Data Security Techniques Using Vigenere Cipher And Steganography Methods In Inserting Text Messages In Images

Authors

  • Vincent Smith University of Charleston
  • Maximilian Mendoza University College Dublin
  • Insaf Ullah University Of Essex

DOI:

https://doi.org/10.55537/jistr.v3i3.867

Abstract

Improving data security has become a top priority in many industries, especially when it comes to sending and receiving private communications. Embedding text into photos using steganography and the Vigenere Cipher Method is one method of protecting text messages. In order to maintain the security of text embedded in images via web-based applications, the main challenge in this research is how to integrate and apply the Vigenere Cipher algorithm and LSB steganography while still paying attention to the size of the image message that has been ciphertexted. insertion and what not. Combining these two techniques aims to increase the level of security when encrypting message text. The message text is encrypted using the Vigenere Cipher to protect it; Encrypted messages are difficult to decipher without the right key. Meanwhile, message text may be hidden visually in photos using steganography. Text messages are efficiently disguised in images and significantly encrypted thanks to the combination of these two techniques. In this research, steganography and Vigenere Cipher techniques are used and tested on various types of images. The combined use of these two techniques effectively improves data security, according to test results. The study also discusses a number of possible defenses, such as image size and quality, that may arise from combining the two approaches. The findings of this research can be applied to improve the security of text messages in various contexts, such as online communications and data storage. Through the integration of steganography and Vigenere Cipher technology, users can guarantee the confidentiality of their communication texts and prevent unapproved access.

Downloads

Download data is not yet available.

References

I. Keshta et al., “Blockchain aware proxy re-encryption algorithm-based data sharing scheme,” Phys. Commun., vol. 58, 2023, doi: 10.1016/j.phycom.2023.102048.

L. Shen et al., “SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks,” IEEE Internet Things J., vol. 11, no. 8, pp. 13437 – 13451, 2024, doi: 10.1109/JIOT.2023.3339638.

W. M. Wilda and L. Hanum, “Information System Application Alanysis And Design Web-Based Network Complaints Using Php And Bootsrap On Diskominfo,” J. Inf. Syst. Technol. Res., vol. 1, no. 2, pp. 68–78, May 2022, doi: 10.55537/jistr.v1i2.131.

W. Bai, J. Blocki, and M. H. Ameri, “Cost-asymmetric memory hard password hashing,” Inf. Comput., vol. 297, 2024, doi: 10.1016/j.ic.2023.105134.

M. Ramzan and M. F. Khan, “A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 3, pp. 452 – 461, 2023, doi: 10.14569/IJACSA.2023.0140351.

B. Mennink, “Encryption and Security of Counter Mode,” in Symmetric Cryptography 1: Design and Security Proofs, 2024. doi: 10.1002/9781394256358.ch11.

M. L. A. S. Lutfil, Samsudin, and Triase, “Application Of The Triple Exponential Smoothing Method In Predicting Electronic Equipment Inventory Based On Customer Demand,” J. Inf. Syst. Technol. Res., vol. 2, no. 2, pp. 54–65, 2023, doi: 10.55537/jistr.v2i2.616.

R. Gafni, I. Aviv, and D. Haim, “Multi-Party Secured Collaboration Architecture from Cloud to Edge,” J. Comput. Inf. Syst., 2023, doi: 10.1080/08874417.2023.2248921.

M. S. Sumathi, J. Shruthi, V. Jain, G. K. Kumar, and Z. Z. Khan, “Using Artificial Intelligence (AI) and Internet of Things (IoT) for Improving Network Security by Hybrid Cryptography Approach,” Evergreen, vol. 10, no. 2, pp. 1133 – 1139, 2023, doi: 10.5109/6793674.

A. R. Mido and E. I. H. Ujianto, “Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB,” J. Teknol. Inf. dan Ilmu Komput., vol. 9, no. 2, p. 279, 2022, doi: 10.25126/jtiik.2022914852.

A. Ikhwan, R. A. A. Raof, P. Ehkan, Y. Yacob, and M. Syaifuddin, “Data Security Implementation using Data Encryption Standard Method for Student Values at the Faculty of Medicine, University of North Sumatra,” J. Phys. Conf. Ser., vol. 1755, no. 1, 2021, doi: 10.1088/1742-6596/1755/1/012022.

A. Patange et al., “Advancements in optical steganography for secure medical data transmission in telehealth systems,” Opt. Quantum Electron., vol. 55, no. 9, 2023, doi: 10.1007/s11082-023-05080-5.

A. Durafe and V. Patidar, “Image Steganography Using Fractal Cover and Combined Chaos-DNA Based Encryption,” Ann. Data Sci., vol. 11, no. 3, pp. 855 – 885, 2024, doi: 10.1007/s40745-022-00457-x.

Z. Safaa and M. Khaire, “Image steganography using exploiting modification direction for compressed encrypted data,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 6, pp. 2951–2963, 2022, doi: 10.1016/j.jksuci.2019.04.008.

Fina Triana, Jon Endri, and Irma Salamah, “Implementation of CAESAR CIPHER Cryptography Techniques for Android Based Information Data Security,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 4, pp. 627–634, Aug. 2020, doi: 10.29207/resti.v4i4.1984.

D. H. Pane, “IMPLEMENTASI KRIPTOGRAFI KEAMANAN DATA RESI PADA PT JNE PERBAUNGAN MENGGUNAKAN METODE MERKLE HELLMAN,” DEVICE J. Inf. Syst. Comput. Sci. Inf. Technol., vol. 1, no. 1, Jun. 2020, doi: 10.46576/device.v1i1.695.

A. Z. F. Rangkuti and H. Fahmi, “Implementasi Kriptografi Untuk Keamanan File Text Dengan Menggunakan Metode MD5,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 2, pp. 170–175, 2020, doi: 10.32672/jnkti.v3i2.2384.

J. Karman and A. Nurhasan, “PERANCANGAN SISTEM KEAMANAN DATA INVENTORY BARANG DI TOKO NANDA BERBASIS WEB MENGGUNAKAN METODE KRIPTOGRAFI VIGENERE CIPHER,” J. Teknol. Inf. MURA, vol. 11, no. 1, pp. 29–36, Jun. 2019, doi: 10.32767/jti.v11i1.451.

Y. Wiharto and A. Irawan, “Sistem Kehadiran Menggunakan Quick Respone Code Dengan Enkripsi Algorithm Message Digest 5 dan Vigenere Cipher Pada SpeedCom IT Consulting,” J. SISKOM-KB (Sistem Komput. dan Kecerdasan Buatan), vol. 2, no. 1, pp. 42–56, 2018.

A. Fadlil, I. Riadi, and A. Nugrahantoro, “Kombinasi Sinkronisasi Jaringan Syaraf Tiruan dan Vigenere Cipher untuk Optimasi Keamanan Informasi,” Digit. Zo. J. Teknol. Inf. dan Komun., vol. 11, no. 1, pp. 81–95, May 2020, doi: 10.31849/digitalzone.v11i1.3945.

Minarni and R. Redha, “Implementasi Least Significant Bit (LSB) dan Algoritma Vigenere Cipher Pada Audio Steganografi,” J. Sains dan Teknol. J. Keilmuan dan Apl. Teknol. Ind., vol. 20, no. 2, pp. 168–174, 2020.

R. I. Perwira, D. B. Prasetyo, and F. A. J. Haryanto, “STEGANOGRAFI DENGAN AES PADA MEDIA SUARA BERBASIS INTERNET,” Telematika, vol. 17, no. 1, p. 18, Apr. 2020, doi: 10.31315/telematika.v17i1.3401.

R. N. Pahlawan, R. Y. Dillak, and J. Sine, “APLIKASI KRIPTOGRAFI ALGORITMA RIVEST-SHAMIR-ADLEMAN DAN RIVEST CODE 4 PADA STEGANOGRAFI CITRA METODE LEAST SIGNIFICANT BIT,” J. Ilm. Flash, vol. 5, no. 1, p. 05, Jun. 2019, doi: 10.32511/flash.v5i1.626.

P. Bagane et al., “Securing Data in Images Using Cryptography and Steganography Algorithms,” Int. J. Intell. Syst. Appl. Eng., vol. 12, no. 15s, pp. 17 – 25, 2024, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85187453046&partnerID=40&md5=2d6062d35dbc521a5e6023ddeb031f06

L. Negi and L. Negi, “Image Steganography Using Steg with AES and LSB,” in 7th International Conference on Computing, Engineering and Design, ICCED 2021, 2021. doi: 10.1109/ICCED53389.2021.9664834.

F. Varghese and P. Sasikala, “Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding,” Wirel. Pers. Commun., vol. 130, no. 1, pp. 551 – 578, 2023, doi: 10.1007/s11277-023-10298-3.

A. Mehmood, A. Shafique, M. Alawida, and A. N. Khan, “Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques,” IEEE Access, vol. 12, pp. 27530 – 27555, 2024, doi: 10.1109/ACCESS.2024.3367232.

A. Aldo and L. Hakim, “IMPLEMENTASI STEGANOGRAFI PADA CITRA DIGITAL DAN KRIPTOGRAFI ALGORITMA HILL CHIPPER UNTUK PENGAMANAN INFORMASI BERUPA TEXT,” J. Ilm. Teknol. Infomasi Terap., vol. 5, no. 1, pp. 6–17, Aug. 2019, doi: 10.33197/jitter.vol5.iss1.2018.247.

E. Pujiastuti, “Penyembunyian Pesan dalam Gambar dengan Teknik Steganografi menggunakan Matlab 7.7. 0,” J. Tek. Inform., vol. 4, no. 1, pp. 51–56, 2018.

Downloads

Published

2024-09-30

How to Cite

Smith, V., Mendoza, M. ., & Ullah, I. . (2024). Data Security Techniques Using Vigenere Cipher And Steganography Methods In Inserting Text Messages In Images. Journal of Information Systems and Technology Research, 3(3), 92–100. https://doi.org/10.55537/jistr.v3i3.867