Implementation of Least Significant Bit Steganography to Secure Text Messages in Images

Main Article Content

Wiyan Herra Herviana
Djuniadi Djuniadi

Abstract

Steganography is a technique of securing secret messages in other messages that are not known. Simulation of the steganography method using the Least Significant Bit technique is used to change the last bit in one byte of data by using a text message as the container medium. This study aims to implement the security of text messages in images using the Least Significant Bit technique which is supported by the steganography method. Simulation techniques are used to conduct studies using Cryptool2 which can describe the concept of cryptography. The results obtained from this study regarding the security of text message insertion into an image in *.jpg and *.png format with 5 sampling trials are (1) the encrypted image cannot be distinguished directly through human eyes, (2) there is an increase in file size the image after being encrypted with an average for five trials is 0.31%, this increase depends on the length of the text message and a key to be inserted, the longer the insertion, the larger the resulting file size, (3) The higher the resolution of the image where the description encryption is inserted, the longer the process required, (4) The simulation time of steganographic decryption is faster than steganographic encryption. The decryption simulation process is the same as 50% of the encryption process.

Article Details

How to Cite
Herviana, W. H., & Djuniadi, D. (2024). Implementation of Least Significant Bit Steganography to Secure Text Messages in Images. Journal of Information System Exploration and Research, 2(2). https://doi.org/10.52465/joiser.v2i2.438
Section
Articles

References

R. Fernando and R. R. Simanjuntak, “Digital Language Use in Bangka as Contribution to Digital Culture and Heritage,” in E3S Web of Conferences, EDP Sciences, 2023, p. 4014.

T. A. Satrio, W. A. Prabowo, and T. Yuniati, “Hiding Document Format Files Using Video Steganography Techniques with Least Significant Bit Method,” in 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), IEEE, 2022, pp. 399–406.

C. Caesar, “Municipal land allocations: integrating planning and selection of developers while transferring public land for housing in Sweden,” Journal of housing and the built environment, vol. 31, pp. 257–275, 2016.

D. Darwis, A. Junaidi, and D. A. Shofiana, “A new digital image steganography based on center embedded pixel positioning,” Cybernetics and Information Technologies, vol. 21, no. 2, pp. 89–104, 2021.

B. Bakir and H. Hozairi, “Implementasi Metode Least Significant Bit (LSB) Dengan Enkripsi Cipher Caesar Pada Steganografi Menggunakan Image Processing,” JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia), vol. 3, no. 2, pp. 75–81, 2018.

D. A. A. Pertiwi and D. Djuniadi, “Simulations of text encryption and decryption by applying vertical bit rotation algorithm,” Journal of Soft Computing Exploration, vol. 2, no. 2, pp. 61–66, 2021.

N. Kopal, “Solving Classical Ciphers with CrypTool 2.,” in HistoCrypt, 2018, pp. 10–149.

S. Pramanik and R. P. Singh, “Role of steganography in security issues,” International Journal of Advance Research in Science and Engineering, vol. 6, no. 1, pp. 1119–1124, 2017.

J. K. Su, F. Hartung, and B. Girod, “Digital watermarking of text, image, and video documents,” Comput Graph, vol. 22, no. 6, pp. 687–695, 1998.

S. Bhattacharyya, “A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier,” Journal of global research in computer science, vol. 2, no. 4, 2011.

T. Lestari, N. Nurmaesa, and A. R. Mariana, “Aplikasi Steganografi Untuk Menyisipkan Pesan Dalam Media Image,” Jurnal Sisfotek Global, vol. 7, no. 2, 2017.

N. Rismawati and M. F. Mulya, “Analisis dan Perancangan Simulasi Enkripsi dan Dekripsi pada Algoritma Steganografi untuk Penyisipan Pesan Text pada Image menggunakan Metode Least Significant Bit (LSB) Berbasis Cryptool2,” Faktor Exacta, vol. 12, no. 2, pp. 132–144, 2019.

Y. Zhang et al., “A highly reliable encoding and decoding communication framework based on semantic information,” Digital Communications and Networks, vol. 10, no. 3, pp. 509–518, 2024.

D. Darwis and N. B. Pamungkas, “Comparison of Least Significant Bit, Pixel Value Differencing, and Modulus Function on Steganography to Measure Image Quality, Storage Capacity, and Robustness,” in Journal of Physics: Conference Series, IOP Publishing, 2021, p. 12039.

B. V. Indriyono, “Penerapan Keamanan Penyampaian Informasi Melalui Citra dengan Kriptografi Rijndael dan Steganografi LSB,” Creative Information Technology Journal, vol. 3, no. 3, pp. 228–241, 2016.

K. N. Jassim et al., “Hybrid cryptography and steganography method to embed encrypted text message within image,” in Journal of Physics: Conference Series, IOP Publishing, 2019, p. 12061.

G. Sugandhi and C. P. Subha, “Efficient steganography using least significant bit and encryption technique,” in 2016 10th International Conference on Intelligent Systems and Control (ISCO), IEEE, 2016, pp. 1–6.

Abstract viewed = 132 times