Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XOR
Abstract
One way to secure secret messages from other unauthorized parties is steganography. One of the most widely used methods in steganography is Least Significant Bit. This research uses images as cover images and secret images. The image is resized to a resolution of 512x512 pixels, The cover image uses an RGB channel image and the secret image also uses an RGB channel image. In this research, LSB will be combined with triple XOR so that it can increase the security of this message hiding method. Triple XOR is used to provide extra security to images that have a secret image (Stego Image) inserted. In this research, several tests were also carried out, including testing the Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE), for robustness testing it was also carried out by making modifications to the stego image such as resizing, compressing, and adding and reducing contrast. The results of this research's PSNR testing are very good, namely approximately 49 dB and lower MSE. With the PSNR and MSE results, it can be proven that the LSB method has a good level of imperceptibility. In experiments on image resistance to modification, several experimental results show that secret image extraction in the stego image failed to be extracted, and from several experiments such as adding and reducing contrast, image rotation and lossless compression, the image inserted in the stego image was successfully extracted.
Downloads
References
A. Yang, Y. Bai, T. Xue, Y. Li, and J. Li, “A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security,” Future Generation Computer Systems, vol. 145, pp. 293–302, 2023, doi: https://doi.org/10.1016/j.future.2023.03.035.
T. Indriyani, S. Nurmuslimah, A. Taufiqurrahman, R. K. Hapsari, C. N. Prabiantissa, and A. Rachmad, “Steganography on Color Images Using Least Significant Bit (LSB) Method,” 2023, pp. 39–48. doi: 10.2991/978-94-6463-174-6_5.
M. Hassaballah, Digital Media Steganography: Principles, Algorithms, Advances. 2020. doi: 10.1016/C2018-0-04865-3.
D. Ratnasari and A. S. Aji, “Text to Color Image Steganography Using LSB Technique and XOR Operations,” vol. 3, no. 2, pp. 59–63, 2019, [Online]. Available: http://pubs.ascee.org/index.php/ijabis|E:info@ascee.org
R. Rizal, A. Rahmatulloh, N. Widiyasono, R. R, and D. R. Nursamsi, “Steganography: Combination of Least Significant Bit (LSB) and Bit-Plane Complexity Segmentation (BPCS) Methods for Hiding Massage on Image and Audio,” Int J Comput Appl, vol. 185, no. 21, pp. 1–7, Jul. 2023, doi: 10.5120/ijca2023922929.
D. Megías, W. Mazurczyk, and M. Kuribayashi, “Data hiding and its applications: Digital watermarking and steganography,” Applied Sciences (Switzerland), vol. 11, no. 22, Nov. 2021, doi: 10.3390/app112210928.
A. Setyono and D. R. Ignatius Moses Setiadi, “Securing and hiding secret message in image using xor transposition encryption and lsb method,” in Journal of Physics: Conference Series, Institute of Physics Publishing, Apr. 2019. doi: 10.1088/1742-6596/1196/1/012039.
R. M. Neamah, J. A. Abed, and E. A. Abbood, “Hide text depending on the three channels of pixels in color images using the modified LSB algorithm,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 809–815, 2020, doi: 10.11591/ijece.v10i1.pp809-815.
A. Ahmed and A. Ahmed, “A Secure Image Steganography using LSB and Double XOR Operations,” 2020. [Online]. Available: https://www.researchgate.net/publication/342663405
S. Utama and R. Din, “Performance Review of Feature-Based Method in Implementation Text Steganography Approach,” Journal of Advanced Research in Applied Sciences and Engineering Technology, vol. 28, no. 2, pp. 325–333, Oct. 2022, doi: 10.37934/araset.28.2.325333.
S. K. Salim, M. M. Msallam, and H. I. Olewi, “Hide text in an image using Blowfish algorithm and development of least significant bit technique,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 29, no. 1, pp. 339–347, Jan. 2023, doi: 10.11591/ijeecs.v29.i1.pp339-347.
V. Sabeti and M. Amerehei, “Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm,” vol. 14, no. 2, pp. 167–179, 2022, doi: 10.22042/ISECURE.2022.
N. Hidayasari and F. Yanto, “Analysis of Least Significant Bit Method Using Sequential Encoding-Decoding in Steganography Digital Image,” vol. 3, pp. 201–205, 2020.
G. Swain, Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities. 2019. doi: 10.4018/978-1-5225-7516-0.
L. B. Handoko and C. Umam, “Data Security Using Color Image Based on Beaufort Cipher, Column Transposition and Least Significant Bit (LSB)id 2 *Corresponding author,” 2023.
E. Z. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, and M. K. Sarker, “LSB-based Bit Flipping Methods for Color Image Steganography,” in Journal of Physics: Conference Series, Institute of Physics Publishing, May 2020. doi: 10.1088/1742-6596/1501/1/012019.
T. Bhuiyan, A. H. Sarower, M. Rashed Karim, and M. Maruf Hassan, “An image steganography algorithm using LSB replacement through XOR substitution,” in 2019 International Conference on Information and Communications Technology, ICOIACT 2019, Institute of Electrical and Electronics Engineers Inc., Jul. 2019, pp. 44–49. doi: 10.1109/ICOIACT46704.2019.8938486.
R. Imanda, H. Nasution, A. Fauzi, and H. Khair, “Journal of Artificial Intelligence and Engineering Applications Hybrid Cryptosystem Algorithm Vigenere Cipher and Base64 for Text Message Security Utilizing Least Significant Bit (LSB) Steganography as Insert into Image,” 2023. [Online]. Available: https://ioinformatic.org/
A. A. Almayyahi, R. Sulaiman, F. Qamar, A. E. Hamzah, K. Malaysia, and U. Bangi, “High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm,” 2020. [Online]. Available: www.ijacsa.thesai.org
A. I. H. Al-Jarah and J. L. O. Arjona, “Secret Key Steganography: improve security level of LSB algorithm,” in 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2021, pp. 215–220. doi: 10.1109/UEMCON53757.2021.9666569.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XOR
Pages: 115−124
Copyright (c) 2024 Martin Adha, Febi Yanto, Lestari Handayani, Pizaini Pizaini
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).