Increase the PSNR Of Image Using LZW and AES Algorithm With MLSB on Steganography

  • Authors

    • Erick Fitra Wijayanto
    • Muhammad Zarlis
    • Zakarias Situmorang
    2018-03-10
    https://doi.org/10.14419/ijet.v7i2.5.13965
  • file compression, advanced encryption standard cryptography, steganography modified least significant bit
  • There are many research has done a hybridization approach of text message insertion that has been compressed with Lempel-Ziv-Welch (LZW) algorithm and has also been encrypted. The text messages in ciphertext form are inserted into the image file using LSB (Least Significant Bit) method. The results of this study indicate that the value of Peak Signal to Noise Ratio (PSNR) lower than the LSB method of 0.94 times with a ratio of 20.33%, with Kekre's method of 10.04%. To improve the value of PSNR stego image of insertion, in this research is inserted audio samples using 5 bits to reduce the amount of data insertion, so it can get the value of MSE stego image low. Prior to insertion, the text file is compressed with the Lempel-Ziv-Welch (LZW) algorithm and encrypted with the Advanced Encryption Standard (AES) algorithm. Then, the insertion of compression and encrypted text files is done with the Modified Least Significant Bit (MLSB) algorithm. To performa test reliability of steganography, the image stego image is done by calculating Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). At extraction process with MLSB algorithm, decryption with AES algorithm and decompression with LZW algorithm. The experimental results show that the MSE values obtained are lower and the proposed PSNR method is better with (α) 1,044 times than the Kaur method, et al. The result of embed text file extraction from the stego image works well resulting in encrypted and uncompressed text files.

     

     

  • References

    1. [1] D. Kaur, H. K. Verma, and R. K. Singh, “A hybrid approach of image steganography,†in Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016, 2017.

      [2] U. Khair, H. Fahmi, S. Al Hakim, and R. Rahim, “Forecasting Error Calculation with Mean Absolute Deviation and Mean Absolute Percentage Error,†J. Phys. Conf. Ser., vol. 930, no. 1, p. 012002, Dec. 2017.

      [3] J. Fridrich, Steganography in digital media: Principles, algorithms, and applications. 2012.

      [4] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression,†World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292–297, 2017.

      [5] D. Rachmawati, A. Amalia, and J. Surya, “Combination of Huffman Coding Compression Algorithm and Least Significant Bit Method for Image Hiding,†in Journal of Physics: Conference Series, 2017, vol. 801, no. 1.

      [6] P. P. Dang and P. M. Chau, “Image encryption for secure Internet multimedia applications,†IEEE Trans. Consum. Electron., vol. 46, no. 3, pp. 395–403, 2000.

      [7] R. Rahim, D. Adyaraka, S. Sallu, E. Sarimanah, and M. M. Rahman, “Tiny encryption algorithm and pixel value differencing for enhancement security message,†Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 82–85, 2018.

      [8] R. Rahim, “Man-in-the-middle-attack prevention using interlock protocol method,†ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483–6487, 2017.

      [9] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,†J. Phys. Conf. Ser., vol. 930, no. 1, p. 012005, Dec. 2017.

      [10] R. Rahim et al., “Combination Base64 Algorithm and EOF Technique for Steganography,†J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012003, Apr. 2018.

      [11] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing steganography with government standard algorithm,†in 2017 3rd International Conference on Science in Information Technology (ICSITech), 2017, pp. 366–371.

      [12] R. Rahim, D. Adyaraka, S. Sallu, E. Sarimanah, and A. Hidayat, “An application data security with lempel - ziv welch and blowfish,†Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 71–73, 2018.

      [13] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,†Int. J. Secur. Its Appl., vol. 10, no. 8, pp. 173–180, Aug. 2016.

      [14] Q. Kester, “A Visual Cryptographic Encryption Technique for Securing Medical Images,†arXiv Prepr. arXiv1307.7791, vol. 3, no. 6, pp. 3–7, 2013.

      [15] Ratnadewi, R. P. Adhie, Y. Hutama, A. Saleh Ahmar, and M. I. Setiawan, “Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC),†J. Phys. Conf. Ser., vol. 954, no. 1, 2018.

      [16] R. Rahim et al., “Combination Vigenere Cipher and One Time Pad for Data Security,†Int. J. Eng. Technol., vol. 7, no. 2.3, pp. 92–94, 2018.

      [17] E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile RC4 simulation for education,†World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 75–79, 2018.

      [18] T. Zhang, W. Li, Y. Zhang, and P. Xijian, “Detection of LSB matching steganography based on distribution of pixel differences in natural images,†in IASP 10 - 2010 International Conference on Image Analysis and Signal Processing, 2010, pp. 548–552.

      [19] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,†Signal Processing, vol. 90, no. 3. pp. 727–752, 2010.

      [20] A. Rahman and A. S. Ahmar, “Forecasting of primary energy consumption data in the United States: A comparison between ARIMA and Holter-Winters models,†in AIP Conference Proceedings, 2017, vol. 1885.

      [21] A. S. Ahmar, “A comparison of α-Sutte Indicator and ARIMA methods in renewable energy forecasting in Indonesia,†Int. J. Eng. Technol., vol. 7, 2018.

      [22] D. U. Sutiksno, A. S. Ahmar, N. Kurniasih, E. Susanto, and A. Leiwakabessy, “Forecasting Historical Data of Bitcoin using ARIMA and α-Sutte Indicator,†J. Phys. Conf. Ser., vol. 1028, no. 1, p. 012194, 2018.

      [23] N. Kurniasih, A. S. Ahmar, D. R. Hidayat, H. Agustin, and E. Rizal, “Forecasting Infant Mortality Rate for China: A Comparison Between α-Sutte Indicator, ARIMA, and Holt-Winters,†J. Phys. Conf. Ser., vol. 1028, no. 1, p. 012195, 2018.

      [24] A. S. Ahmar, A. Rahman, A. N. M. Arifin, and A. A. Ahmar, “Predicting movement of stock of ‘Y’ using sutte indicator,†Cogent Econ. Financ., vol. 5, no. 1, 2017.

      [25] A. S. Ahmar et al., “Modeling Data Containing Outliers using ARIMA Additive Outlier (ARIMA-AO),†J. Phys. Conf. Ser., vol. 954, no. 1, 2018.

      [26] A. A. J. Altaay, S. Bin Sahib, and M. Zamani, “An Introduction to Image Steganography Techniques,†in 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012, pp. 122–126.

      [27] M. Liśkiewicz, R. Reischuk, and U. Wölfel, “Security levels in steganography – Insecurity does not imply detectability,†Theor. Comput. Sci., vol. 692, pp. 25–45, 2017.

      [28] H. Wang and S. Wang, “Cyber Warfare: Steganography vs. Steganalysis,†Commun. ACM, vol. 47, no. 10, pp. 76–82, 2004.

      [29] R. Ratnadewi, R. P. Adhie, Y. Hutama, J. Christian, and D. Wijaya, “Implementation and performance analysis of AES-128 cryptography method in an NFC-based communication system,†World Trans. Eng. Technol. Educ., vol. 15, no. 2, pp. 178–183, 2017.

      [30] J. Hoffstein, J. Pipher, and J. H. Silverman, “Diffie–Hellman key exchange,†An Introd. to Math. Cryptogr., pp. 65–67, 2014.

      [31] A. Widarma, “Kombinasi Algoritma AES, RC4, dan Elgamal dalam Skema Hybrid untuk Keamanan Data,†J. Comput. Eng. Syst. Sci., vol. 1, no. 1, pp. 1–8, 2016.

      [32] G. Singh and Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,†Int. J. Comput. Appl., vol. 6, no. 19, pp. 33–38, 2013.

  • Downloads

  • How to Cite

    Fitra Wijayanto, E., Zarlis, M., & Situmorang, Z. (2018). Increase the PSNR Of Image Using LZW and AES Algorithm With MLSB on Steganography. International Journal of Engineering & Technology, 7(2.5), 119-121. https://doi.org/10.14419/ijet.v7i2.5.13965