Combination and comparison of AES and RC4 cryptography in least significant bit (LSB) method in digital image to improve message security
Keywords:
Cryptography, Steganography, LSB, AES, RC4Abstract
Message security is something that must be kept secretly. However, to maintain the security and the secret of a message it takes two different methods. To maintain the security of messages, the science that has been widely used is to use cryptography. As for maintaining the secret of the message, the science used is steganography. For that, we need a security message that can maintain the security and the secret of the message simultaneously. Various algorithms have been widely applied in data security, but it is unknown which algorithm has a superior speed when applied in the LSB. The test is done by calculating the length of the encryption time process and the decryption time process of each algorithm with the same number of messages and key lengths. Measurement time is done as much as 10 times, then taken average value to get consistent time because system instability. Therefore, we will compare the speed of encryption and decryption process by applying AES and RC4 algorithm to LSB in Visual Studio 2008. In the process of encryption and decryption, the AES algorithm is superior in terms of speed compared to RC4 algorithm. The MSE and PSNR values generated from the encrypted images based on the AES and RC4 algorithm doesn’t show significant value. Overall the AES algorithm is better than RC4 algorithm when applied in LSB.References
Cheddad, A., Joan, C., Curran, K. & Paul, M.K. 2010, Digital image steganography: Survey and analysis of current methods Signal Processing 90
Basri. 2016, Kriptografi Simetris dan Asimetris dalam Perspektif Keamanan Data dan Kompleksitas Komputasi, Program Studi Teknik Informatika Universitas Al Asyariah Mandar, Jurnal Ilmiah Ilmu Komputer, Vol. 2, No. 2, September 2016
Elka LH., Khairil dan Fery HU. 2014, Aplikasi Enkripsi Dan Deskripsi Data Menggunakan Algoritma Rc4 Dengan Menggunakan Bahasa Pemrograman PHP, Program Studi Teknik Informatika Fakultas Ilmu Komputer Universitas Dehasen Bengkulu, Jurnal Media Infotama Vol. 10 No. 1, Februari 2014
Adetya, K.P. Pengamanan Data Dengan Metode Advanced Cryption Standard dan Metode Least Significant Bit, Mahasiswa Teknik Informatika, Fakultas Ilmu Komputer, Universitas Dian Nuswantoro Semaran
Utsav S. & Shiva S. 2016, Image Steganography Using AES Encryption and Least Significant Nible¸ International Conference on Communication and Signal Processing,, India
Nurhayati & Syukuri, S.H. 2014,Steganography for Inserting Message on Digital Image Using Least Significant Bit and AES Cryptographic Algorithm, Informatics Engineering Department, Science and Technology Faculty Syarif Hidayatullah State Islamic University (UIN) Jakarta,.
Gede, W.B, & Made, I.W.2015, Implementasi Algoritma Kriptografi AES 256 dan Metode Steganografi LSB pada Gambar Bitmap, Jurnal Ilmiah Ilmu Komputer, Universitas Udayana, Vol. 8, No. 2, September 2015
N.P, Indah, F.A. & Awang, H.K. 2015, Jurnal Implementasi Kriptografi Pengamanan Data Pada File Teks, Isi File Dokumen dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard. Jurnal Informatika Mulawarman Vol. 10 No.1
Downloads
Published
Issue
Section
License
Authors who publish with Jurnal Informatika (JIFO) agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.