Pengamanan Citra Digital Terenkripsi Menggunakan Kombinasi Steganografi Bit Matching dan Kriptografi Cipher Feedback (CFB) dengan Pembangkit Bilangan Acak Linear Congruential Generator (LCG).
DOI:
https://doi.org/10.26623/transformatika.v21i2.6978Keywords:
Steganografi, Kriptografi, Pencocokan Bit, Cipher Feedback, Linear Congruential GeneratorAbstract
In this study, the design and manufacture of an encrypted digital image security system was carried out by combining bit matching steganography and cryptographic cipher feedback (CFB) using a linear congruential generator (LCG) as a key generator. The test material used 60 message images measuring 120x120 pixels with 1 cover image measuring 64x64 pixels. The results of the study were obtained: (1) the image can be hidden but there is an increase in the size of the embedding file with an average difference of 459.1167 KB (kilobytes) or an increase of 2135.65%, (2) The image can be reconstructed, the physical image of the extraction result is the same as the original image with an MSE value = 0, but there is a change in size that varies with an average difference of 3.433333 KB (kilobytes) or by 16.20%, (3) Some robust tests such as image rotation testing, brightness manipulation, addition of gaussian noise make the extracted image damaged. The image is resistant to all contrast tests. Salt and pepper noise testing does not damage the image too much, the image is still resistant to salt and pepper noise testing of 0.001 with an average MSE = 0References
R. Munir, Pengolahan Citra Digital dengan Pendekatan Algoritmik. Bandung: Informatika, 2004.
Sentot Kromodimoedjo, Teori Dan Aplikasi Kriptografi. SPK IT Consulting, 2009.
R. Munir, Kriptografi, 2 ed. Informatika Bandung, 2019.
A. Sonbay, “Penyandian Data Teks Menggunakan Algoritma Cipher Feedback Dan Chaotic Skew Tent Map.,” vol. 5, 2017.
K. Wibowo, “Pengujian Tingkat Keacakan dan Kecepatan Beberapa Algoritma Pembangkit Bilangan Acak Semu dengan Perbandingan Standar Deviasi dan Perbandingan Waktu Pembangkitan,” 2012.
R. Supardi, “Implementasi metode bit matching untuk keamanan pesan teks menggunakan visual basic. Net,” vol. 1, Desember 2017.
B. Prasetyo, “Kombinasi Steganografi Berbasis Bit Matching dan Kriptografi DES untuk Pengamanan Data,” vol. 1, 2014.
J. Fora, “Enkripsi Citra Digital Grayscale 8 Bit Dan Rgb 24 Bit Menggunakan Algoritma Output Feedback (OFB) Dengan Pembangkit Bilangan Acak Combined Linear Congruential Generator (ClGC).” 2015.
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, “Introduction to Algorithms, Third Edition”.
K. Challita, and H. Farhat, “Combining Steganography and Cryptography: New Directions,” 2011.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Transformatika is licensed under a Creative Commons Attribution 4.0 International License.