Message Encryption in Digital Images using the Zhang LSB Imange Method

Asep Saepulrohman, Agus Ismangil, Leny Heliawati

Abstract


Message encryption in digital images using the Zhang LSB Image method is a steganography technique that utilizes the Least Significant Bit (LSB) method to hide secret messages in the last bit of the image pixel. This method allows the use of images as a medium to convey hidden messages. The encryption process involves two main stages, namely message encryption and message hiding in an image. Message encryption is carried out using strong cryptographic algorithms to secure the authenticity and confidentiality of messages. Then, the encrypted message is inserted into the last bit of the image pixel using the LSB method. This is done by modifying the last bit value of the pixel so that the change is not visually visible to the human eye. To recover the original message, the message recovery process involves extracting the last bit of the modified image pixel and decrypting the message using the appropriate key. The Zhang LSB Image method is a steganography technique that is relatively simple but effective in hiding messages in digital images.


Keywords


Zhang; LSB; encryption; Cryptography; steganography

References


A. Saepulrohman and P. Negara, “IMPLEMENTASI ALGORITMA TANDA TANGAN DIGITAL BERBASIS KRIPTOGRAFI KURVA ELIPTIK DIFFIE-HELLMAN,” vol. 18, no. 1, pp. 22–28, 2021, [Online]. Available: https://asecuritysite.com/encryption/js08.

A. Saepulrohman and U. Pakuan, “Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA) Agus Ismangil,” International Journal of Electronics and Communications System, vol. 1, no. 1, pp. 11–15, 2021, [Online]. Available: http://ejournal.radenintan.ac.id/index.php/IJECS/index://creativecommons.org/licenses/by-sa/4.0/

A. Saepulrohman, A. Denih, and A. Talib Bon, “Elliptic Curve Diffie-Hellman Cryptosystem for Public Exchange Process Sukono.” [Online]. Available: https://asecuritysite.com/encryption/js08.

A. Saepulrohman and T. P. Negara, “Implementation of Elliptic Curve Diffie-Hellman (ECDH) for Encoding Messeges Becomes a Point on the GF(í µí2‘í µí2‘) 1*,” International Journal of Advanced Science and Technology, vol. 29, no. 6, pp. 3264–3273, 2020, [Online]. Available: http://www.asciitable.com.

D. K. Sarmah and A. J. Kulkarni, “Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography,” Journal of Information Security and Applications, vol. 45, pp. 90–106, Apr. 2019, doi: 10.1016/j.jisa.2019.01.002.

X. Wu and C. N. Yang, “Invertible secret image sharing with steganography and authentication for AMBTC compressed images,” Signal Process Image Commun, vol. 78, pp. 437–447, Oct. 2019, doi: 10.1016/j.image.2019.08.007.

D. Adhar, A. Syahputra, R. A. Sugianto, R. Oktari Batubara, A. Sanjaya, and A. Sabir, “Steganografi Pengamanan Data Teks…211 Fakultas Teknik dan Ilmu Komputer 12345 , Fakultas Psikologi 6 Universitas Potensi Utama 124 Universitas Muhammadiyah Sumtera Utara 3 Universitas Nusa Mandiri 5.”

“YOLANDA OKTAVIANI (13150076”.

B. Tsaban, “Fast generators for the Diffie-Hellman key agreement protocol and malicious standards,” Inf Process Lett, vol. 99, no. 4, pp. 145–148, Aug. 2006, doi: 10.1016/j.ipl.2005.11.025.

O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. Al-Din Abed, and A. T. Hammid, “Implementation of El-Gamal algorithm for speech signals encryption and decryption,” in Procedia Computer Science, Elsevier B.V., 2020, pp. 1028–1037. doi: 10.1016/j.procs.2020.03.402.

D. Sartika, “PENGEMBANGAN PERANGKAT LUNAK PENYEMBUNYIAN PESAN TERENKRIPSI MENGGUNAKAN ALGORITMA MARS PADA CITRA DIGITAL DENGAN METODE ADAPTIF,” vol. 7, no. 1, 2016.

Y. Yanti and A. Saepulrohman, “Segmentation and Positioning of Lecturers in the Department of Computer Science at Pakuan University Based on Student Assessment,” Indonesian Journal of Statistics and Its Applications, vol. 5, no. 1, pp. 92–104, Mar. 2021, doi: 10.29244/ijsa.v5i1p92-104.

A. Saepulrohman and U. Pakuan, “Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA) Agus Ismangil,” International Journal of Electronics and Communications System, vol. 1, no. 1, pp. 11–15, 2021, [Online]. Available: http://ejournal.radenintan.ac.id/index.php/IJECS/index://creativecommons.org/licenses/by-sa/4.0/

A. Saepulrohman and P. Negara, “IMPLEMENTASI ALGORITMA TANDA TANGAN DIGITAL BERBASIS KRIPTOGRAFI KURVA ELIPTIK DIFFIE-HELLMAN,” vol. 18, no. 1, pp. 22–28, 2021, [Online]. Available: https://asecuritysite.com/encryption/js08.

A. Saepulrohman and U. Pakuan, “Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA) Agus Ismangil,” International Journal of Electronics and Communications System, vol. 1, no. 1, pp. 11–15, 2021, [Online]. Available: http://ejournal.radenintan.ac.id/index.php/IJECS/index://creativecommons.org/licenses/by-sa/4.0/

B. Widjanarko Otok, “Pendekatan Multivariate Adaptive Regression Spline (MARS) pada Pengelompokkan Zona Musim Suatu Wilayah,” 2010.


Full Text: PDF

DOI: 10.33751/komputasi.v21i1.9314 Abstract views : 48 views : 30

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.