Enkripsi Data Teks Dengan AES dan Steganografi DWT

Chaerul Umam, Muslih Muslih

Abstract


Pertukaran data melalui internet rawan akan adanya pencurian informasi. Maka dari itu, sebagai upaya pencegahan terjadinya hal itu diperlukan sebuah sistem keamanan. Terdapat berbagai macam usaha perlindungan suatu data, misalnya dengan menggunakan teknik kriptografi dan steganografi. Pada penelitian ini, membahas bagaimana hasil data teks yang telah dienkripsi menggunakan algoritma Advanced Encryption Standard (AES) 128-Bit dilanjutkan dengan teknik steganografi pada sebuah citra menggunakan algoritma Discrete Wavelet Transform (DWT). Kemudian data hasil percobaan dianalisis kualitasnya menggunakan parameter Mean Signal Error (MSE) dan Peak- to-peak Signal to Noise Ratio (PSNR) sebagai alat ukurnya. Pada percobaan ini kualitas gambar stego menggunakan DWT tergolong cukup baik dengan menghasilkan nilai MSE 0.16-0.26 dB dan nilai PSNR nya 46.27-52.2 dB.


Keywords


Kriptografi; Advanced Encryption Standard; Steganografi; Discerete Cosine Transform; Imperceptibility;

Full Text:

PDF

References


C. A. Sari, W. S. Sari, and B. Sugiarto, “IMPERCEPTIBLE KRIPTOGRAFI CITRA BERWARNA MENGGUNAKAN RIVEST SHAMIR ADLEMAN,” in Proceeding SENDIU 2021, 2021, pp. 978–979.

C. A. Sari and E. H. Rachmawanto, “Gabungan Algoritma Vernam Chiper Dan End of File,” Techno.COM, vol. 13, no. 3, pp. 150–157, 2014.

Muslih and E. Rachmawanto, “PENGAMANAN FILE MULTIMEDIA DENGAN METODE STEGANOGRAFI END OF FILE UNTUK MENJAGA,” Techno.COM, vol. 15, no. 1, pp. 1–6, 2016.

E. H. Rachmawanto and C. A. Sari, “Steganografi Pengamanan Data Gambar Penyakit dengan Hybrid SLT-DCT,” in SEMANTIK 2013, 2013, vol. 2013, no. November, pp. 96–101.

P. Chowdhuri, B. Jana, and D. Giri, “Secured steganographic scheme for highly compressed color image using weighted matrix through DCT,” Int. J. Comput. Appl., vol. 7074, pp. 1–12, Aug. 2018.

S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017.

Sangeeta and E. A. Kaur, “A Review on Symmetric Key Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 358–362, 2017.

P. Patil, P. Narayankar, D. G. Narayan, and S. M. Meena, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish,” Procedia Comput. Sci., vol. 78, no. December 2015, pp. 617–624, 2016.

S. Tyagi, H. V. Singh, and R. Agarwal, “Image watermarking using genetic algorithm in DCT domain,” in 2017 International Conference on Inventive Systems and Control (ICISC), 2017, pp. 1–6.

J. Wang and Z. Du, “A method of processing color image watermarking based on the Haar wavelet,” J. Vis. Commun. Image Represent., vol. 64, p. 102627, 2019.

N. Ben Halima, M. A. Khan, and R. Kumar, “A Novel Approach of Digital Image Watermarking using HDWT-DCT,” in 2015 Global Summit on Computer & Information Technology (GSCIT), 2015, no. June, pp. 1–6.

S. K, “An Optimal RSA Encryption Algorithm for Secret Images,” Int. J. Pure Appl. Math., vol. 118, no. 20, pp. 2491–2500, 2018.

E. J. Kusuma, O. R. Indriani, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “An Imperceptible LSB Image Hiding on Edge Region Using DES Encryption,” in International Conference on Innovative and Creative Information Technology (ICITech), 2017, pp. 1–5.

P. Bindlish, “Study of RSA, DES and Cloud Computing,” Int. J. Adv. Res. Comput. Sci., vol. 7, no. 3, pp. 211–215, 2016.

C. A. Sari, G. Ardiansyah, D. R. I. Moses Setiadi, and E. H. Rachmawanto, “An improved security and message capacity using AES and Huffman coding on image steganography,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 5, 2019.

Nurhayati and S. S. Ahmad, “Steganography for inserting message on digital image using least significant bit and AES cryptographic algorithm,” in 2016 4th International Conference on Cyber and IT Service Management, 2016, pp. 1–6.

Lindawati and R. Siburian, “Steganography Implementation on Android Smartphone Using the LSB (Least Significant Bit) to MP3 and WAV Audio,” Proc. - ICWT 2017 3rd Int. Conf. Wirel. Telemat. 2017, pp. 170–174, 2017.

A. Goswami and S. Khandelwal, “Hybrid DCT-DWT Digital Image Steganography,” Int. J. Adv. Res. Comput. Commun. Eng. Vol., vol. 5, no. 6, pp. 228–233, 2016.

R. Naoum, A. Shihab, and S. Alhamouz, “Enhanced Image Steganography System based on Discrete Wavelet Transformation and Resilient Back-Propagation,” Int. J. Comput. Sci. Netw. Secur., vol. 16, no. 1, pp. 114–122, 2016.




DOI: http://dx.doi.org/10.22441/incomtech.v13i1.15059

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Publisher Address:
Magister Teknik Elektro, Universitas Mercu Buana
Jl. Meruya Selatan 1, Jakarta 11650
Phone (021) 31935454/ 31934474
Fax (021) 31934474
Email: [email protected]
Website of Master Program in Electrical Engineering
http://mte.pasca.mercubuana.ac.id

pISSN: 2085-4811
eISSN: 2579-6089
Jurnal URL: http://publikasi.mercubuana.ac.id/index.php/Incomtech
Jurnal DOI: 10.22441/incomtech

Lisensi Creative Commons
Ciptaan disebarluaskan di bawah Lisensi Creative Commons Atribusi-NonKomersial 4.0 Internasional

.

Web
Analytics Made Easy - StatCounter
View My Stats

The Journal is Indexed and Journal List Title by: