IMPLEMENTATION OF MESSAGE EMBEDDING INTO VIDEO USING RSA AND LSB2BIT ALGORITHMS
(1) Computer Science Department, Faculty of Science and Technology, State Islamic University of North Sumatera, Indonesia.
(2) Computer Science Department, Faculty of Science and Technology, State Islamic University of North Sumatera, Indonesia.
(3) Computer Science Department, Faculty of Science and Technology, State Islamic University of North Sumatera, Indonesia.
(*) Corresponding Author
Abstract
Protecting information during transmission is crucial to prevent unauthorized access. Steganography and cryptography are two commonly used methods for securing messages from illegal interception. Steganography involves two main components: a container and a secret message to conceal. This research focuses on embedding a message into an encrypted video. The embedding process utilizes the Least Significant Bit (LSB) algorithm, while encryption and decryption are performed using the RSA algorithm. In the LSB technique, the last two bits of the red component in each pixel are replaced with two bits from the encrypted message. Once replaced, the red value in each pixel is updated accordingly. Video steganography enhances message security by minimizing the likelihood of detecting hidden messages within the video. By combining the LSB method with RSA encryption, the confidentiality of the information is further strengthened.
Keywords
Full Text:
PDFReferences
Hasugian, A.H., Yusuf Ramadhan Nasution, & Simanjuntak, N. A. (2023). Kombinasi Algoritma Beaufort Cipher Dan Lsb2Bit Untuk Keamanan File Teks. Jurnal Informatika Dan Rekayasa Elektronik, 6(1), 28–36.
Abid, R., Iwendi, C., Javed, A. R., Rizwan, M., Jalil, Z., Anajemba, J. H., & Biamba, C. (2023). An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Personal and Ubiquitous Computing, 27(3), 1405–1418.
Abu-Faraj, M., Al-Hyari, A., Aldebei, K., Alqadi, Z. A., & Al-Ahmad, B. (2022). Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography. IEEE Access, 10(July), 69388–69397.
Anwar, C., & Sriani. (2024). Implementasi Algoritma OTP dan HMAC untuk Two- Factor Authentication Sistem Login Relawan Pemilu. Jurnal TEKNIKA, 19(1), 83–94.
Ghimire, S., & Lee, B. (2020). A data integrity verification method for surveillance video system. Multimedia Tools and Applications, 79(41–42), 30163–30185.
Hermansa, Rusydi Umar, & Anton Yudhana. (2020). Implementation of Playfair Cipher and Least Significant Bit Algorithms in Digital Imagery. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(3), 454–461.
Hossain, M. I. (2023). Software Development Life Cycle (SDLC) Methodologies for Information Systems Project Management. International Journal For Multidisciplinary Research, 5(5).
Imam, R., Areeb, Q. M., Alturki, A., & Anwer, F. (2021). Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status. IEEE Access, 9, 155949–155976.
Mubarak, T. Z., & Firdaus, R. (2024). The Role Of Accounting Information Systems In The Application Of Encryption Towards Improving Company. November, 5910–5917.
Paramita, C., & Sudibyo, U. (2021). Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 5(3), 483–488.
Yallamelli, R. A. G. (2021). Improving Cloud Computing Data Security with the RSA Algorithm. IJITCE (International Journal of Information Tehcnology & Computer Engineering), 9(2), 163–174.
Simargolang, M. Y. (2020). Implementasi Kriptografi Rsa Dengan Php. Jurnal Teknologi Informasi, 1(1), 1.
Taha, M. S., Mohd Rahim, M. S., Lafta, S. A., Hashim, M. M., & Alzuabidi, H. M. (2019). Combination of Steganography and Cryptography: A short Survey. IOP Conference Series: Materials Science and Engineering, 518(5).
Wati, V., Sa’diyah, H., & Ariyus, D. (2020). Pendekatan Stego-Kripto Mode Cipher Block Chaining Untuk Pengamanan Informasi Pada Citra Digital. JITK (Jurnal Ilmu Pengetahuan Dan Teknologi Komputer), 5(2), 197–204.
Yusfrizal. (2020). Rancang Bangun Aplikasi Kriptografi Pada Teks Menggunakan Metode Reverse Chiper Dan Rsa Berbasis Android. JTIK (Jurnal Teknik Informatika Kaputama), 3(2), 29–37.
DOI: http://dx.doi.org/10.31602/jst.v10i3.17213
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Ibnu Faiz Abdillah, Abdul Halim Hasugian, Armansyah
E-ISSN 2477- 4731
Al Ulum: Jurnal Sains dan teknologi = Al Ulum: Jurnal Science and Technology by Islamic University of Kalimantan is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at http://ojs.uniska-bjm.ac.id/index.php/JST.