Assyahid, Muhammad Hudzaifah
Unknown Affiliation

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

Nearest Neighbor Interpolation and AES Encryption for Enhanced Least Significant Bit (LSB) Steganography Anggraini, Nenny; Wardhani, Luh Kesuma; Assyahid, Muhammad Hudzaifah; Hakiem, Nashrul; Yusuf, Muhammad; Setyawan, Okky Bagus
Building of Informatics, Technology and Science (BITS) Vol 6 No 4 (2025): March 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v6i4.7079

Abstract

The increasing use of digital communication raises concerns about data security, especially when transmitting sensitive information. Steganography conceals messages within digital media to prevent detection. However, conventional methods face storage limitations, leading to message truncation or distortion, making hidden messages more detectable. This study proposes a combination of Nearest Neighbor Interpolation (NNI) and Least Significant Bit (LSB) steganography to dynamically expand the cover image, allowing larger encrypted messages to be embedded while maintaining image integrity. NNI was chosen over other interpolation techniques such as Bilinear and Bicubic due to its lower computational complexity and preservation of sharp edges, which minimizes blurring artifacts that could make steganographic alterations more noticeable. AES-128 encryption ensures message confidentiality before embedding. The system was developed as a web-based application to improve usability. The research followed the Waterfall Software Development Life Cycle (SDLC), and Black Box Testing validated system functionality. Testing results showed that the method successfully embedded and extracted messages without data loss, maintaining PSNR values above 40 dB, ensuring minimal perceptual distortion. However, the maximum interpolation limit was 5310 × 5310 pixels, beyond which system constraints caused failures. The stego-images retained original aspect ratios, reducing suspicion. Despite its success, the system remains vulnerable to modifications such as color changes, cropping, rotation, and compression, which can disrupt the message.