form and warrants that he/she has been authorized by all co-authors on their behalf, and agrees to inform his/her co-authors. JITCE will be freed on any disputes that will occur regarding this issue.
7. Royalties
By submitting the articles, the authors agreed that no fees are payable from JITCE.
8. Miscellaneous
JITCE will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed and JITCE or its sublicensee has become obligated to have the article published. JITCE may adjust the article to a style of punctuation, spelling, capitalization, referencing and usage that it deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers.