The Application Of Encryption And Decryption To The Delivery Of Text Messages Using The Rc4 Algorithm (Rivest Code 4) Utilizes The Lsb (Least Of Significant Bit) Algorithm As An Insertion Into The Image

Authors

  • Al Boy In STMIK Kaputama Binjai, Indonesia
  • Achmad Fauzi STMIK Kaputama Binjai, Indonesia
  • Hermansyah Sembiring STMIK Kaputama Binjai, Indonesia

DOI:

https://doi.org/10.55227/ijhet.v1i2.15

Keywords:

Cryptography, Image, LSB, Message, RC4, Stegnography.

Abstract

The use of image media information has several disadvantages, one of which is that it is easy to manipulate by certain parties with the help of technology that is developing today. Efforts that can be made in improving the security of the transmission of image information are cryptography, which is the science and art of keeping messages safe. In this study, the RC4 (Rivest Code 4) and LSB (Least Of Significant Bit) stegnography methods were applied which aimed to obtain a stronger cipher by inserting messages into the image so that it was difficult to intercept. RC4 (Rivest Code 4) algorithm for encrypting and decryption, LSB (Least Of Significant Bit) stegnography used to decode and decode images. The results of this study show that by applying RC4 (Rivest Code 4) and LSB Stegnography (Least Of Significant Bit) can secure messages inserted into the image and secure keys for data needs. The encoding and decoding process time is influenced by the number of messages that will be kept secret.

Downloads

Download data is not yet available.

References

Ardiansyah, A., & Kurniasih, M. (2018). Concealment of Secret Messages On Digital Images With Steganograpi Technique Using Least Significant Bit Method. XIII(November), 96–101.

Darwis, D. (2016). Implementation Of Least Significant Bit Steganography Techniques (LSB) And Compression For Securing Electronic Mail Sending Data. Journal of Technoinfo, 10(2), 32. https://doi.org/10.33365/jti.v10i2.8

Mukhtar, H. (2018). Cryptography For Data Security. Yogyakarta: CV. MAIN BOB.

Kusniyati, H., Diansyah, S., Yusuf, R., Informatics, J., Computer, F. I., & Buana, U. M. (2018). Application of the rivert code 4 (rc 4) algorithm to document cryptographic applications. 11(1), 38–47.

Minarni, M., & Fernando, A. G. (2020). IMPLEMENTATION OF THE END OF FILE (EoF) ALGORITHM ON IMAGE STEGANOGRAPHY. TechnoIf Journal, 8(1), 25. https://doi.org/10.21063/jtif.2020.v8.1.25-31

Nurdin, A. P. N. (2017). Cryptographic Analysis and Implementation of Confidential Messages. Jesik, 3(1), 1–11. nnurdin69@gmail.com

Prabowo, D. A., & Abdullah, D. (2018). Object Detection and Calculation Based on Color Using Color Object Tracking. Pseudocode, 5(2), 85–91. https://doi.org/10.33369/pseudocode.5.2.85-91

Saragi, D. R., Gultom, J. M., Tampubolon, J. A., & Gunawan, I. (2020). Securing Text File Data (Word) Using RC4 Algorithm. Journal of Computer Systems And Informatics (JSON), 1(2), 114. https://doi.org/10.30865/json.v1i2.1745

Simatupang, J., & Sianturi, S. (2019). Design of Bus Ticket Booking Information System On Po. Handoyo Based Online. Intra-Tech, 3, 16-18.

Sugiarti, Y. (2013). UML Analysis and Design (Unifed Modeling Language). Graha Ilmu, Yogyakarta

Wahana, K. (2013). Visual Basic 2012 Programming (Hernita P ed.). (A. O. C.V, Ed.) Semarang: Computer Rides. Retrieved 2013

Zebua, T., & Ndruru, E. (2017). Digital Image Security Based on Algorithm Modifications Rc4. 4(4), 275–282. https://doi.org/10.25126/jtiik.201744474

Downloads

Published

2022-07-11

How to Cite

Al Boy In, Achmad Fauzi, & Hermansyah Sembiring. (2022). The Application Of Encryption And Decryption To The Delivery Of Text Messages Using The Rc4 Algorithm (Rivest Code 4) Utilizes The Lsb (Least Of Significant Bit) Algorithm As An Insertion Into The Image. International Journal of Health Engineering and Technology (IJHET), 1(2). https://doi.org/10.55227/ijhet.v1i2.15

Issue

Section

Technology