An Improved Security and Message Capacity using AES and Huffman Coding on Image Steganography
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as a steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40db which is 46.1878
W. Stallings, Cryptography and Network Security Principles and Practices, Fourth Edition, Upper Saddle River, United States: Pearson Education (US), 2005.
S. Nain dan S. Kumar, “Steganography And Its Various Techniques,” International Journal of Enhanced Research in Science Technology & Engineering, vol. 3, no. 6, pp. 241-245, 2014.
D. R. I. M. Setiadi dan J. Jumanto, “An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection,” Cybernetics and Information Technologies, vol. 18, no. 2, pp. 74-88, 2018.
A. Siper, R. Farley dan C. Lombardo, “The Rise of Steganography,” dalam Proceedings of Student/Faculty Research Day, CSIS, Pace University, New York, 2005.
S. Chandran dan K. Bhattacharyya, “Performance Analysis of LSB, DCT, and DWT for Digital Watermarking Application using Steganography,” dalam International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), Visakhapatnam, 2015.
S. Bhattacharyya dan G. Sanyal, “A Robust Image Steganography using DWT Difference Modulation (DWTDM),” International Journal Computer Network and Information Security, vol. 7, pp. 27-40, 2012.
W. S. Sari, E. H. Rachmawanto, D. R. I. M. Setiadi dan C. A. Sari, “A Good Performance OTP Encryption Image based on DCT – DWT Steganography,” TELKOMNIKA, vol. 15, no. 4, pp. 1987-1995, 2017.
D. Baby, J. Thomas, G. Augustine, E. George dan N. R. Michael, “A Novel DWT based Image Securing Method using Steganography,” dalam Elsevier, Kerala, 2014.
G. Budiman, L. Novamizanti dan I. Iwut, “Genetics Algorithm Optimization of DWT - DCT Based Image Watermarking,” dalam International Conference on Science and Applied Science, Solo, 2017.
A. Cheddad, “Steganoflage: A New Image Steganography Algorithm,” infm.ulst.ac.uk, 2009.
T. M dan K. A. Navas, “Image Steganography Using Discrete Wavelet Transform – A Review,” International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, vol. 3, no. 1, pp. 207-212, 2016.
R. Patel, V. Kumar, V. Tyagi dan V. Asthana, “A Fast and Improved Image Compression Technique Using Huffman Coding,” dalam WiSPNET, Chennai, 2016.
S. J. Sarkar, N. K. Sarkar dan A. Banerjee, “A Novel Huffman Coding based Approach to Reduce the Size of Large Data Array,” dalam International Conference on Circuit, Power and Computing Technologies [ICCPCT], Kumaracoil, 2016.
M. S. Atoum, S. Ibrahim, G. Sulong dan M. Zamani, “A New Method for Audio Steganography Using Message Integrity,” Journal of Convergence Information Technology, vol. 8, no. 14, pp. 35-44, 2013.
S. Chandra, S. Paira, S. S. Alam dan G. Sanyal, “A Comparative Survey Of Symmetric And Asymmetric Key,” dalam International Conference on Electronics, Communication and Computational Engineering (ICECCE), Tamilnadu, 2014.
S. K. Rao, D. Mahto dan D. A. Khan, “A Survey On Advanced Encryption Standard,” International Journal of Science and Research (IJSR), vol. 6, no. 1, pp. 711-724, 2015.
G. Ardiansyah, C. A. Sari, D. R. I. M. Setiadi dan E. H. Rachmawanto, “Hybrid Method using 3-DES, DWT and LSB for Secure Image Steganography Algorithm,” dalam 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Jogja, 2017.
U. Sudibyo, F. Eranisa, E. H. Rachmawanto, D. R. I. M. Setiadi dan C. A. Sari, “A secure image watermarking using Chinese remainder theorem based on haar wavelet transform,” dalam International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang, 2017.
A. Yasin, N. Shehab, M. Sabha dan M. Yasin, “An Enhanced Steganographic Model Based on DWT Combined with Encryption and Error Correction Techniques,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 12, pp. 49-55, 2015.
K. R. Saraf, V. P. Jagtap dan A. K. Mishra, “Text and Image Encryption Decryption Using Advanced Encryption Standard,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), vol. 3, no. 3, pp. 118-126, 2014.
G. C. Prasetyadi, R. Refianti dan A. B. Mutiara, “File Encryption and Hiding Application Based on AES and Append Insertion Steganography,” TELKOMNIKA, vol. 16, no. 1, pp. 361-367, 2018.
N. Dhawale, “Implementation Of Huffman Algorithm And Study For Optimization,” dalam International Conference on Advances in Communication and Computing Technologies, Delhi, 2014.
M. R. D. Farahani dan A. Pourmohammad, “A DWT Based Perfect Secure and High Capacity Image Steganography Method,” International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 314-317, 2013.
Article MetricsAbstract view : 50 times
- There are currently no refbacks.
Copyright (c) 2018 Universitas Ahmad Dahlan
TELKOMNIKA Telecommunication, Computing, Electronics and Control
ISSN: 1693-6930, e-ISSN: 2302-9293
Universitas Ahmad Dahlan, 4th Campus, 9th Floor, LPPI Room
Jl. Ringroad Selatan, Kragilan, Tamanan, Banguntapan, Bantul, Yogyakarta, Indonesia 55191
Phone: +62 (274) 563515, 511830, 379418, 371120 ext. 4902, Fax: +62 274 564604
View TELKOMNIKA Stats
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.