Implementation of Playfair Cipher and Least Significant Bit Algorithms in Digital Imagery
Implementasi Algoritma Playfair Cipher dan Least Significant Bit pada Citra Digital
Abstract
Message security is very important now. Because security is part of the privacy of someone who wants to protect messages from those who do not have the right to read or receive them. The method used for securing information messages with message encryption and decryption techniques is the Playfair Cipher algorithm combined with the Least Significant Bit (LSB) method. In this study it was found that the Playfair Cipher algorithm is quite safe in implementing cryptographic encryption or ciphertext because the playfair cipher has a level of appearance of letters that is so difficult to predict so that the ciphertext becomes a randomized collection of data. For the Least Significant Bit (LSB) steganography method in the insertion of a secret or embedded message it is difficult to guess in plain view the changes that occur between before and after the image is inserted are not too significant. Also see the value of the Peak-Signal-to-Noise ratio or PSNR can still be considered good quality due to> 30 decibels (dB). So the final result of the combination of the Playfair Cipher algorithm with the Least Significant Bit (LSB) method is quite good in securing messages.
Downloads
References
Yudhana, A., Hermansa, Umar, R., 2020. Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra. J. Sains Komput. Inform., vol. 4, pp. 157–169.
Yudhana, A., Riadi, I., and Ridho, F., 2018. DDoS classification using neural network and naïve bayes methods for network forensics. Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 11, pp. 177–183.
Umar, R., Yudhana, A., and Faiz, M. N., 2018. Experimental analysis of web browser sessions using live forensics method. Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 2951–2958.
Umar, R.. Yudhana, A., Bintang, R.A.K.N., 2018. Perancangan perbandingan live forensics pada keamanan media sosial Instagram, Facebook dan Twitter di Windows 10. Pros. SNST ke-9 Tahun 2018 Fak. Tek. Univ. Wahid Hasyim, pp. 125–128.
Yunanri, W., Yudhana, A., Riadi, I., 2018. Analisis Deteksi Vulnerability Pada Webserver Open Jurnal System Menggunakan OWASP Scanner. JURTI,Vol.2,no.1, p. 8.
Riadi, I., Umar, R., and Nasrulloh, I. M., 2018. Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (NIJ).ELINVO( Electronics, Informatics, and Vocational Education), vol. 3, no. 1, pp. 70–82,
Umar, R., Yudhana, A., and Faiz, M.N., 2016. Analisis Kinerja Metode Live Forensics Untuk Investigasi Random Access Memory Pada Sistem Proprietary. Pros. Konf. Nas. Ke- 4 Asos. Progr. Pascasarj. Perguru. Tinggi Muhammadiyah (APPPTM), Palembang, Indonesia, June 2016.
Syahib, M. I., Riadi, I., and Umar, R.,2018. Analisis Forensik Digital Aplikasi Beetalk Untuk Penanganan. Semin. Nas. Inform. 2018 (semnasIF 2018), Yogyakarta, Indonesia, 24 Novemb. 2018. UPN ”Veteran”.
Zuhriyanto, I., et al., 2018.Perancangan Digital Forensik Pada Aplikasi Twitter Menggunakan Metode Live Forensicsi. Seminar Nasional Informatika 2018(semnas IF 2018), Yogyakarta, 24 November 2018. UPN ”Veteran”
Yudhana, A., Riadi, I., and Anshori, I., 2018. Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist. It J. Res. Dev., vol. 3, no. 1, p. 13.
Arif, M. H., and Fanani, A. Z., 2016. Kriptografi Hill Cipher Dan Least Significant Bit Untuk Keamanan Pesan Pada Citra. CSRID (Computer Sci. Res. Its Dev. Journal), vol. 8, no. 1, p. 60.
Djuwitaningrum, E. R., and Apriyani, M., 2016.Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit Dan Algoritma Linear Congruential Generator. Juita, vol. IV, no. 2, pp. 79–85.
Rohmanu, A., 2017. Implementasi Kriptografi dan Steganografi Dengan Metode Algoritma Des dan Metode End Of File Ajar Rohmanu. J. Inform. SIMANTIK, vol. 1, no. 2, pp. 1–11.
Indriyono, B. V., 2016. Penerapan Keamanan Penyampaian Informasi Melalui Citra dengan Kriptografi Rijndael dan Steganografi LSB. Creat. Inf. Technol. J., vol. 3, no. 3, p. 228.
Syawa, M. F. l., Fikriansyah, D. C., and Agani, N., 2016. Implementasi Teknik Steganografi Menggunakan Algoritma Vigenere Cipher Dan Metode LSB. J. TICOM, vol. 4, no. 3, pp. 91–99.
Zebua, T., 2015. Pengamanan Data Teks Dengan Kombinasi Cipher Block Chaining dan LSB-1. in Seminar Nasional Inovasi dan Teknologi Informasi (SNITI), Tuktuk Siadong, Indonesia,5-6 September 2015.
Hariati, A., Hardiyanti, K., and Putri, W. E., 2018.Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks. Sinkron, vol. 2, no. 2, pp. 13–17.
Azmi, F. and Anugrahwaty, R., 2017. Analisis Matriks 5x7 Pada Kriptografi Playfair Cipher. J. Penelit. Tek. Inform., vol. 1, no. 2, pp. 27–30.
Copyright (c) 2020 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in each article belongs to the author
- The author acknowledges that the RESTI Journal (System Engineering and Information Technology) is the first publisher to publish with a license Creative Commons Attribution 4.0 International License.
- Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;