The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. Therefore, cryptography and steganography play pivotal roles. This study proposes the utilization of LSB (Least Significant Bit) steg...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Andalas University
2024-03-01
|
Series: | JITCE (Journal of Information Technology and Computer Engineering) |
Subjects: | |
Online Access: | http://10.250.30.20/index.php/JITCE/article/view/177 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1823864579590979584 |
---|---|
author | Ilham Firman Ashari Eko Dwi Nugroho Dodi Devrian Andrianto M. Asyroful Nur Maulana Yusuf Makruf Alkarkhi |
author_facet | Ilham Firman Ashari Eko Dwi Nugroho Dodi Devrian Andrianto M. Asyroful Nur Maulana Yusuf Makruf Alkarkhi |
author_sort | Ilham Firman Ashari |
collection | DOAJ |
description |
Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. Therefore, cryptography and steganography play pivotal roles. This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. The research methodology involves implementing 3DES + LSB using Image Citra and innovating 3DES + MD5 Hash in .txt files. The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. The more colors in the image to which the message will be inserted, the more pixel differences in the stego image will be. The images that stego objects can present are only images with .png and .jpeg extensions. Testing from the fidelity aspect, the average PSNR obtained is 66,365, meaning that the stego image quality is very good. Testing from the recovery aspect, from 4 tested stego images, showed that messages can be extracted again. Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. Testers of the computation time, from testing 1-1000 characters, show the average time required for computation is about 0.798 seconds.
|
format | Article |
id | doaj-art-e18d7228de294c14bda45908d987d0dc |
institution | Kabale University |
issn | 2599-1663 |
language | English |
publishDate | 2024-03-01 |
publisher | Andalas University |
record_format | Article |
series | JITCE (Journal of Information Technology and Computer Engineering) |
spelling | doaj-art-e18d7228de294c14bda45908d987d0dc2025-02-08T21:26:01ZengAndalas UniversityJITCE (Journal of Information Technology and Computer Engineering)2599-16632024-03-018110.25077/jitce.8.1.8-18.2024The Evaluation of LSB Steganography on Image File Using 3DES and MD5 KeyIlham Firman Ashari0Eko Dwi Nugroho1Dodi Devrian Andrianto2M. Asyroful Nur Maulana Yusuf3Makruf Alkarkhi4Institut Teknologi SumateraInstitut Teknologi SumateraInstitut Teknologi SumateraInstitut Teknologi SumateraInstitut Teknologi Sumatera Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. Therefore, cryptography and steganography play pivotal roles. This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. The research methodology involves implementing 3DES + LSB using Image Citra and innovating 3DES + MD5 Hash in .txt files. The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. The more colors in the image to which the message will be inserted, the more pixel differences in the stego image will be. The images that stego objects can present are only images with .png and .jpeg extensions. Testing from the fidelity aspect, the average PSNR obtained is 66,365, meaning that the stego image quality is very good. Testing from the recovery aspect, from 4 tested stego images, showed that messages can be extracted again. Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. Testers of the computation time, from testing 1-1000 characters, show the average time required for computation is about 0.798 seconds. http://10.250.30.20/index.php/JITCE/article/view/177SteganographyLSB3DESMD5Cryptography |
spellingShingle | Ilham Firman Ashari Eko Dwi Nugroho Dodi Devrian Andrianto M. Asyroful Nur Maulana Yusuf Makruf Alkarkhi The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key JITCE (Journal of Information Technology and Computer Engineering) Steganography LSB 3DES MD5 Cryptography |
title | The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key |
title_full | The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key |
title_fullStr | The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key |
title_full_unstemmed | The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key |
title_short | The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key |
title_sort | evaluation of lsb steganography on image file using 3des and md5 key |
topic | Steganography LSB 3DES MD5 Cryptography |
url | http://10.250.30.20/index.php/JITCE/article/view/177 |
work_keys_str_mv | AT ilhamfirmanashari theevaluationoflsbsteganographyonimagefileusing3desandmd5key AT ekodwinugroho theevaluationoflsbsteganographyonimagefileusing3desandmd5key AT dodidevrianandrianto theevaluationoflsbsteganographyonimagefileusing3desandmd5key AT masyrofulnurmaulanayusuf theevaluationoflsbsteganographyonimagefileusing3desandmd5key AT makrufalkarkhi theevaluationoflsbsteganographyonimagefileusing3desandmd5key AT ilhamfirmanashari evaluationoflsbsteganographyonimagefileusing3desandmd5key AT ekodwinugroho evaluationoflsbsteganographyonimagefileusing3desandmd5key AT dodidevrianandrianto evaluationoflsbsteganographyonimagefileusing3desandmd5key AT masyrofulnurmaulanayusuf evaluationoflsbsteganographyonimagefileusing3desandmd5key AT makrufalkarkhi evaluationoflsbsteganographyonimagefileusing3desandmd5key |