Text Data Security Using LCG and CBC with Steganography Technique on Digital Image
Abstract
This research proposes a text data security method using a combination of Linear Congruential Generator (LCG), Advanced Encryption Standard (AES) Cipher Block Chaining (CBC) mode, and Least Significant Bit (LSB) steganography technique on digital images. The message scrambling process using LCG produces ASCII characters as noise that is inserted in the original message. After that, the message is encrypted using AES-256 CBC to provide additional security. The encryption result is then hidden in the digital image through LSB steganography technique. Tests were conducted on images with JPEG and BMP formats to measure the visual quality after the data insertion process, as measured by PSNR (Peak Signal-to-Noise Ratio). The test results show a PSNR value of 56.60 dB for JPEG images and 70.84 dB for BMP images. In addition, the insertion process in JPEG images degrades the image quality, mainly due to lossy compression, compared to the lossless BMP format. This study concludes that the proposed combination of methods is effective in hiding messages in images, but is susceptible to compression on lossy formats such as JPEG. The use of lossless image formats such as BMP or PNG is recommended to maintain data integrity.
References
[2] P. A. Rizky and S. Soim, “Implementasi Algoritma Kriptografi AES CBC Untuk Keamanan Komunikasi Data Pada Hardware,” vol. 3, no. 1, pp. 71–78, 2024.
[3] D. N. Triwibowo, P. -, I. A. Ashari, A. S. Sandi, and Y. F. Rahman, “Enkripsi Pesan Menggunakan Algoritma Linear Congruential Generator (LCG) dan Konversi Kode Morse,” Bul. Ilm. Sarj. Tek. Elektro, vol. 3, no. 3, pp. 194–201, 2022, doi: 10.12928/biste.v3i3.5546.
[4] A. Nugrahantoro, A. Fadlil, and I. Riadi, “Optimasi Keamanan Informasi Menggunakan Algoritma Advanced Encryption Standard (AES) Mode Chiper Block Chaining (CBC),” J. Ilm. FIFO, vol. 12, no. 1, p. 12, 2020, doi: 10.22441/fifo.2020.v12i1.002.
[5] M. Afsari, D. I. Mulyana, A. Damaiyanti, and N. Sa’adah, “Implementasi Mode Operasi Kombinasi Cipher Block Chaining dan Metode LSB-1 Pada Pengamanan Data text,” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 70–82, 2022, doi: 10.47709/jpsk.v2i01.1381.
[6] M. Siahaan and J. Manurung, “Perancangan Aplikasi Penyandian Teks Menggunakan Algoritma Triple DES,” J. Ilmu Komput. dan Sist. vol. 3, no. 3, pp. 197–201, 2021, [Online]. Available: http://ejournal.sisfokomtek.org/index.php/jikom/a rticle/view/116
[7] M. Suwarni, J. Wahyudi, and K. Khairil, “Comparison of the DES Cryptographic Algorithm and the AES Algorithm in Securing Document Files,” J. Media Comput. Sci., vol. 2, no. 1, pp. 41–48, 2023, doi: 10.37676/jmcs.v2i1.3348.
[8] C. Umam and M. Muslih, “Enkripsi Data Teks Dengan AES dan Steganografi DWT,” InComTech J. Telekomun. dan Komput., vol. 13, no. 1, p. 28, 2023, doi: 10.22441/incomtech.v13i1.15059.
[9] W. Diaztary, D. Atmajaya, F. Umar, Purnawansyah, Harlinda, and S. M. Abdullah, “Tiny Encryption Algorithm on Discrete Cosine Transform Watermarking,” 3rd 2021 East Indones. Conf. Comput. Inf. Technol. EIConCIT 2021, pp. 415–420, 2021, doi: 10.1109/EIConCIT50028.2021.9431930.
[10] B. O. Sinaga, S. Sinurat, and T. Zebua, “Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen,” J. Informatics …, vol. 1, no. 4, pp. 144–152, 2021.
[11] M. Furqan, Sriani, and D. Vita, “Application Of RSA-CRT Cryptographic Methods And LSB- LCG Steganography Method In Message Security Systems With Video Media,” J. Infokum, vol. 10, no. 3, pp. 93–103, 2022.
[12] A. Sudrajat, Y. H. Prasetyo, and M. Kusumawardani, “Implementasi Enkripsi Advanced Encryption Standard (AES-128) Mode Cipher Block Chaining (CBC) sebagai Keamanan Komunikasi Pergerakan Robot Humanoid KRSBI,” J. Jartel J. Jar. Telekomun., vol. 11, no. 1, pp. 6–11, 2021, doi: 10.33795/jartel.v11i1.16.
[13] N. A. Ramadhani and I. Susilawati, “Penerapan Steganografi untuk Penyisipan Pesan Teks pada Citra Digital dengan Menggunakan Metode Least Significant Bit,” J. Multimed. Artif. Intell., vol. 4, no. 1, pp. 21–27, 2020.
[14] A. P. Ratnasari and F. A. Dwiyanto, “Metode Steganografi Citra Digital,” Sains, Apl. Komputasi dan Teknol. Inf., vol. 2, no. 2, p. 52, 2020, doi: 10.30872/jsakti.v2i2.3300.
[15] W. Mahmud and E. Mintorini, “Pengamanan Data Kombinasi Metode Cipher Block Chaining dan Modifikasi LSB,” Techno.Com, vol. 19, no. 1, pp. 97–102, 2020, doi: 10.33633/tc.v19i1.3375
[16] D. E. Kurniawan and N. Narupi, “Teknik Penyembunyian Data Menggunakan Kombinasi Kriptografi Rijndael dan Steganografi Least Significant Bit (LSB)”, JuTISI, vol. 2, no. 3, Dec. 2016.
[17] D. E. Kurniawan, N. R. Hartadi, and P. Prasetyawan, “Analisis Hasil Teknik Penyembunyian Hak Cipta Menggunakan Transformasi DCT dan RSPPMC pada Jejaring Sosial,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 3, Art. no. 3, Aug. 2018, doi: 10.25126/jtiik.201853692.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Penulis yang telah mempublikasikan artikel pada JAIC menyatakan setuju bahwa:
1. Artikel belum dan tidak pernah dipublikasikan sebelumnya pada jurnal ilmiah lain, prosiding ataupun jurnal elektronik lainnya.
2. Artikel yang telah diserahkan menjadi hak penuh kepada pengelola JAIC Politeknik Negeri Batam
3. Artikel diperbolehkan untuk dishare ke khalayak untuk meningkatkan produktivitas rujukan dan sitasi dari naskah yang telah terbit.