Text Data Security Using LCG and CBC with Steganography Technique on Digital Image

  • Muhammad Wildan Universitas Amikom Yogyakarta
  • Wahid Miftahul Ashari Universitas Amikom Yogyakarta

Abstract

This research proposes a text data security method using a combination of Linear Congruential Generator (LCG), Advanced Encryption Standard (AES) Cipher Block Chaining (CBC) mode, and Least Significant Bit (LSB) steganography technique on digital images. The message scrambling process using LCG produces ASCII characters as noise that is inserted in the original message. After that, the message is encrypted using AES-256 CBC to provide additional security. The encryption result is then hidden in the digital image through LSB steganography technique. Tests were conducted on images with JPEG and BMP formats to measure the visual quality after the data insertion process, as measured by PSNR (Peak Signal-to-Noise Ratio). The test results show a PSNR value of 56.60 dB for JPEG images and 70.84 dB for BMP images. In addition, the insertion process in JPEG images degrades the image quality, mainly due to lossy compression, compared to the lossless BMP format. This study concludes that the proposed combination of methods is effective in hiding messages in images, but is susceptible to compression on lossy formats such as JPEG. The use of lossless image formats such as BMP or PNG is recommended to maintain data integrity.

References

[1] Putra Rahmadi and Hilda Dwi Yunita, “Implementasi Pengamanan Basis Data Dengan Teknik Enkripsi,” J. Cendikia, vol. 19, no. 1, pp. 413–418, 2020.
[2] P. A. Rizky and S. Soim, “Implementasi Algoritma Kriptografi AES CBC Untuk Keamanan Komunikasi Data Pada Hardware,” vol. 3, no. 1, pp. 71–78, 2024.
[3] D. N. Triwibowo, P. -, I. A. Ashari, A. S. Sandi, and Y. F. Rahman, “Enkripsi Pesan Menggunakan Algoritma Linear Congruential Generator (LCG) dan Konversi Kode Morse,” Bul. Ilm. Sarj. Tek. Elektro, vol. 3, no. 3, pp. 194–201, 2022, doi: 10.12928/biste.v3i3.5546.
[4] A. Nugrahantoro, A. Fadlil, and I. Riadi, “Optimasi Keamanan Informasi Menggunakan Algoritma Advanced Encryption Standard (AES) Mode Chiper Block Chaining (CBC),” J. Ilm. FIFO, vol. 12, no. 1, p. 12, 2020, doi: 10.22441/fifo.2020.v12i1.002.
[5] M. Afsari, D. I. Mulyana, A. Damaiyanti, and N. Sa’adah, “Implementasi Mode Operasi Kombinasi Cipher Block Chaining dan Metode LSB-1 Pada Pengamanan Data text,” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 70–82, 2022, doi: 10.47709/jpsk.v2i01.1381.
[6] M. Siahaan and J. Manurung, “Perancangan Aplikasi Penyandian Teks Menggunakan Algoritma Triple DES,” J. Ilmu Komput. dan Sist. vol. 3, no. 3, pp. 197–201, 2021, [Online]. Available: http://ejournal.sisfokomtek.org/index.php/jikom/a rticle/view/116
[7] M. Suwarni, J. Wahyudi, and K. Khairil, “Comparison of the DES Cryptographic Algorithm and the AES Algorithm in Securing Document Files,” J. Media Comput. Sci., vol. 2, no. 1, pp. 41–48, 2023, doi: 10.37676/jmcs.v2i1.3348.
[8] C. Umam and M. Muslih, “Enkripsi Data Teks Dengan AES dan Steganografi DWT,” InComTech J. Telekomun. dan Komput., vol. 13, no. 1, p. 28, 2023, doi: 10.22441/incomtech.v13i1.15059.
[9] W. Diaztary, D. Atmajaya, F. Umar, Purnawansyah, Harlinda, and S. M. Abdullah, “Tiny Encryption Algorithm on Discrete Cosine Transform Watermarking,” 3rd 2021 East Indones. Conf. Comput. Inf. Technol. EIConCIT 2021, pp. 415–420, 2021, doi: 10.1109/EIConCIT50028.2021.9431930.
[10] B. O. Sinaga, S. Sinurat, and T. Zebua, “Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen,” J. Informatics …, vol. 1, no. 4, pp. 144–152, 2021.
[11] M. Furqan, Sriani, and D. Vita, “Application Of RSA-CRT Cryptographic Methods And LSB- LCG Steganography Method In Message Security Systems With Video Media,” J. Infokum, vol. 10, no. 3, pp. 93–103, 2022.
[12] A. Sudrajat, Y. H. Prasetyo, and M. Kusumawardani, “Implementasi Enkripsi Advanced Encryption Standard (AES-128) Mode Cipher Block Chaining (CBC) sebagai Keamanan Komunikasi Pergerakan Robot Humanoid KRSBI,” J. Jartel J. Jar. Telekomun., vol. 11, no. 1, pp. 6–11, 2021, doi: 10.33795/jartel.v11i1.16.
[13] N. A. Ramadhani and I. Susilawati, “Penerapan Steganografi untuk Penyisipan Pesan Teks pada Citra Digital dengan Menggunakan Metode Least Significant Bit,” J. Multimed. Artif. Intell., vol. 4, no. 1, pp. 21–27, 2020.
[14] A. P. Ratnasari and F. A. Dwiyanto, “Metode Steganografi Citra Digital,” Sains, Apl. Komputasi dan Teknol. Inf., vol. 2, no. 2, p. 52, 2020, doi: 10.30872/jsakti.v2i2.3300.
[15] W. Mahmud and E. Mintorini, “Pengamanan Data Kombinasi Metode Cipher Block Chaining dan Modifikasi LSB,” Techno.Com, vol. 19, no. 1, pp. 97–102, 2020, doi: 10.33633/tc.v19i1.3375
[16] D. E. Kurniawan and N. Narupi, “Teknik Penyembunyian Data Menggunakan Kombinasi Kriptografi Rijndael dan Steganografi Least Significant Bit (LSB)”, JuTISI, vol. 2, no. 3, Dec. 2016.
[17] D. E. Kurniawan, N. R. Hartadi, and P. Prasetyawan, “Analisis Hasil Teknik Penyembunyian Hak Cipta Menggunakan Transformasi DCT dan RSPPMC pada Jejaring Sosial,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 3, Art. no. 3, Aug. 2018, doi: 10.25126/jtiik.201853692.
Published
2024-11-12
How to Cite
WILDAN, Muhammad; ASHARI, Wahid Miftahul. Text Data Security Using LCG and CBC with Steganography Technique on Digital Image. JOURNAL OF APPLIED INFORMATICS AND COMPUTING, [S.l.], v. 8, n. 2, p. 400-407, nov. 2024. ISSN 2548-6861. Available at: <http://704209.wb34atkl.asia/index.php/JAIC/article/view/8457>. Date accessed: 28 nov. 2024. doi: https://doi.org/10.30871/jaic.v8i2.8457.
Section
Articles

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.