MSB Steganography Text Message Insertion Technique On Imagery With Otp And RSA Algorithms
DOI:
https://doi.org/10.55227/ijhet.v1i3.70Keywords:
Cryptography, Image, Message, OTP, RSA, Steganography MSB (Most Significant Bit).Abstract
The use of image media information has several weaknesses, one of which is that it is easy to be manipulated by certain parties with the help of currently developing technology. Efforts that can be made in increasing the security of sending image information are cryptography, which is the science and art of maintaining message security. In this study, the OTP, RSA and MSB (Most Significant Bit) steganography methods were applied which aim to obtain a stronger cipher by inserting a message into the image so that it is difficult to tap. OTP and RSA algorithms for encrypting and decrypting, MSB (Most Significant Bit) Steganography which is used for encoding and decoding images. The results of this study indicate that by applying the OTP, RSA and MSB (Most Significant Bit) Steganography algorithms can secure messages that are inserted into the image and secure the key for data needs. The encoding and decoding process time is affected by the number of messages to be kept secret.
Downloads
References
Afandi, I. (2019). Implementation Of Linear Congruential Generator (Lcg), Most Significant Bit (Msb) Algorithm And Fibonacci Code In Compression And Securing Messages Using Imagery. Medan: University of North Sumatra.
Brink, J. van den (Pieter J. C. M., Monumentenstichting Baet en Borgh., N. B., Historische Vereniging Tweestromenland., J., & Azanuddin, A. (2014). Mensen van Maas en Waal. Journal of SAINTIKOM (Journal of Informatics and Computer Management Science), 18(1), 30–34. https://ojs.trigunadharma.ac.id/index.php/jis/article/view/100
Fahlevi, M. R., Ridha, D., Putri, D., & Doni, R. (2020). Text File Security Techniques Using Cryptography With One Time Pad Cipher Algorithm. 4(September), 588–597.
Fauzi, A., Maulita, Y., & Novriyenni. (2017). Designing Message Security Applications Using Elgamal Algorithms By Utilizing One Time Pad Algorithms as Key Generators. Kaputana Journal of Informatics Engineering (JTIK), 1(1), 1–9.
Ginting, A., Isnanto, R. R., & Windasari, I. P. (2015). Implementation of RSA Cryptographic Algorithms for Email Encryption and Decryption. Journal of Computer Technology and Systems, 3(2), 253. https://doi.org/10.14710/jtsiskom.3.2.2015.253-258
Hidayatullah, P. (2017). Digital Image Management Theory And Real Application. Bandung: Informatics Bandung.
Ladjamudin, A.-b. B. (2006). Information System Design Analysis . Graha
Lutfi, S., & Rosihan, R. (2018). Comparison of Lsb (Least Significant Bit) And Msb (Most Significant Bit) Steganography Methods To Hide Confidential Information Into Digital Images. JIKO (Journal of Informatics And Computers), 1(1), 34–42. https://doi.org/10.33387/jiko.v1i1.1169
Microsoft, (2021). File format for saving documents. Retrieved June 22, 2019, from https://support.office.com/id-id/article/format-file-untuk-menyimpan-dokumen-88de3863-c9e5-4f89-be60-906f9065e43c.
Minarni, M., & Fernando, A. G. (2020). IMPLEMENTATION OF THE END OF FILE (EoF) ALGORITHM ON IMAGE STEGANOGRAPHY. TechnoIf Journal, 8(1), 25. https://doi.org/10.21063/jtif.2020.v8.1.25-31
Nurdin, A. P. N. (2017). Cryptographic Analysis and Implementation of Confidential Messages. Jesik, 3(1), 1–11. nnurdin69@gmail.com
Oetomo, B. D. (2006). Information System Planning & Development. Yogyakarta: C.V ANDI OFFSET.
Rini, B. (2011). Microsoft Visual Basic 2010 And Mysql For Point Of Sales Applications. Wahana Komputer, Yogyakarta.
Sitorus, S. H., Ristian, U., Engineering, J., & Computer, S. (2020). STEGANOGRAPHY COMPARISON OF LEAST SIGNIFICANT BIT + 3 ( LSB + 3 ) METHOD WITH MOST SIGNIFICANT BIT ( MSB ). 08(01).
Sugiarti, Y. (2013). UML Analysis and Design (Unifed Modeling Language). Graha Ilmu, Yogyakarta.
Supriyono. (2008). Testing of encryption-decryption systems with the rsa method for document security. Journal of the College of Nuclear Technology – BATAN, 2, 179–194. https://doi.org/10.1111/j.1365-2923.2010.03863.x