PENDEKATAN STEGO-KRIPTO MODE CIPHER BLOCK CHAINING UNTUK PENGAMANAN INFORMASI PADA CITRA DIGITAL

  • Vera Wati (1*) Magister Teknik Informatika Unversitas AMIKOM Yogyakarta
  • Hanifatus Sa’diyah (2) Magister Teknik Informatika Unversitas AMIKOM Yogyakarta
  • Dony Ariyus (3) Magister Teknik Informatika Unversitas AMIKOM Yogyakarta

  • (*) Corresponding Author
Keywords: Stego-Crypto, CBC, Information Security, LSB

Abstract

The digital image can be one of the media for information security. The contents of information have an important value of effectiveness, one of which is as a support in decision making. Then the information needs to be done to safeguard the authority of parties who are not responsible. Such security can utilize Steganography and Cryptography (Stego-Crypto). The method used combines Stego-Crypto by randomizing information using Cipher Block Chaining (CBC) then the encryption results are secured through digital images. Based on the test results by measuring the capacity of information on the image produces test data if CBC can process characters in uppercase, spaces and other characters and the results of plaintext and ciphertext produce a ratio of 1: 2, but the LSB performance only accommodates characters depending on the number of sizes on digital image. Testing by evaluating the difference in pixel histogram, when viewed with an invisible not very visible difference, but the insertion of messages with 100-200 characters causes the addition of the average image size on stego images larger than 1: 4, the value of 1 from the original image. Besides, testing with the help of communication media, stego images or encrypted images is able to use email to send stego images because LSB is sensitive to the process of resizing images

Downloads

Download data is not yet available.

References

Ariyus, D. (2008). Pengantar Ilmu Kriptografi: Teori Analisis & Implementasi. Penerbit Andi.

Arta, Y. (2017). Implementasi Intrusion Detection System Pada Rule Based System Menggunakan Sniffer Mode Pada Jaringan Lokal. IT JOURNAL RESEARCH AND DEVELOPMENT, 2(1), 43. https://doi.org/10.25299/itjrd.2017.vol2(1).979

Azmi, F., & Erika, W. (2017). Analisis Keamanan Data Pada Block Cipher Algoritma Kriptografi Rsa. CESSJournal Of Computer Engineering, System And Science, 2(1), 102–104. Retrieved from http://jurnal.unimed.ac.id/2012/index.php/cess/article/view/4967

Cahyadi, T. (2012). Implementasi Steganografi LSB Dengan Enkripsi Vigenere Cipher Pada Citra. TRANSIENT, 1(4), 281–288. https://doi.org/10.22487/j26204118.2018.v1.i2.11221

Chang, Y. F., & Tai, W. L. (2012). Histogram-based reversible data hiding based on pixel differences with prediction and sorting. KSII Transactions on Internet and Information Systems, 6(12), 3100–3116. https://doi.org/10.3837/tiis.2012.12.004

Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.

Danuputri, C., Mantoro, T., & Hardjianto, M. (2016). Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment. Proceedings - 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015, 22–27. https://doi.org/10.1109/CyberSec.2015.14

Darma, P. (2010). Pengolahan Citra Digital. Yogyakarta: Penerbit ANDI.

Fadlan, M., & Hadriansa, H. (2017). Rekayasa Aplikasi Kriptografi dengan Penerapan Kombinasi Algoritma Knapsack Merkle Hellman dan Affine Cipher. Jurnal Teknologi Informasi Dan Ilmu Komputer, 4(4), 268. https://doi.org/10.25126/jtiik.201744468

Hermansa, Umar, R., & Yudhana, A. (2019). Analisis Sistem Keamanan Teknik Kriptografi Dan Steganografi Pada Citra Digital ( Bitmap ). Seminar Nasional Teknologi Fakultas Teknik Universitas Krisnadwipayana, 1–9.

Hernawandra, P., Supriyadi, S., & Lenggana, U. T. (2018). Aplikasi Steganografi Menggunakan LSB 4 Bit Sisipan dengan Kombinasi Algoritme Substitusi dan Vigenere Berbasis Android. Jurnal Teknologi Dan Sistem Komputer, 6(2), 44. https://doi.org/10.14710/jtsiskom.6.2.2018.44-50

Jain, A. (2019). A Secured Steganography Technique for Hiding Multiple Images in an Image Using Least Significant Bit Algorithm and Arnold Transformation. International Conference on Intelligent Data Communication Technologies and Internet of Things, 373–380.

Jawed, A., & Das, A. (2015). Security Enhancement in Audio Steganography by RSA Algorithm. International Journal of Electronics and Communication Technology, 6(1), 139–142.

Rochmah, N., & Ardiansyah. (2016). Desain Kriptografi CBC Modifikasi pada Proses Pengamanan Pesan melalui Email. Seminar Nasional Teknologi Informasi Dan Multimedia, 2(1), 1–6.

Saleh, S. M. (2009). Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher ﺭﻴﻔﺸﺘﻟﺍ ﻰﻟﺇ ﺭﻴﻔﺸﺘﻟﺍ ﻉﺎﻁﻗ ﺔﻠﺴﻠﺴ ﺔﻐﻴﺼ لﻴﻭﺤﺘﺒ ﺔﻴﻔﺨﻤﻟﺍ ﺕﺎﻨﺎﻴﺒﻟﺍ ﺔﻴﻨﻤﺃ ﻥﻴﺴﺤﺘ ﻲﺒﺎﻴﺴﻨﻻﺍ ﺔﺼﻼﺨﻟﺍ. 27(13).

Sari, J. I., Sulindawaty, & Sihotang, H. T. (2017). Implementasi Penyembunyian Pesan Pada Citra Digital Dengan Menggabungkan Algoritma HILL Cipher Dan Metode Least Significant BIT (LSB). Jurnal Mantik Penusa, 1(2), 1–8. Retrieved from http://e-jurnal.pelitanusantara.ac.id/index.php/mantik/article/view/253/156

Syawal, M. F., Fikriansyah, D. C., & Agani, N. (2016). Implementasi Teknik Steganografi Menggunakan Algoritma Vigenere Cipher Dan Metode LSB. Jurnal TICOM, 4(3), 91–99.

Wati, V., Sa’diyah, H., & Ariyus, D. (2019). Laporan Akhir Hibah Mandiri: Pendekatan Stego-Kripto Mode Cipher Block Chaining untuk Pengamanan Informasi pada Citra Digital. Yogyakarta.

Zebua, T. (2015). Pengamanan Data Teks Dengan Kombinasi Cipher Block Chaining dan LSB-1. Seminar Nasional Inovasi Dan Teknologi (SNITI), 2015(September), 85–89. Retrieved from sniti.info

Published
2020-02-01
How to Cite
[1]
V. Wati, H. Sa’diyah, and D. Ariyus, “PENDEKATAN STEGO-KRIPTO MODE CIPHER BLOCK CHAINING UNTUK PENGAMANAN INFORMASI PADA CITRA DIGITAL”, jitk, vol. 5, no. 2, pp. 197-204, Feb. 2020.
Article Metrics

Abstract viewed = 610 times
PDF downloaded = 477 times