Securing and Concealing Messages in the Edge Area of Digital Images Using Least Significant Bit Method and Blowfish Algorithm

Arviansyah Nur, Julian Supardi, M. Naufal Rachmatullah

Abstract

The process of cryptography produces random text that can obscure a message, making it difficult for others to read. However, cryptography itself is still not strong enough to secure the message, so steganography is needed to conceal the existence of the message from the human eye. Besides hiding the message, another objective is to assess the impact of message embedding. In the process of encrypting and decrypting the message, the Blowfish algorithm is used, while message embedding utilizes the Least Significant Bit steganography, and edge detection is performed using the Canny algorithm. Through research conducted with the combination of cryptography and steganography, an excellent image is obtained with a PSNR value of 76.6932 and MSE of 0.0013 for a message length of 64 bytes. Meanwhile, visually, the results show a relatively similar appearance between the host image and the stego image.

Full Text:

PDF

References

M. M. Hariady, A. Suyatno, and I. F. Astuti, "Keamanan dan Penyisipan Pesan Rahasia Pada Gambar Dengan Enkripsi Blowfish Dan Steganografi End Of File,"

C. Irawan, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, "Hiding and securing message on edge areas of image using LSB steganography and OTP encryption," in 2017 1st International Conference on Informatics and Computational Sciences (ICICoS), 2017, pp. 1-6, doi: 10.1109/ICICOS.2017.8276328.

M. K. Harahap and N. Khairina, "Analisis Algoritma One Time Pad Dengan Algoritma Cipher Transposisi Sebagai Pengamanan Pesan Teks," Sinkron: Jurnal Dan Penelitian Teknik Informatika, vol. 1, no. 2, pp. 58-62, 2017. [Online]. Available: https://doi.org/10.33395/sinkron.v1i2.42.

S. Sukatmi, "Perbandingan Deteksi Tepi Citra Digital Dengan Metode Prewitt, Sobel dan Canny," KOPERTIP : Jurnal Ilmiah Manajemen Informatika dan Komputer, vol. 01, no. 01, pp. 1-4, 2017.

Octamanullah Mohamad. Perbandingan Algoritma Kriptografi Kunci Simetrik BlowFish dan TwoFish

K. Joshi, S. Gill and R. Yadav, "A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image," Journal of Computer Networks and Communications, pp. 1-11, 2018.

J. K. Mandal, Reversible Steganography and Authentication via Transform Encoding, Springer, 2020.

N. Khairina and M. K. Harahap, "Menjaga Kerahasiaan Data dengan Steganografi Kombinasi LSB-2 dengan LSB-3," SinkrOn - Jurnal & Penelitian Teknik Informatika , vol. 3, no. 1, pp. 286-288, 2018.

G. Chen, H. Zhao, C. K. Pang, T. Li and C. Pang, "Image Scaling: How Hard Can It Be?," IEEE Access, vol. 7, pp. 129452-129465, 2019.

R. Munir, Pengolahan Citra Digital Menggunakan Pendekatan Algoritmik. Bandung: Informatika, 2005.

A. Pranata and E. ZuniAstuti, "Pengolahan Citra Berbasis Deteksi Tepi Prewitt Pada Gambar Gigi Manusia," Jurnal Eksplora Informatika, vol. 6, no. 2, pp. 98-105, 2017. [Online]. Available: https://mail.eksplora.stikom-bali.ac.id/index.php/eksplora/article/view/110

Refbacks

  • There are currently no refbacks.