Concept of Data Security in Digital Image Media Using Spread Spectrum Steganography and Playfair Cipher Cryptography

Natalinda Pamungkas, Bonifacius Vicky Indriyono, Ichwan Setiarso

Abstract


In the world of informatics, there are many techniques that can be used to maintain the confidentiality of digital information from parties who are not responsible and have access rights to that information. One of the most common techniques today is steganography and cryptography. Steganography is a method used to secure information by hiding it in an object without having to change the shape of the object, while cryptography is a science that studies the technique of encoding original text (plaintext) by utilizing encryption keys so that the script turns into text that is hard to read (ciphertext). ) by a user who does not have the decryption key. This research will explain how to secure information in digital images using spread spectrum steganography techniques and playfair cipher cryptography. The test results show that the information inserted in the digital image media is difficult to return to its original form and the media inserted does not change in size

Keywords


Steganography; Cryptography; Spread Spectrum; Playfair Chiper

Full Text:

PDF

References


G. Prabakaran, R. Bhavani and S. Sankaran, “Dual Wavelet Transform Used in Color Image Steganography Method,” International Conference on Intelligent Computing Applications, pp. 193–197,ISBN. 978-1-4799-3966-4 March, 2014.

A. Malik, G. Sikka, H.K. Verma, “A high capacity text steganography scheme based on LZW compression and color coding”, Eng. Sci. Technol. Int. J. 20 (1) (2017) 72–79.

B. Purnama and H. Rohayani, “A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted”, International Conference on Computer Science and Computational Intelligence (ICCSCI), pp. 195-204, 2015.

M. Nutzinger, C. Fabian and M. Marschalek, “Secure Hybrid Spread Spectrum System for Steganography in Auditive Media”, Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 78-81, ISBN. 978-0-7695-4222-5, 2010.

Sumarsono, M. Anshari and A. Mujahidah., “Expending Technique Cryptography for Plaintext Messages by Modifying Playfair Cipher Algorithm with Matrix 5 x 19”, International Conference on Electrical Engineering and Computer Science (ICECOS), pp. 10-13, October 2019.

A. Singh, “Performance Analysis of Spread Spectrum Techniques”, Conference on Advances in Communication and Control Systems (CAC2S), pp. 683-687, 2013.

Z. Huang, B. Feng, and S. Xiang, “Robust reversible image watermarking scheme based on spread spectrum,” J. Vis. Commun. Image Represent., vol. 93, p. 103808, 2023, doi: https://doi.org/10.1016/j.jvcir.2023.103808.

M. A. Murillo, et al, “Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health,” Biomed. Signal Process. Control, vol. 78, p. 104001, 2022, doi: https://doi.org/10.1016/j.bspc.2022.104001.

L. M. Marvel, C. G. Boncelet, R. Jr., and Charles T., “Methodology of Spread-Spectrum Image Steganography,” Jun. 1998.

L. M. Marvel, C. G. Boncelet and C. T. Retter, "Spread spectrum image steganography," in IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, Aug. 1999.

F. S. Brundick and L. M. Marvel, “Implementation of Spread Spectrum Image Steganography,” Mar. 2001.

M. Packirisamy, and G. Senthilkumar. "Modified version of playfair cipher using linear feedback shift register." In 2009 International Conference on Information Management and Engineering, pp. 488- 490. IEEE, 2009.

R. Munir, ” Cryptography ”. Bandung: Informatics, 2008

E. Nurkifli, Haodudin, ” Modification of the Playfair Algorithm and Combining with the Linear Feedback Shift Register (LFSR)”, Karawang : Singaperbangsa University Karawang, 2014.

Santi, R.C.N., Implementation of the Playfair Encryption Algorithm in Text Files, Journal of Information Technology DYNAMIK, Vol. XV, No. 1, 2010




DOI: http://dx.doi.org/10.36448/jsit.v15i1.3517

Refbacks

  • There are currently no refbacks.


About the JournalJournal PoliciesAuthor Information

Explore: Jurnal Sistem Informasi dan Telematika (Telekomunikasi, Multimedia dan Informatika)
e-ISSN: 2686-181X
Website: http://jurnal.ubl.ac.id/index.php/explore
Email: explore@ubl.ac.id
Published by: Pusat Studi Teknologi Informasi, Fakultas Ilmu Komputer, Universitas Bandar Lampung
Office: Jalan Zainal Abidin Pagar Alam No 89, Gedong Meneng, Bandar Lampung, Indonesia

This work is licensed under a Creative Commons Attribution 4.0 International License
Technical Support by:  RYE Education Hub