A Combination of Hill Cipher and LSB for Image Security

Ajib Susanto(1), Ibnu Utomo Wahyu Mulyono(2), Muhamad Rizky Fajar Febrian(3), Ghaitsa Ardelia Rosyida(4),


(1) Universitas Dian Nuswantoro
(2) Universitas Dian Nuswantoro
(3) Universitas Dian Nuswantoro
(4) Universitas Dian Nuswantoro

Abstract

The maximum value obtained to test the encrypt hill cipher uses the avalanche effect with modification of one, two, three, and four key matrices 35.71%, therefore an additional security technique is needed. The Least Significant Bit (LSB) method is used to insert the ciphertext that has been generated from the hill cipher algorithm, has been testing using RGB, CMY, CMYK and YUV shapes with 6142 characters in 128 x 128 character images producing the highest PSNR value of 51.2826 dB in CMYK images. Steganography technique is applied because it has advantages in terms of imperceptibility, for example the results of a stego image are so similar to the original image that it is difficult to be distinguished by the human senses. Tests were carried out with 10 images, five images measuring 512 x 512 and five images measuring 16 x 16. While the messages to be inserted were 240, 480, and 960 characters for images measuring 512 x 512 and 24, 48 and 88 characters for images measuring 16 x16. Test results that I have done are calculated using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) with a minimum PSNR of 51.2907 dB which means the resulting image is quite good. Computation time is calculated using tic toc on Matlab by encrypting 2000 and 6000 characters, and also computation time.

Keywords

Hill Cipher, LSB, Avalanche Effect, PSNR, computation time

Full Text:

PDF

References

Amelia Devi Putri Ariyanto, Eko Hari Rachmawanto, D.R.I.M. Setiadi, and Christy Atika Sari, "Performance Analysis of LSB Image Steganography Combined with Blowfish-RC4 Encryption in Various File Extensions," in 2019 Fourth International Conference on Informatics and Computing (ICIC), Yogyakarta, 2020.

Abbas Cheddad, Joan Condell, Kevin Curran, and Paul Mc Kevitt, "Digital Image Steganography : Survey and Analysis of Current Methods," Signal Processing, vol. 90, pp. 727-752, 2010.

Christy Atika Sari, Eko Hari Rachmawanto, and Edi Jaya Kusuma, "Good Performance Images Encryption Using Selective Bit T-des On Inverted Lsb Steganography," Jurnal Ilmu Komputer dan Informasi, vol. 12, no. 1, pp. 41-49, 2019.

Adli Azhar Arrasyid, D.R.I.M. Setiadi, M. Arief Soeleman, Christy Atika Sari, and Eko Hari Rachmawanto, "Image Watermarking using Triple Transform (DCT-DWT-SVD) to Improve Copyright Protection Performance," in 2018 International Seminar on Research of Information Technology and Intelligent Systems, Yogyakarta, 2018.

Sujarani Rajendran and Manivannan Doraipandian, "Chaotic Map Based Random Image Steganography Using LSB Technique," International Journal of Network Security, vol. 19, no. 4, pp. 593-598, July 2017.

Soumendu Chakraborty, Anand Singh Jalal, and Charul Bhatnagar, "LSB based non blind predictive edge adaptive image steganography," Multimedia Tools and Applications volume, vol. 76, pp. 7973–7987, 2017.

Kas Raygaputra Ilaga, Christy Atika Sari, and Eko Hari Rachmawanto, "A High Result for Image Security Using Crypto-Stegano Based on ECB Mode and LSB Encryption," Journal of Applied Intelligent System, vol. 3, no. 1, pp. 28-38, 2018.

Anirban Bhowmic and M. Geetha, "Enhancing resistance of hill cipher using columnar and Myszkowski transposition," Computer Science, 2015.

Refbacks

  • There are currently no refbacks.




Scientific Journal of Informatics (SJI)
p-ISSN 2407-7658 | e-ISSN 2460-0040
Published By Department of Computer Science Universitas Negeri Semarang
Website: https://journal.unnes.ac.id/nju/index.php/sji
Email: [email protected]

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.