Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : JOURNAL OF APPLIED INFORMATICS AND COMPUTING

Penyembunyian Pesan Terenkripsi pada Citra menggunakan Algoritma LSB dan Transposisi Kolom Kiswara Agung Santoso; Ahmad Tanto Wiraga; Abduh Riski
Journal of Applied Informatics and Computing Vol 6 No 1 (2022): July 2022
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v6i1.3819

Abstract

Data security is a very important thing to do so that messages or information are sent to someone who is not known by unauthorized persons. Data security techniques that The ones that are often used today are cryptography and steganography. In this study, the data is to be secured in text. To increase security, text messages are first encrypted using the vigenere algorithm and column transposition. This text message is then hidden into an image (cover image). The encrypted text message was hidden in the image using the LSB algorithm and column transposition. The results of the study show that the virtual stego image generated is very effective similar to the original image. Based on the results of the MSE and PSNR analysis, it can be seen that the resulting image quality can be categorized as good. This can be seen from the PSNR value above 50 dB and some even above 60 dB. Based on the results of the LSB analysis, the stego image does not look strange so it will not be suspected by unauthorized people that there is a hidden message in the image.
Text Insertion and Encryption Using The Bit-Swapping Method in Digital Images Santoso, Kiswara Agung; Fakih, Muhammad Fahmil; Kamsyakawuni, Ahmad
Journal of Applied Informatics and Computing Vol. 8 No. 1 (2024): July 2024
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v8i1.7395

Abstract

Communication is an essential aspect of everyday life, involving the transmission of information through various media. Technological advances have made communication easier but have also increased privacy and data security risks. Several efforts are made to maintain the security of digital information, including coding information (cryptography) and hiding information (steganography). In this article, the author secures information through a combination of cryptography and steganography. To secure text data, we encrypt by exchanging bits between adjacent characters. Subsequently, the encrypted text is hidden within an image. The security analysis results show the successful reconstruction of the message from the stego image and the successful restoration of the message to its original form. The use of the bit swapping method in the text message encryption process has been proven to enhance the security level of the ciphertext, as indicated by the lower TPK calculation value of 0.33 compared to the TPK value in previous studies. Additionally, embedding the ciphertext into digital images has been demonstrated to further increase the security level of the message, evidenced by the NPCR calculation value of 0.0000109% and the UACI calculation value of 0.000000555%. These very small values indicate no significant changes.