The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key

Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. Therefore, cryptography and steganography play pivotal roles. This study proposes the utilization of LSB (Least Significant Bit) steg...

Full description

Saved in:
Bibliographic Details
Main Authors: Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi
Format: Article
Language:English
Published: Andalas University 2024-03-01
Series:JITCE (Journal of Information Technology and Computer Engineering)
Subjects:
Online Access:http://10.250.30.20/index.php/JITCE/article/view/177
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823864579590979584
author Ilham Firman Ashari
Eko Dwi Nugroho
Dodi Devrian Andrianto
M. Asyroful Nur Maulana Yusuf
Makruf Alkarkhi
author_facet Ilham Firman Ashari
Eko Dwi Nugroho
Dodi Devrian Andrianto
M. Asyroful Nur Maulana Yusuf
Makruf Alkarkhi
author_sort Ilham Firman Ashari
collection DOAJ
description Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. Therefore, cryptography and steganography play pivotal roles. This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. The research methodology involves implementing 3DES + LSB using Image Citra and innovating 3DES + MD5 Hash in .txt files. The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. The more colors in the image to which the message will be inserted, the more pixel differences in the stego image will be. The images that stego objects can present are only images with .png and .jpeg extensions. Testing from the fidelity aspect, the average PSNR obtained is 66,365, meaning that the stego image quality is very good. Testing from the recovery aspect, from 4 tested stego images, showed that messages can be extracted again. Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. Testers of the computation time, from testing 1-1000 characters, show the average time required for computation is about 0.798 seconds.
format Article
id doaj-art-e18d7228de294c14bda45908d987d0dc
institution Kabale University
issn 2599-1663
language English
publishDate 2024-03-01
publisher Andalas University
record_format Article
series JITCE (Journal of Information Technology and Computer Engineering)
spelling doaj-art-e18d7228de294c14bda45908d987d0dc2025-02-08T21:26:01ZengAndalas UniversityJITCE (Journal of Information Technology and Computer Engineering)2599-16632024-03-018110.25077/jitce.8.1.8-18.2024The Evaluation of LSB Steganography on Image File Using 3DES and MD5 KeyIlham Firman Ashari0Eko Dwi Nugroho1Dodi Devrian Andrianto2M. Asyroful Nur Maulana Yusuf3Makruf Alkarkhi4Institut Teknologi SumateraInstitut Teknologi SumateraInstitut Teknologi SumateraInstitut Teknologi SumateraInstitut Teknologi Sumatera Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. Therefore, cryptography and steganography play pivotal roles. This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. The research methodology involves implementing 3DES + LSB using Image Citra and innovating 3DES + MD5 Hash in .txt files. The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. The more colors in the image to which the message will be inserted, the more pixel differences in the stego image will be. The images that stego objects can present are only images with .png and .jpeg extensions. Testing from the fidelity aspect, the average PSNR obtained is 66,365, meaning that the stego image quality is very good. Testing from the recovery aspect, from 4 tested stego images, showed that messages can be extracted again. Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. Testers of the computation time, from testing 1-1000 characters, show the average time required for computation is about 0.798 seconds. http://10.250.30.20/index.php/JITCE/article/view/177SteganographyLSB3DESMD5Cryptography
spellingShingle Ilham Firman Ashari
Eko Dwi Nugroho
Dodi Devrian Andrianto
M. Asyroful Nur Maulana Yusuf
Makruf Alkarkhi
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
JITCE (Journal of Information Technology and Computer Engineering)
Steganography
LSB
3DES
MD5
Cryptography
title The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
title_full The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
title_fullStr The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
title_full_unstemmed The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
title_short The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
title_sort evaluation of lsb steganography on image file using 3des and md5 key
topic Steganography
LSB
3DES
MD5
Cryptography
url http://10.250.30.20/index.php/JITCE/article/view/177
work_keys_str_mv AT ilhamfirmanashari theevaluationoflsbsteganographyonimagefileusing3desandmd5key
AT ekodwinugroho theevaluationoflsbsteganographyonimagefileusing3desandmd5key
AT dodidevrianandrianto theevaluationoflsbsteganographyonimagefileusing3desandmd5key
AT masyrofulnurmaulanayusuf theevaluationoflsbsteganographyonimagefileusing3desandmd5key
AT makrufalkarkhi theevaluationoflsbsteganographyonimagefileusing3desandmd5key
AT ilhamfirmanashari evaluationoflsbsteganographyonimagefileusing3desandmd5key
AT ekodwinugroho evaluationoflsbsteganographyonimagefileusing3desandmd5key
AT dodidevrianandrianto evaluationoflsbsteganographyonimagefileusing3desandmd5key
AT masyrofulnurmaulanayusuf evaluationoflsbsteganographyonimagefileusing3desandmd5key
AT makrufalkarkhi evaluationoflsbsteganographyonimagefileusing3desandmd5key