Implementation of Playfair Cipher and Least Significant Bit Algorithms in Digital Imagery

Implementasi Algoritma Playfair Cipher dan Least Significant Bit pada Citra Digital

  • Hermansa Universitas Ahmad Dahlan
  • Rusydi Umar Universitas Ahmad Dahlan
  • Anton Yudhana Universitas Ahmad Dahlan
Keywords: implementation, playfair cipher, least significant bit, digital image

Abstract

Message security is very important now. Because security is part of the privacy of someone who wants to protect messages from those who do not have the right to read or receive them. The method used for securing information messages with message encryption and decryption techniques is the Playfair Cipher algorithm combined with the Least Significant Bit (LSB) method. In this study it was found that the Playfair Cipher algorithm is quite safe in implementing cryptographic encryption or ciphertext because the playfair cipher has a level of appearance of letters that is so difficult to predict so that the ciphertext becomes a randomized collection of data. For the Least Significant Bit (LSB) steganography method in the insertion of a secret or embedded message it is difficult to guess in plain view the changes that occur between before and after the image is inserted are not too significant. Also see the value of the Peak-Signal-to-Noise ratio or PSNR can still be considered good quality due to> 30 decibels (dB). So the final result of the combination of the Playfair Cipher algorithm with the Least Significant Bit (LSB) method is quite good in securing messages.

Downloads

Download data is not yet available.

References

Yudhana, A., Hermansa, Umar, R., 2020. Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra. J. Sains Komput. Inform., vol. 4, pp. 157–169.

Yudhana, A., Riadi, I., and Ridho, F., 2018. DDoS classification using neural network and naïve bayes methods for network forensics. Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 11, pp. 177–183.

Umar, R., Yudhana, A., and Faiz, M. N., 2018. Experimental analysis of web browser sessions using live forensics method. Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 2951–2958.

Umar, R.. Yudhana, A., Bintang, R.A.K.N., 2018. Perancangan perbandingan live forensics pada keamanan media sosial Instagram, Facebook dan Twitter di Windows 10. Pros. SNST ke-9 Tahun 2018 Fak. Tek. Univ. Wahid Hasyim, pp. 125–128.

Yunanri, W., Yudhana, A., Riadi, I., 2018. Analisis Deteksi Vulnerability Pada Webserver Open Jurnal System Menggunakan OWASP Scanner. JURTI,Vol.2,no.1, p. 8.

Riadi, I., Umar, R., and Nasrulloh, I. M., 2018. Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (NIJ).ELINVO( Electronics, Informatics, and Vocational Education), vol. 3, no. 1, pp. 70–82,

Umar, R., Yudhana, A., and Faiz, M.N., 2016. Analisis Kinerja Metode Live Forensics Untuk Investigasi Random Access Memory Pada Sistem Proprietary. Pros. Konf. Nas. Ke- 4 Asos. Progr. Pascasarj. Perguru. Tinggi Muhammadiyah (APPPTM), Palembang, Indonesia, June 2016.

Syahib, M. I., Riadi, I., and Umar, R.,2018. Analisis Forensik Digital Aplikasi Beetalk Untuk Penanganan. Semin. Nas. Inform. 2018 (semnasIF 2018), Yogyakarta, Indonesia, 24 Novemb. 2018. UPN ”Veteran”.

Zuhriyanto, I., et al., 2018.Perancangan Digital Forensik Pada Aplikasi Twitter Menggunakan Metode Live Forensicsi. Seminar Nasional Informatika 2018(semnas IF 2018), Yogyakarta, 24 November 2018. UPN ”Veteran”

Yudhana, A., Riadi, I., and Anshori, I., 2018. Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist. It J. Res. Dev., vol. 3, no. 1, p. 13.

Arif, M. H., and Fanani, A. Z., 2016. Kriptografi Hill Cipher Dan Least Significant Bit Untuk Keamanan Pesan Pada Citra. CSRID (Computer Sci. Res. Its Dev. Journal), vol. 8, no. 1, p. 60.

Djuwitaningrum, E. R., and Apriyani, M., 2016.Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit Dan Algoritma Linear Congruential Generator. Juita, vol. IV, no. 2, pp. 79–85.

Rohmanu, A., 2017. Implementasi Kriptografi dan Steganografi Dengan Metode Algoritma Des dan Metode End Of File Ajar Rohmanu. J. Inform. SIMANTIK, vol. 1, no. 2, pp. 1–11.

Indriyono, B. V., 2016. Penerapan Keamanan Penyampaian Informasi Melalui Citra dengan Kriptografi Rijndael dan Steganografi LSB. Creat. Inf. Technol. J., vol. 3, no. 3, p. 228.

Syawa, M. F. l., Fikriansyah, D. C., and Agani, N., 2016. Implementasi Teknik Steganografi Menggunakan Algoritma Vigenere Cipher Dan Metode LSB. J. TICOM, vol. 4, no. 3, pp. 91–99.

Zebua, T., 2015. Pengamanan Data Teks Dengan Kombinasi Cipher Block Chaining dan LSB-1. in Seminar Nasional Inovasi dan Teknologi Informasi (SNITI), Tuktuk Siadong, Indonesia,5-6 September 2015.

Hariati, A., Hardiyanti, K., and Putri, W. E., 2018.Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks. Sinkron, vol. 2, no. 2, pp. 13–17.

Azmi, F. and Anugrahwaty, R., 2017. Analisis Matriks 5x7 Pada Kriptografi Playfair Cipher. J. Penelit. Tek. Inform., vol. 1, no. 2, pp. 27–30.

Published
2020-06-20
How to Cite
Hermansa, Rusydi Umar, & Anton Yudhana. (2020). Implementation of Playfair Cipher and Least Significant Bit Algorithms in Digital Imagery. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(3), 454 - 461. https://doi.org/10.29207/resti.v4i3.1877
Section
Information Systems Engineering Articles

Most read articles by the same author(s)