Steganography Based on Data Mapping and LSB Substitution With RSS Key Generation

MUHAMMAD TAUFIQ SUMADI, AMANG SUDARSONO, MIKE YULIANA

Sari


ABSTRAK

Untuk menghindari pihak ketiga yang tidak berwenang, berbagai solusi keamanan telah dibuat untuk mengamankan kerahasiaan pesan atau informasi, salah satunya adalah steganografi. Penelitian ini mengusulkan teknik pembangkitan kunci dalam proses steganografi. Secara umum steganografi menggunakan konsep kunci simetris, dimana metode ini membutuhkan pihak ketiga dalam proses pendistribusian kunci rahasia. Solusi dari permasalahan tersebut penulis mengusulkan metode baru dengan menggabungkan pembangkitan kunci rahasia menggunakan RSS pada jaringan nirkabel dengan steganografi untuk menyembunyikan pesan. Sistem yang kami usulkan diterapkan pada kondisi statis dan kondisi dinamis untuk menguji kinerja. Pada proses pembangkitan kunci didapatkan waktu rata-rata 110,52 detik untuk membangkitkan kunci. Pada proses embedding, waktu komputasi rata-rata untuk 65.536 karakter adalah 6,38 detik untuk menghasilkan citra stego. Pada proses ekstraksi didapatkan waktu komputasi rata-rata 0,63 detik untuk mendapatkan pesan rahasia.

Kata kunci: RSS, Key Generation, Symmetric Cryptography, Steganography.

 

ABSTRACT

To avoid unauthorised third parties, variety of security solutions have been created to secure the confidentiality of messages or information, one of which is steganography. This study proposes key generation technique in the steganography process. In general, steganography uses a symmetric key concept, where this method requires a third party in the secret key distribution process. The solution to this problem the authors propose a new method by combining secret key generation using RSS on a wireless network with steganography for hiding messages. To test performance, our proposed system is used in both static and dynamic condition. In the key generation process, an average time of 110.52 seconds was obtained to generate keys. In the embedding process, the average computation time for 65,536 characters is 6.38 seconds to produce a stego image. In the extraction process, an average computation time of 0.63 seconds is obtained to get a secret message.

Keywords: RSS, Key Generation, Symmetric Cryptography, Steganography.


Kata Kunci


RSS; Key Generation; Symmetric Cryptography; Steganography

Teks Lengkap:

PDF (English)

Referensi


Bai, J., Chang, C. C., Nguyen, T. S., Zhu, C., & Liu, Y. (2017). A high payload steganographic algorithm based on edge detection. Displays, 46, 42–51. https://doi.org/10.1016/j.displa.2016.12.004

Brassard, G., & Salvail, L. (1994). Secret-key reconciliation by public discussion. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 765 LNCS, 410–423. https://doi.org/10.1007/3-540-48285-7_35

Dewi, I. T., Sudarsono, A., Kristalina, P., & Yuliana, M. (2020). Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication. EMITTER International Journal of Engineering Technology, 8(1), 140–160. https://doi.org/10.24003/emitter.v8i1.493

El-Dairi, M., & House, R. J. (2020). Optic Nerve Hypoplasia. In Handbook of Pediatric Retinal OCT and the Eye-Brain Connection, (pp. 285–287). Elsevier. https://doi.org/10.1016/B978-0-323-60984-5.00062-7

Hussain, M., Wahab, A. W. A., Javed, N., & Jung, K. H. (2018). Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 35(1), 53–63. https://doi.org/10.1080/02564602.2016.1244496

Khodaei, M., Sadeghi Bigham, B., & Faez, K. (2016). Adaptive Data Hiding, Using Pixel-Value-Differencing and LSB Substitution. Cybernetics and Systems, 47(8), 617–628. https://doi.org/10.1080/01969722.2016.1214459

Liu, Y. N., Zhong, Q., Xie, M., & Chen, Z. Bin. (2018). A novel multiple-level secret image sharing scheme. Multimedia Tools and Applications, 77(5), 6017–6031. https://doi.org/10.1007/s11042-017-4512-5

Sudarsono, A., Yuliana, M., & Kristalina, P. (2019). A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in the Wireless Networks. 2018 International Electronics Symposium on Engineering Technology and Applications, IESETA, (pp. 170–175). https://doi.org/10.1109/ELECSYM.2018.8615568

Sumadi, M. T., Yuliana, M., & Sudarsono, A. (2020). Performance Improvement Based on Modified Lossless Quantization (MLQ) for Secret Key Generation Extracted from Received Signal Strength. 2020 International Electronics Symposium (IES), (pp. 190–194). https://doi.org/10.1109/IES50839.2020.9231640

The Standard Test Image Frequent Use in Literature. (n.d.). http://www.imageprocessingplace.com/root_files_V3/image_databases.htm (access Apr. 17, 2021)

Tondwalkar, A., & Vinayakray-Jani, P. (2016). Secure Localisation of Wireless Devices with Application to Sensor Networks using Steganography. Procedia Computer Science, 78, 610–616. https://doi.org/10.1016/j.procs.2016.02.107

Wei, Y., Zeng, K., & Mohapatra, P. (2013). Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller. IEEE Transactions on Mobile Computing, 12(9), 1842–1852. https://doi.org/10.1109/TMC.2012.144

Xiang, T., Hu, J., & Sun, J. (2015). Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Processing, 43, 28–37. https://doi.org/10.1016/j.dsp.2015.05.006

Yassein, M. B., Aljawarneh, S., Qawasmeh, E., Mardini, W., & Khamayseh, Y. (2017). Comprehensive study of symmetric key and asymmetric key encryption algorithms. 2017 International Conference on Engineering and Technology (ICET), 2018-Janua, (pp. 1–7). https://doi.org/10.1109/ICEngTechnol.2017.8308215

Yuliana, M., Wirawan, & Suwadi. (2019a). An Efficient Key Generation for the Internet of Things Based Synchronized Quantization. Sensors, 19(12), 2674. https://doi.org/10.3390/s19122674

Yuliana, M., Wirawan, W., & Suwadi, S. (2019b). Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment. International Journal on Advanced Science, Engineering and Information Technology, 9(1), 100. https://doi.org/10.18517/ijaseit.9.1.7583

Zakaria, A., Hussain, M., Wahab, A., Idris, M., Abdullah, N., & Jung, K.-H. (2018). High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution. Applied Sciences, 8(11), 2199. https://doi.org/10.3390/app8112199




DOI: https://doi.org/10.26760/elkomika.v10i1.1

Refbacks

  • Saat ini tidak ada refbacks.


_______________________________________________________________________________________________________________________

ISSN (print) : 2338-8323 | ISSN (electronic) : 2459-9638

Publisher:

Department of Electrical Engineering Institut Teknologi Nasional Bandung

Address: 20th Building  Institut Teknologi Nasional Bandung PHH. Mustofa Street No. 23 Bandung 40124

Contact: +627272215 (ext. 206)

Email: jte.itenas@itenas.ac.id________________________________________________________________________________________________________________________


Free counters!

Web

Analytics Made Easy - StatCounter

Statistic Journal

Jurnal ini terlisensi oleh Creative Commons Attribution-ShareAlike 4.0 International License.

Creative Commons License