Perancangan Aplikasi Stegakrip Dengan Metode LSB Dan Algoritma RSA Berbasis Web

Rohmat Nur Ibrahim, Ilham M.S.


Security is necessary especially in maintaining data or information that is private and confidential. For that required a data security with the aim of keeping the data so that can not be accessed by parties who do not have rights. Based on the above information is made a stegakrip application where the stegakrip is a combination of two words of steganography and cryptography. Where cryptography is the art of keeping messages safe when messages are sent from one place to another. While steganography is an art of hiding secret messages on a medium in such a way that no one suspects the existence of hidden messages. In this application stegakrip used LSB (Least Significant Bit) method which is a steganography method where a data is hidden into an object such as images where the bits are less meaningful in the picture is reordered as a place of data insertion. As for cryptography in this application used RSA algorithm (Rivest, Shamir, Adleman) which is one of asymmetric cryptography algorithm where the key for encryption is different with the key used to decrypt a data. Other means as a comparison for cryptography provided encryption with AES (Advanced Encryption Standard) algorithm and Hash function.  Keywords: stegowrip, steganography, cryptography.

Full Text:



Ariyus, D. (2008). Pengantar Ilmu Kriptografi Teori Analisis dan Implementasi. Yogyakarta : Andi Offset.

Asad, M., Gilani, J., & Khalid, A. (2011, July). An enhanced least significant bit modification technique for audio steganography. In Computer Networks and Information Technology (ICCNIT), 2011 International Conference on (pp. 143-147). IEEE.

Gupta, S., Goyal, A., & Bhushan, B. (2012). Information hiding using least significant bit steganography and cryptography. International Journal of Modern Education and Computer Science, 4(6), 27-34.

Jain, Y. K., & Ahirwal, R. R. (2010). A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys. International Journal of Computer Science and Security, 4(1), 40-49.

Liu, Q., Sung, A. H., Ribeiro, B., Wei, M., Chen, Z., & Xu, J. (2008). Image complexity and feature mining for steganalysis of least significant bit matching steganography. Information Sciences, 178(1), 21-36.

Munir, R. (2006). Kriptografi. Bandung: Penerbit Informatika.

Pressman (2010). Metodologi Pengembangan Sistem Informasi, PT. Elex Media Komputindo. Jakarta.

Rakhmat, B., & Fairuzabadi, M. (2010). Steganografi Menggunakan Metode Least Significant Bit Dengan Kombinasi Algoritma Kriptografi Vigenère Dan Rc4. Jurnal Dinamika Informatika, 5(2), 1-17.

Rosadi, D., & Sidharta, I. (2016). Model Perancangan Sistem Informasi Dalam Mendukung Ketahanan Pangan. Majalah Bisnis Dan IPTEK, 9(1), 17-27.

Sidharta, I., Priadana, S., & Affandi, A. (2016). Extending End-user Computing Satisfaction on Academic Information Systems. Indian Journal of Science and Technology, 9(48), 1-5.

Xia, Z., Wang, X., Sun, X., & Wang, B. (2014). Steganalysis of least significant bit matching using multi‐order differences. Security and Communication Networks, 7(8), 1283-1291.

Younes, M. A. B., & Jantan, A. (2008). A new steganography approach for images encryption exchange by using the least significant bit insertion. International Journal of Computer Science and Network Security, 8(6), 247-257.


  • There are currently no refbacks.

Copyright (c) 2017

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.