Steganography Based on Data Mapping and LSB Substitution With RSS Key Generation
Sari
ABSTRAK
Untuk menghindari pihak ketiga yang tidak berwenang, berbagai solusi keamanan telah dibuat untuk mengamankan kerahasiaan pesan atau informasi, salah satunya adalah steganografi. Penelitian ini mengusulkan teknik pembangkitan kunci dalam proses steganografi. Secara umum steganografi menggunakan konsep kunci simetris, dimana metode ini membutuhkan pihak ketiga dalam proses pendistribusian kunci rahasia. Solusi dari permasalahan tersebut penulis mengusulkan metode baru dengan menggabungkan pembangkitan kunci rahasia menggunakan RSS pada jaringan nirkabel dengan steganografi untuk menyembunyikan pesan. Sistem yang kami usulkan diterapkan pada kondisi statis dan kondisi dinamis untuk menguji kinerja. Pada proses pembangkitan kunci didapatkan waktu rata-rata 110,52 detik untuk membangkitkan kunci. Pada proses embedding, waktu komputasi rata-rata untuk 65.536 karakter adalah 6,38 detik untuk menghasilkan citra stego. Pada proses ekstraksi didapatkan waktu komputasi rata-rata 0,63 detik untuk mendapatkan pesan rahasia.
Kata kunci: RSS, Key Generation, Symmetric Cryptography, Steganography.
Â
ABSTRACT
To avoid unauthorised third parties, variety of security solutions have been created to secure the confidentiality of messages or information, one of which is steganography. This study proposes key generation technique in the steganography process. In general, steganography uses a symmetric key concept, where this method requires a third party in the secret key distribution process. The solution to this problem the authors propose a new method by combining secret key generation using RSS on a wireless network with steganography for hiding messages. To test performance, our proposed system is used in both static and dynamic condition. In the key generation process, an average time of 110.52 seconds was obtained to generate keys. In the embedding process, the average computation time for 65,536 characters is 6.38 seconds to produce a stego image. In the extraction process, an average computation time of 0.63 seconds is obtained to get a secret message.
Keywords: RSS, Key Generation, Symmetric Cryptography, Steganography.
Kata Kunci
Teks Lengkap:
PDF (English)Referensi
Bai, J., Chang, C. C., Nguyen, T. S., Zhu, C., & Liu, Y. (2017). A high payload steganographic algorithm based on edge detection. Displays, 46, 42–51. https://doi.org/10.1016/j.displa.2016.12.004
Brassard, G., & Salvail, L. (1994). Secret-key reconciliation by public discussion. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 765 LNCS, 410–423. https://doi.org/10.1007/3-540-48285-7_35
Dewi, I. T., Sudarsono, A., Kristalina, P., & Yuliana, M. (2020). Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication. EMITTER International Journal of Engineering Technology, 8(1), 140–160. https://doi.org/10.24003/emitter.v8i1.493
El-Dairi, M., & House, R. J. (2020). Optic Nerve Hypoplasia. In Handbook of Pediatric Retinal OCT and the Eye-Brain Connection, (pp. 285–287). Elsevier. https://doi.org/10.1016/B978-0-323-60984-5.00062-7
Hussain, M., Wahab, A. W. A., Javed, N., & Jung, K. H. (2018). Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 35(1), 53–63. https://doi.org/10.1080/02564602.2016.1244496
Khodaei, M., Sadeghi Bigham, B., & Faez, K. (2016). Adaptive Data Hiding, Using Pixel-Value-Differencing and LSB Substitution. Cybernetics and Systems, 47(8), 617–628. https://doi.org/10.1080/01969722.2016.1214459
Liu, Y. N., Zhong, Q., Xie, M., & Chen, Z. Bin. (2018). A novel multiple-level secret image sharing scheme. Multimedia Tools and Applications, 77(5), 6017–6031. https://doi.org/10.1007/s11042-017-4512-5
Sudarsono, A., Yuliana, M., & Kristalina, P. (2019). A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in the Wireless Networks. 2018 International Electronics Symposium on Engineering Technology and Applications, IESETA, (pp. 170–175). https://doi.org/10.1109/ELECSYM.2018.8615568
Sumadi, M. T., Yuliana, M., & Sudarsono, A. (2020). Performance Improvement Based on Modified Lossless Quantization (MLQ) for Secret Key Generation Extracted from Received Signal Strength. 2020 International Electronics Symposium (IES), (pp. 190–194). https://doi.org/10.1109/IES50839.2020.9231640
The Standard Test Image Frequent Use in Literature. (n.d.). http://www.imageprocessingplace.com/root_files_V3/image_databases.htm (access Apr. 17, 2021)
Tondwalkar, A., & Vinayakray-Jani, P. (2016). Secure Localisation of Wireless Devices with Application to Sensor Networks using Steganography. Procedia Computer Science, 78, 610–616. https://doi.org/10.1016/j.procs.2016.02.107
Wei, Y., Zeng, K., & Mohapatra, P. (2013). Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller. IEEE Transactions on Mobile Computing, 12(9), 1842–1852. https://doi.org/10.1109/TMC.2012.144
Xiang, T., Hu, J., & Sun, J. (2015). Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Processing, 43, 28–37. https://doi.org/10.1016/j.dsp.2015.05.006
Yassein, M. B., Aljawarneh, S., Qawasmeh, E., Mardini, W., & Khamayseh, Y. (2017). Comprehensive study of symmetric key and asymmetric key encryption algorithms. 2017 International Conference on Engineering and Technology (ICET), 2018-Janua, (pp. 1–7). https://doi.org/10.1109/ICEngTechnol.2017.8308215
Yuliana, M., Wirawan, & Suwadi. (2019a). An Efficient Key Generation for the Internet of Things Based Synchronized Quantization. Sensors, 19(12), 2674. https://doi.org/10.3390/s19122674
Yuliana, M., Wirawan, W., & Suwadi, S. (2019b). Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment. International Journal on Advanced Science, Engineering and Information Technology, 9(1), 100. https://doi.org/10.18517/ijaseit.9.1.7583
Zakaria, A., Hussain, M., Wahab, A., Idris, M., Abdullah, N., & Jung, K.-H. (2018). High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution. Applied Sciences, 8(11), 2199. https://doi.org/10.3390/app8112199
DOI: https://doi.org/10.26760/elkomika.v10i1.1
Refbacks
- Saat ini tidak ada refbacks.
_______________________________________________________________________________________________________________________
ISSN (print) : 2338-8323 | ISSN (electronic) : 2459-9638
Publisher:
Department of Electrical Engineering Institut Teknologi Nasional Bandung
Address: 20th Building Institut Teknologi Nasional Bandung PHH. Mustofa Street No. 23 Bandung 40124
Contact: +627272215 (ext. 206)
Email: jte.itenas@itenas.ac.id________________________________________________________________________________________________________________________
Jurnal ini terlisensi oleh Creative Commons Attribution-ShareAlike 4.0 International License.