C. A. Sari, Danang Wahyu Utomo, Wellia Shinta Sari, Daurat Sinaga, Mohamed Doheir
{"title":"An Enhancement of DES, AES Based on Imperceptibility Along With LSB","authors":"C. A. Sari, Danang Wahyu Utomo, Wellia Shinta Sari, Daurat Sinaga, Mohamed Doheir","doi":"10.1109/iSemantic55962.2022.9920444","DOIUrl":null,"url":null,"abstract":"A data or information becomes important if only certain people can receive the information. For example, keeping a confidential documentation file. Files stored do not guarantee to be free from access and abuse by crackers such as wanting to modify or distribute the contents of the file on the basis of providing benefits for them. The security of information can be increased by using cryptography to encrypt messages into a secret cipher. The steganographic method is a method used to protect messages by inserting them into other media. In this study, a combination of cryptographic algorithms, namely Data Encryption Standard and Advanced Encryption Standard, was used for the Least Significant Bit steganography method. DES has the advantage of using S-Box. DES is not immune to brute force attacks and has a key length of only 56 bits, thus it is necessary to optimize the DES algorithm. AES has a more complicated key randomization process using a certain loop where AES is an extension of DES. On the other hand, to obtain a high imperceptibility value, LSB is used. The results of the combination of 2 cryptographic algorithms with steganography were tested with parameters such as PSNR and MSE which got values of 73.66 dB and 0.016, which means they are ideal values for stego images that have a high level of similarity with the original image. Encryption and decryption processing, the best time is 0.438 seconds with various message file sizes used. Meanwhile, in the embedding results, the image file size is slightly larger.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iSemantic55962.2022.9920444","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
A data or information becomes important if only certain people can receive the information. For example, keeping a confidential documentation file. Files stored do not guarantee to be free from access and abuse by crackers such as wanting to modify or distribute the contents of the file on the basis of providing benefits for them. The security of information can be increased by using cryptography to encrypt messages into a secret cipher. The steganographic method is a method used to protect messages by inserting them into other media. In this study, a combination of cryptographic algorithms, namely Data Encryption Standard and Advanced Encryption Standard, was used for the Least Significant Bit steganography method. DES has the advantage of using S-Box. DES is not immune to brute force attacks and has a key length of only 56 bits, thus it is necessary to optimize the DES algorithm. AES has a more complicated key randomization process using a certain loop where AES is an extension of DES. On the other hand, to obtain a high imperceptibility value, LSB is used. The results of the combination of 2 cryptographic algorithms with steganography were tested with parameters such as PSNR and MSE which got values of 73.66 dB and 0.016, which means they are ideal values for stego images that have a high level of similarity with the original image. Encryption and decryption processing, the best time is 0.438 seconds with various message file sizes used. Meanwhile, in the embedding results, the image file size is slightly larger.