Message Security Using Rivest-Shamir-Adleman Cryptography and Least Significant Bit Steganography with Video Platform

  • Institut Teknologi Adhi Tama Surabaya
  • Institut Teknologi Adhi Tama Surabaya
  • Institut Teknologi Adhi Tama Surabaya
Abstract views: 430 , PDF downloads: 222
Copyright Transfer Agreement downloads: 0
Ethical Statement downloads: 0
Hasil Cek Plagiasi downloads: 0
Keywords: Cryptography, Steganography, Least Significant Bit (LSB), Rivest-Shamir-Adleman (RSA), Video.

Abstract

All over the world, information technology has developed into a critical communication medium. One of them is digital messaging. We can connect and share information in real-time using digital messages. Without us knowing it, advances in message delivery are not only followed by kindness. Message security threats are also growing. Many unauthorized parties try to intercept critical information sent for the benefit of certain parties. As a countermeasure, various message security techniques exist to protect the messages we send. One of them is cryptography and steganography. Cryptography is useful for converting our messages into coded text so that unauthorized parties cannot read them. Meanwhile, steganography is useful for hiding our encrypted messages into several media, such as videos. This research will convert messages into ciphertext using the Rivest-Shamir-Adleman method and then insert them into video media using the Least Significant Bit method. There are four types of messages tested with different sizes. All messages will be encrypted and embedding using the Python programming language. Then the video will be tested using the MSE, PSNR, and Histogram methods. So we get a value that shows which message gets the best results. So that the message sent is more guaranteed authenticity and reduces the possibility of message leakage.

Downloads

Download data is not yet available.

References

[1]Rachmawati, Dian, Amalia, Amalia & Elviwani. "Combination of Rivest-Shamir-Adleman Algorithm and End of File Method for Data Security". Indonesia: IOP Access, 2018, pp. 1
[2]Agustini, S., Kurniawan, M., “Peningkatan Keamanan Teks Menggunakan Kriptografi Dan Steganografi”, SCAN, Vol. XIV, No.3, 2019.
[3]Munir, Rinaldi. (2006). Kriptografi. Bandung: Informatika.
[4]Putri, Geby G., Styorini, Wiwin & Rahayani, R. Dian. “Analisis Kriptografi Simetris AES dan Kriptografi Asimetris RSA pada Enkripsi”. Indonesia: Jurnal Informatika Mulawarman, 2018, pp. 198.
[5]Yatini, Indra & Nurwiyati, F. Wiwiek. “Algoritma Least Significant Bit Untuk Analisis Steganografi”. Indonesia: Seminar Nasional Informatika, 2015, pp. 695.
[6]Anti, Ulan A., Krisdalaksana, Awang H. & Khairina, Dyna M. “Steganografi Pada Video Menggunakan Metode Least Significant Bit (LSB) Dan End Of File (EOF)”. Indonesia: Jurnal Informatika Mulawarman, 2017, pp. 107-108.
[7]Insanudin, E. "Implementation of Python Source Code Comparison Results with Java using Bubble Sort Method". Indonesia: IOP Access, 2018, pp. 4.
[8]Yunus, Mahmuddin & Harjoko, Agus. “Penyembunyian Data pada File Video Menggunakan Metode LSB dan DCT”. Indonesia: Universitas Gadjah Mad., 2014, pp. 85-86.
[9]Male, Ghazali Moenandar, Wirawan & Setijadi, Eko. “Analisa Kualitas Citra Pada Steganografi Untuk Aplikasi e-Goverment”. Indonesia: Digilab Institut Teknologi Sepuluh November, 2012, pp. 4.
[10]Murinto, Putra, Willy Permana & Handayaningsih. "Analisis Perbandingan Histogram Equalization Dan Model Logarithmic Image Processing (LIP) Untuk Image Enhancement". Indonesia: Jurnal Informatika, 2008, pp. 204.
[11]Hasan, Nur Fitrianingsih, Dengen, Christin Nandari & Ariyus, Dony. Analisis Histogram Steganografi Least Significant Bit Pada Citra Grayscale. Indonesia: Digital Zone., 2020, pp. 26-27.