Pengamanan Citra Warna Menggunakan Modified Reversible-Enhanced Stego Block Chaining dan Generator Modulo

Authors

  • David David Universitas Mikroskil
  • Nicholas Ong Universitas Mikroskil
  • Ronsen Purba Universitas Mikroskil
  • Wulan Sri Lestari Universitas Mikroskil

DOI:

https://doi.org/10.55601/jsm.v27i1.1866

Keywords:

Steganografi, RESBC, Generator Modulo, Diffie-Hellman, Citra Warna

Abstract

Keamanan komunikasi digital menjadi aspek yang semakin krusial seiring berkembangnya teknik analisis dan deteksi steganografi, sehingga diperlukan pendekatan penyisipan pesan yang lebih adaptif dan tidak mudah diprediksi. Penelitian ini mengusulkan metode Modified Reversible-Enhanced Stego Block Chaining (MRESBC) dengan dukungan Generator Modulo dan algoritma Diffie-Hellman Key Exchange (DHKE) untuk meningkatkan keamanan penyisipan pesan rahasia dalam citra warna. Metode ini memodifikasi teknik RESBC dengan menambahkan mekanisme pengacakan posisi sisip menggunakan generator modulo dan variasi bit penyisipan, serta menerapkan algoritma DHKE guna memperkuat pertukaran kunci secara aman dan sebagai seed awal dari generator modulo. Selain itu, data pesan dikompresi menggunakan algoritma Lempel-Ziv-Welch (LZW) guna mengoptimalkan kapasitas penyimpanan. Penelitian ini mengembangkan aplikasi prototipe dan pengujian dilakukan terhadap citra RGB 24-bit menggunakan metrik MSE, PSNR, dan SSIM. Hasil menunjukkan nilai PSNR terbaik sebesar 59,530 dB pada penyisipan 1-bit LSB dan terendah 36,583 dB pada 4-bit LSB dengan 3 stage, seluruhnya di atas ambang batas 30 dB. Nilai SSIM mencapai 1,0 pada seluruh skenario, mengindikasikan rekonstruksi citra pesan yang sempurna. Metode yang diusulkan terbukti mampu meningkatkan keamanan steganografi tanpa mengorbankan kualitas visual secara signifikan.

References

K. Bansal, A. Agrawal, and N. Bansal, “A Survey on Steganography using Least Significant bit (LSB) Embedding Approach,” Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020), pp. 64–69, Jun. 2020.

D. R. I. M. Setiadi, “Payload enhancement on least significant bit image steganography using edge area dilation,” International Journal of Electronics and Telecommunications, vol. 65, no. 2, pp. 287–292, 2019, doi: 10.24425/ijet.2019.126312.

E. H. Rachmawanto, D. R. I. M. Setiadi, C. A. Sari, P. N. Andono, O. Farooq, and N. Pradita, “Spread Embedding Technique in LSB Image Steganography based on Chaos Theory,” 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 39–44, 2019.

D. R. I. M. Setiadi, D. N. Aini, S. N. Putro, E. H. Rachmawanto, and C. A. Sari, “Survey of Methods in the Spatial Domain Image Steganography based Imperceptibility and Payload Capacity,” 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), 2019.

J. C. Kurniawan, A. Nugraha, A. I. Prayogo, and T. F. Novanto, “Improving Data Embedding Capacity in LSB Steganography Utilizing LSB2 and Zlib Compression,” Sinkron: Jurnal dan Penelitian Teknik Informatika, vol. 9, no. 1, pp. 174–181, Jan. 2024, doi: 10.33395/sinkron.v9i1.13185.

F. I. Lubis, S. Suwilo, and P. Sihombing, “Analysis of LSB Algorithm Modification with Bit Inverse and Insertion based on Length of Message,” International Conference on Culture Heritage, Education, Sustainable Tourism, and Innovation Technologies (CESIT 2020), pp. 522–529, Mar. 2021, doi: 10.5220/0010333505220529.

F. N. Hakim and M. Sholikhan, “Enhancing Data Security through Digital Image Steganography: An Implementation of the Two Least Significant Bits (2LSB) Method,” International Journal of Graphic Design (IJGD), vol. 2, no. 2, pp. 222–235, Nov. 2024, doi: 10.51903/ijgd.v2i2.2124.

S. Khan, M. A. Irfan, A. Arif, A. Ali, Z. A. Memon, and A. Khaliq, “Reversible-Enhanced Stego Block Chaining Image Steganography: A Highly Efficient Data Hiding Technique,” Canadian Journal of Electrical and Computer Engineering, vol. 43, no. 2, pp. 66–72, Mar. 2020, doi: 10.1109/CJECE.2019.2938844.

M. J. Bawaneh, F. Al-Shalabi, and O. M. Al-Hazaimeh, “A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB,” IJCSNS International Journal of Computer Science and Network Security, vol. 21, no. 1, Jan. 2021, doi: 10.22937/IJCSNS.2021.21.1.19.

S. Rani, A. Kurniawardhani, and Y. A. W. Rendani, “Steganography on Digital Color Image Using Modulo Function and Pseudo-Random Number Generator,” Int J Adv Sci Eng Inf Technol, vol. 11, no. 6, pp. 2470–2475, 2021, doi: 10.18517/ijaseit.11.6.12687.

C. G. Aprillia and A. Prapanca, “Perbandingan Citra Digital Sebelum dan Sesudah Melakukan Kombinasi Proses Enkripsi Menggunakan Algoritma RC4 dengan Metode Steganografi Least Significant Bit (LSB),” Journal of Informatics and Computer Science, vol. 04, no. 1, 2022, [Online]. Available: www.petitcolas.net.

A. Oluwaseun. Modupe, A. E. Adedoyin, and A. O. Titilayo, “A Comparative Analysis of LSB, MSB and PVD Based Image Steganography,” International Journal of Research and Review, vol. 8, no. 9, pp. 373–377, Sep. 2021, doi: 10.52403/ijrr.20210948.

A. D. Molato and F. B. Calanda, “A Secured LSB-Based Image Steganography using Modified Collatz Conjecture,” 2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023, pp. 1997–2002, 2023, doi: 10.1109/ICACCS57279.2023.10113029.

G. Alomari and A. Aljarah, “Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security,” Turkish Journal of Computer and Mathematics Education, vol. 12, no. 6, pp. 2039–2044, 2021.

A. Kumar, P. Sufian Hameed, D. Hellman, and K. Exchange, “Diffie Hellman Stand the Test of Time (Protocol’s Limitations, Applications and Functional Divergence) General Terms,” Int J Comput Appl, vol. 176, no. 31, pp. 975–8887, Jun. 2020.

R. Rimani, N. H. Said, A. Ali-Pacha, and O. Ozer, “Key exchange based on Diffie-Hellman protocol and image registration,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 3, pp. 1751–1758, Mar. 2021, doi: 10.11591/ijeecs.v21.i3.pp1751-1758.

C. K. Deo, D. K. Singh, A. Singh, and N. K. Soni, “Developing a Highly Secure and High Capacity LSB Steganography Technique using PRNG,” 2020 International Conference on Computational Performance (ComPE), vol. 2, no. 4, pp. 136–140, Jul. 2020.

I. Haverkamp and D. K. Sarmah, “Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis,” Int J Inf Secur, vol. 23, no. 4, pp. 2607–2635, Aug. 2024, doi: 10.1007/s10207-024-00853-9.

Downloads

Published

30-04-2026