ac

Disguising Text Using Caesar Cipher, Reverse Cipher and Least Significant Bit (LSB) Algorithms in Video

Authors

  • Manutur Siregar Universitas Satya Terra Bhinneka
  • Abwabul Jinan Universitas Satya Terra Bhinneka
  • Tar Muhammad Raja Gunung Universitas Satya Terra Bhinneka

DOI:

10.47709/cnahpc.v6i3.4217

Keywords:

Caesar Cipher, Reverse Cipher, Least Significant Bit, Video, Frame

Dimension Badge Record



Abstract

In communication, there is a process of transferring information from the sender to the recipient. The information sent must be the same as the information received. If there are differences, it means that there has been a data change process carried out by irresponsible parties. One technique for changing the content of information is man in the middle. The data changer will receive information from the sender, then change it and forward it to the recipient, so that the changed information appears to have come from the sender.To protect information, this can be done by utilizing the science of cryptography and steganography which aims to protect information by changing it to another form or by inserting the information into other media. In this research, to protect information the Caesar Cipher Algorithm is used, this algorithm will change the letters in plaintext to another letter (ciphertext) by using an alphabetical shift according to the number in the form of the key used, namely > 1 and < 26, then the Reverse Cipher algorithm is carried out, namely changing the position of the letters of the plaintext from the first order to the last order and so on. The encrypted information will then be inserted into a video using the Steganography Algorithm, namely Least Significant Bit (LSB). Before being inserted, the video will first be converted into several image frames, then in one frame the information will be inserted. This can be done because the frame is a collection of RGB arrays which have values 0-255 or 0 and 1. So the insertion is done in bit form. Frames containing information will then be converted back into a video.On the receiving side, the video will be converted into a frame, next is the process of retrieving the information that was previously inserted. The information that has been taken is then reversed in order and then shifted using the Caesar chipper algorithm according to the key used by the sender, then the first letter of each word is changed to capital, so that the information sent is the same as that received. The implication of this research is that it is a way to combine cryptography with steganography as an information security technique.

Downloads

Download data is not yet available.
Google Scholar Cite Analysis
Abstract viewed = 96 times

References

Alrikabi, H. T. S., & Hazim, H. T. (2021). Enhanced Data Security of Communication System Using Combined Encryption and Steganography. International Journal of Interactive Mobile Technologies, 15(16), 144–157. https://doi.org/10.3991/ijim.v15i16.24557

Aslam, M. A., Rashid, M., Azam, F., Abbas, M., Rasheed, Y., Alotaibi, S. S., & Anwar, M. W. (2022). Image Steganography using Least Significant Bit (LSB)-A Systematic Literature Review. Proceedings of 2022 2nd International Conference on Computing and Information Technology, ICCIT 2022, 32–38. https://doi.org/10.1109/ICCIT52419.2022.9711628

Dheyauldeen Najeeb, H., & Tahseen Ali, I. (2021). A proposal of Multimedia Steganography Algorithm based on Improved Least Significant Bit (LSB) Method. Iraqi Journal of Science, 58(4), 2188–2199. https://doi.org/10.24996/ijs.2017.58.4b.22

Ghaiyur Hayat, F., & B.N., M. (2022). Applying Encryption and Decryption Algorithm for Data Security in Cloud. International Journal of Engineering and Modern Technology, 8(2), 16–23. https://doi.org/10.56201/ijemt.v8.no2.2022.pg16.23

Harris, F., & Sari, R. E. (2024). Meningkatkan Keamanan Source Code Web Melalui Teknik Enkripsi dan Dekripsi Dengan Metode Reverse Cipher dan Caesar Cipher Improving Web Source Code Security Through Encryption and Decryption Techniques Using Reverse Cipher and Caesar Cipher Methods. Januari, 2, 405. http://kti.potensi-utama.ac.id/index.php/JID

Isfahani, F. Al, & Nugraha, F. (2019). Implementasi Steganografi LSB dengan Enkripsi Base64 Pada Citra dengan Ruang Warna CMYK. ScientiCO?: Computer Science and Informatics Journal, January, 1–8.

Kosuru, S. N. V. J. D., Pradhan, A., Basith, K. A., Sonar, R., & Swain, G. (2023). Digital Image Steganography With Error Correction on Extracted Data. IEEE Access, 11(August), 80945–80957. https://doi.org/10.1109/ACCESS.2023.3300918

Pulyalina, C., & Asymmetric, G. P. (2020). SS symmetry Correction. 12050799.

Rahman, S., Uddin, J., Khan, H. U., Hussain, H., Khan, A. A., & Zakarya, M. (2022). A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method. IEEE Access, 10(November), 124053–124075. https://doi.org/10.1109/ACCESS.2022.3224745

Riadi, I., Fadlil, A., & Tsani, F. A. (2022). Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512. Lontar Komputer?: Jurnal Ilmiah Teknologi Informasi, 13(2), 84. https://doi.org/10.24843/lkjiti.2022.v13.i02.p02

Shifa, A., Asghar, M. N., Fleury, M., Kanwal, N., Ansari, M. S., Lee, B., Herbst, M., & Qiao, Y. (2020). MuLViS: Multi-level encryption based security system for surveillance videos. IEEE Access, 8, 177131–177155. https://doi.org/10.1109/ACCESS.2020.3024926

Susanto, E. H., Pratama, D. P., & Nurpratama, R. S. (2024). Optimizing Digital Image Steganography to Enhance the Security of Secret Message Delivery. International Journal of Engineering Continuity, 3(1), 38–58. https://doi.org/10.58291/ijec.v3i1.194

Y. He, G. Wang, W. Li and Y. Ren,(2020). Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things. IEEE Access, 8, 20920-20930. https://doi.org/10.1109/ACCESS.2020.2967070

M. A. Jimale et al.( 2022). Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces. IEEE Access,10,50819-50838. https://doi.org/10.1109/ACCESS.2022.3171853

M. A. Jimale et al. (2022). Authenticated Encryption Schemes: A Systematic Review. IEEE Access, 10 , 14739-14766. https://doi.org/10.1109/ACCESS.2022.3147201

K. Z. Azar, H. M. Kamali, H. Homayoun and A. Sasan.(2021). From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains. IEEE Access, 9, 73133-73151. https://doi.org/10.1109/ACCESS.2021.3080257

A. S. Ansari, M. S. Mohammadi and M. T. Parvez.( 2020).A Multiple-Format Steganography Algorithm for Color Images. IEEE Access, 8, 83926-83939. https://doi.org/10.1109/ACCESS.2020.2991130

J. R. Jayapandiyan, C. Kavitha and K. Sakthivel.( 2020). Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization. IEEE Access, 8, 136537-136545. https://doi.org/10.1109/ACCESS.2020.3009234.

S. Rahman, J. Uddin, H. U. Khan, H. Hussain, A. A. Khan and M. Zakarya. (2022). A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method. IEEE Access, 10,124053-124075. https://doi.org/10.1109/ACCESS.2022.3224745

S. Kamil, S. N. H. S. Abdullah, M. K. Hasan and F. A. Bohani.(2021). Enhanced Flipping Technique to Reduce Variability in Image Steganography. IEEE Access, 9, 168981-168998. https://doi.org/10.1109/ACCESS.2021.3133672

S. Solak.(2020). High Embedding Capacity Data Hiding Technique Based on EMSD and LSB Substitution Algorithms.IEEE Access, 8, 166513-166524. https://doi.org/10.1109/ACCESS.2020.3023197

H. T. Elshoush and M. M. Mahmoud.(2023). Ameliorating LSB Using Piecewise Linear Chaotic Map and One-Time Pad for Superlative Capacity, Imperceptibility and Secure Audio Steganography.IEEE Access, 11, 33354-33380. https://doi.org/10.1109/ACCESS.2023.3259902.

J. Zhou, J. Li and X. (2020). A Novel Lossless Medical Image Encryption Scheme Based on Game Theory With Optimized ROI Parameters and Hidden ROI Position. IEEE Access, 8, 122210-122228. https://doi.org/10.1109/ACCESS.2020.3007550

Y. Kim, B. Park and S. -Y. Kim.A Selective Encryption/Decryption Method of Sensitive Music Usage History Information on Theme, Background and Signal Music Blockchain Network. Journal of Web Engineering,21,1265-1282. https://doi.org/10.13052/jwe1540-9589.21411.

S. Ahmad, S. Rass and P. Schartner.(2023). False-Bottom Encryption: Deniable Encryption From Secret Sharing. IEEE Access,11, 62549-62564. https://doi.org/10.1109/ACCESS.2023.3288285

T. Li, B. Du and X. Liang.( 2020).Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz.IEEE Access, 8, 13792-13805. https://doi.org/10.1109/ACCESS.2020.2966264.

Downloads

ARTICLE Published HISTORY

Submitted Date: 2024-07-02
Accepted Date: 2024-07-02
Published Date: 2024-07-22

How to Cite

Siregar, M. ., Jinan, A. ., & Muhammad Raja Gunung, T. . (2024). Disguising Text Using Caesar Cipher, Reverse Cipher and Least Significant Bit (LSB) Algorithms in Video. Journal of Computer Networks, Architecture and High Performance Computing, 6(3), 1134-1144. https://doi.org/10.47709/cnahpc.v6i3.4217