Hybrid Cryptosystem Using RC5 and SHA-3 with LSB Steganography for Image Protection

Adisti Dwi Susanti, Asep Id Hadiana, Fajri Rakhmat Umbara, Hidayatulah Himawan

Abstract

The rapid development of internet technology has been accompanied by a significant increase in information security threats. Ensuring the security of confidential information transmission is crucial. Cryptography and steganography are among the most efficient techniques for safeguarding data. Both fields focus on information concealment. This paper proposes a hybrid approach to protect confidential multimedia data, specifically image media, by using LSB steganography techniques in combination with the RC5 encryption algorithm and the SHA3 hashing algorithm to provide dual-layer protection for information. In the proposed method, image data is first encrypted using the RC5 encryption algorithm with a specified key. Subsequently, a hashing function using SHA3 is applied for dual protection, ensuring data authenticity and integrity. Finally, steganography is performed using the LSB technique to embed the hashed information into the image media. This study aims to enhance the security of information in digital image media, providing a reliable solution to address security challenges. The results indicate that data confidentiality was successfully achieved, with an average PSNR of 52.509 dB and an MSE of 0.3829. Tests were conducted using a dataset of images with various dimensions.

Full Text:

PDF (65-72)

References

B. S. Shishodia and M. J. Nene, “Data Leakage Prevention System for Internal Security,” in 2022 International Conference on Futuristic Technologies, INCOFT 2022, Institute of Electrical and Electronics Engineers Inc., 2022. doi: 10.1109/INCOFT55651.2022.10094509.

D. Teguh Yuwono et al., “DETEKSI SERANGAN VULNERABILITY PADA OPEN JURNAL SYSTEM MENGGUNAKAN METODE BLACK-BOX,” 2021. [Online]. Available: http://e-journal.stmiklombok.ac.id/index.php/jireISSN.2620-6900

H. Alatawi and C. Narmatha, “The Secret image hiding schemes using Steganography- Survey,” in 2020 International Conference on Computing and Information Technology, ICCIT 2020, Institute of Electrical and Electronics Engineers Inc., Sep. 2020. doi: 10.1109/ICCIT-144147971.2020.9213764.

O. Evsutin, A. Melman, and R. Meshcheryakov, “Digital steganography and watermarking for digital images: A review of current research directions,” IEEE Access, vol. 8, pp. 166589–166611, 2020, doi: 10.1109/ACCESS.2020.3022779.

S. A. Jebur, A. K. Nawar, L. E. Kadhim, and M. M. Jahefer, “Hiding Information in Digital Images Using LSB Steganography Technique,” International Journal of Interactive Mobile Technologies, vol. 17, no. 7, pp. 167–178, 2023, doi: 10.3991/ijim.v17i07.38737.

Y. Y. Wai and E. Myat, “Comparison of LSB, MSB and New Hybrid (NHB) of Steganography in Digital Image,” International Journal of Engineering Trends and Applications (IJETA), vol. 5, 2014, [Online]. Available: www.ijetajournal.org

P. L. N. Ramesh, M. Moorthi, Prathyusha Engineering College, and Institute of Electrical and Electronics Engineers, A Combined Approach of Steganography with LSB Encoding technique and DES Algorithm. 2017.

Rituraj Gaur, Dr. RekhaVig, and Ms. AmanpreetKaur, “An Effectual Hybrid Approach Using Data Encryption Standard (DES) and Secured Hash Algorithm (SHA) for Image Steganography,” 2018, [Online]. Available: http://www.ijritcc.org

R. Bhanot and R. Hans, “A review and comparative analysis of various encryption algorithms,” International Journal of Security and its Applications, vol. 9, no. 4, pp. 289–306, 2015, doi: 10.14257/ijsia.2015.9.4.27.

N. Advani, C. Rathod, and A. M. Gonsai, “Comparative Study of Various Cryptographic Algorithms Used for Text, Image, and Video,” in Advances in Intelligent Systems and Computing, Springer Verlag, 2019, pp. 393–399. doi: 10.1007/978-981-13-2285-3_46.

A. Jain and D. Bhatnagar, “A Comparative Study of Symmetric Key Encryption Algorithms,” IJCSN International Journal of Computer Science and Network, vol. 3, no. 5, 2014, [Online]. Available: www.IJCSN.org

H. K. Verma and R. K. Singh, “Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms.”

S. Atawneh, A. Almomani, and P. Sumari, “Steganography in Digital Images: Common Approaches and Tools.”

N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.

Tishk International University, Erbil Polytechnic University, Institute of Electrical and Electronics Engineers, and Institute of Electrical and Electronics Engineers. Iraq Section, Proposed Parallel Algorithms to Encryption Image Based on Hybrid Enhancement RC5 and RSA. 2019.

J. S, M. C, S. S, J. P, and S. S, “The Role of AES and RC5 Algorithm: A Cryptosystem Model to Secure Information in the Image based Steganography along with Watermarking,” Webology, vol. 18, no. 05, pp. 1158–1167, Oct. 2021, doi: 10.14704/web/v18si05/web18296.

Somchai Wen Dong and Wen Dang, Research on Base64 Encoding Algorithm and PHP Implementation. Institute of Electrical and Electronics Engineers, 2018.

Institute of Electrical and Electronics Engineers. Indonesia Section and Institute of Electrical and Electronics Engineers, Stegocrypt Sceheme Using LSB-AES Base64. 2019.

B. Schneier, Applied cryptography : protocols, algorithms, and source code in C. Wiley, 1996.

M. Begum and M. S. Uddin, “Digital image watermarking techniques: A review,” Feb. 01, 2020, MDPI AG. doi: 10.3390/info11020110.

P. V. Sanivarapu, K. N. V. P. S. Rajesh, K. M. Hosny, and M. M. Fouda, “Digital Watermarking System for Copyright Protection and Authentication of Images Using Cryptographic Techniques,” Applied Sciences (Switzerland), vol. 12, no. 17, Sep. 2022, doi: 10.3390/app12178724.

Refbacks

  • There are currently no refbacks.
http://jurnal.pnk.ac.id/slotpg/ http://ejournal.ft.unsri.ac.id/demoslot/ http://jurnal.feb.unila.ac.id/gacor/ https://ojs.unsulbar.ac.id/classes/setor/ https://ojs.uma.ac.id/slotgacorni/ https://ejournal.uigm.ac.id/public/site/ https://pafibaubaukab.org/ https://pa-ruteng.go.id/plugins/ https://rs-benyaminguluh.kolakakab.go.id/gacorhariini/ https://pascasarjana.upgris.ac.id/wp-includes/images/crystal/ https://poltekkes-denpasar.ac.id/files/ https://kejari-mesuji.kejaksaan.go.id/uploads/topics/index.PhP https://dprd.nttprov.go.id/plugins/content/loadmodule/ https://pakesiska.perhubungan.jatengprov.go.id/assets/images/ https://nidr.nema.gov.mn/uploads/topics/index.PhP https://adm.megaxus.com/gcc/uploads/topics/