Nearest Neighbor Interpolation and AES Encryption for Enhanced Least Significant Bit (LSB) Steganography


  • Nenny Anggraini * Mail Universitas Islam Negeri Syarif Hidayatullah, Jakarta, Indonesia
  • Luh Kesuma Wardhani Universitas Islam Negeri Syarif Hidayatullah, Jakarta, Indonesia
  • Muhammad Hudzaifah Assyahid Universitas Islam Negeri Syarif Hidayatullah, Jakarta, Indonesia
  • Nashrul Hakiem Universitas Islam Negeri Syarif Hidayatullah, Jakarta, Indonesia
  • Muhammad Yusuf Universitas Islam Negeri Syarif Hidayatullah, Jakarta, Indonesia
  • Okky Bagus Setyawan Universitas Islam Negeri Syarif Hidayatullah, Jakarta, Indonesia
  • (*) Corresponding Author
Keywords: AES; Steganography; LSB; Nearest Neighbor Interpolation; Encryption

Abstract

The increasing use of digital communication raises concerns about data security, especially when transmitting sensitive information. Steganography conceals messages within digital media to prevent detection. However, conventional methods face storage limitations, leading to message truncation or distortion, making hidden messages more detectable. This study proposes a combination of Nearest Neighbor Interpolation (NNI) and Least Significant Bit (LSB) steganography to dynamically expand the cover image, allowing larger encrypted messages to be embedded while maintaining image integrity. NNI was chosen over other interpolation techniques such as Bilinear and Bicubic due to its lower computational complexity and preservation of sharp edges, which minimizes blurring artifacts that could make steganographic alterations more noticeable. AES-128 encryption ensures message confidentiality before embedding. The system was developed as a web-based application to improve usability. The research followed the Waterfall Software Development Life Cycle (SDLC), and Black Box Testing validated system functionality. Testing results showed that the method successfully embedded and extracted messages without data loss, maintaining PSNR values above 40 dB, ensuring minimal perceptual distortion. However, the maximum interpolation limit was 5310 × 5310 pixels, beyond which system constraints caused failures. The stego-images retained original aspect ratios, reducing suspicion. Despite its success, the system remains vulnerable to modifications such as color changes, cropping, rotation, and compression, which can disrupt the message.

Downloads

Download data is not yet available.

References

N. Anggraini, S. H. Ramadhani, L. K. Wardhani, N. Hakiem, I. M. Shofi, and M. T. Rosyadi, “Development of Face Mask Detection using SSDLite MobilenetV3 Small on Raspberry Pi 4,” in 2022 5th International Conference of Computer and Informatics Engineering (IC2IE), IEEE, Sep. 2022, pp. 209–214. doi: 10.1109/IC2IE56416.2022.9970078.

E. P. Setiawan and I. Ismurjanti, “Penggunaan Internet sebagai sumber informasi dalam penyusunan karya ilmiah Siswa SMA Negeri 8 Yogyakarta,” Jurnal Kajian Informasi dan Perpustakaan, vol. 6, no. 2, Dec. 2018, doi: 10.24198/jkip.v6i2.18590.

R. Irawan, D. Wijaya, I. Prana, and I. K. Dewi, “Pelatihan Internet Sebagai Media Informasi dan Komunikasi Untuk Santri Pada Pondok Pesantren Daarul Hasanah Bogor,” Abditeknika Jurnal Pengabdian Masyarakat, vol. 1, no. 2, pp. 113–119, Oct. 2021, doi: 10.31294/abditeknika.v1i2.633.

I. Darmayanti, D. N. Astrida, and D. Ariyus, “Penerapan Keamanan Pesan Teks Menggunakan Modifikasi Algoritma Caisar Chiper Kedalam Bentuk Sandi Morse,” Jurnal Ilmiah IT CIDA, vol. 4, no. 1, Jul. 2019, doi: 10.55635/jic.v4i1.78.

R. N. Fuad, “PERANCANGAN APLIKASI PENYISIPAN PESAN MELALUI METODE MIXING (PARITY CODING DAN ENKRIPSI ADVANCED ENCRYPTION STANDARD/AES) PADA FILE MP3,” Jurnal TIMES, vol. 10, no. 2, pp. 12–21, Jan. 2022, doi: 10.51351/jtm.10.2.2021653.

E. R. Sardju, R. Magdalena, and R. D. Atmaja, “Implementasi Algoritma Rsa Untuk Enkripsi Dan Dekripsi Sms (short Message Service) Pada Ponsel Berbasis Android,” eProceedings of Engineering, vol. 2, no. 2, 2015, doi: 10.22441/fifo.v9i2.2566.

S. Ratna, “PENGOLAHAN CITRA DIGITAL DAN HISTOGRAM DENGAN PHYTON DAN TEXT EDITOR PHYCHARM,” Technologia: Jurnal Ilmiah, vol. 11, no. 3, p. 181, Jul. 2020, doi: 10.31602/tji.v11i3.3294.

B. Hardiansyah, A. P. Armin, and A. B. Yunanda, “REKONSTRUKSI CITRA PADA SUPER RESOLUSI MENGGUNAKAN INTERPOLASI BICUBIC,” INTEGER: Journal of Information Technology, vol. 4, no. 2, Oct. 2019, doi: 10.31284/j.integer.2019.v4i2.684.

S. Nur’aini, “Steganografi Pada Digital Image Menggunakan Metode Least Significant Bit Insertion,” Walisongo Journal of Information Technology, vol. 1, no. 1, p. 73, Nov. 2019, doi: 10.21580/wjit.2019.1.1.4025.

I. G. N. B. Pramana Putra, I. K. G. Suhartana, I. K. A. Mogi, C. R. A. Pramartha, I. P. G. H. Suputra, and I. G. A. Wibawa, “Penerapan Steganography Untuk Perlindungan Hak Cipta Menggunakan Metode Least Significant Bit (LSB),” JELIKU (Jurnal Elektronik Ilmu Komputer Udayana), vol. 10, no. 4, p. 329, Jun. 2022, doi: 10.24843/JLK.2022.v10.i04.p03.

S. Lutfi and R. Rosihan, “PERBANDINGAN METODE STEGANOGRAFI LSB (LEAST SIGNIFICANT BIT) DAN MSB (MOST SIGNIFICANT BIT) UNTUK MENYEMBUNYIKAN INFORMASI RAHASIA KEDALAM CITRA DIGITAL,” JIKO (Jurnal Informatika dan Komputer), vol. 1, no. 1, pp. 34–42, Apr. 2018, doi: 10.33387/jiko.v1i1.1169.

R. Herteno, W. Ramadansyah, O. Soesanto, R. A. Nugroho, and A. Rusadi, “Steganografi Untuk Pesan Terenkripsi Menggunakan Algoritma Kriptografi Rsa-Crt Di Android,” KLIK-KUMPULAN JURNAL ILMU KOMPUTER, vol. 6, no. 1, pp. 16–26, 2019, doi: dx.doi.org/10.20527/klik.v6i1.246.

M. N. Alenezi, H. Alabdulrazzaq, and N. Q. Mohammad, “Symmetric encryption algorithms: Review and evaluation study,” International Journal of Communication Networks and Information Security, vol. 12, no. 2, pp. 256–272, 2020, doi: doi.org/10.17762/ijcnis.v12i2.4698.

C.-L. Chen, Z.-Y. Lim, X. Xue, and C.-H. Chen, “Special Issue: Symmetric and Asymmetric Encryption in Blockchain,” Symmetry (Basel), vol. 15, no. 2, p. 458, Feb. 2023, doi: 10.3390/sym15020458.

T. D. A. P. Wardhani and Y. Asriningtias, “Implementasi Algoritma AES-256 Dalam Perancangan Aplikasi Pengamanan Dokumen Digital Perusahaan Berbasis Android,” INTECOMS: Journal of Information Technology and Computer Science, vol. 6, no. 2, pp. 1289–1293, Jan. 2024, doi: 10.31539/intecoms.v6i2.8027.

Uray Ristian, Jatrya, and Sampe Hotlan Sitorus, “PERBANDINGAN STEGANOGRAFI METODE LEAST SIGNIFICANT BIT+3 (LSB+3) DENGAN MOST SIGNIFICANT BIT (MSB),” Coding Jurnal Komputer dan Aplikasi, vol. 8, no. 1, Jan. 2020, doi: 10.26418/coding.v8i1.39195.

N. Sofian, A. Wicaksana, and S. Hansun, “LSB Steganography and AES Encryption for Multiple PDF Documents,” in 2019 5th International Conference on New Media Studies (CONMEDIA), IEEE, Oct. 2019, pp. 100–105. doi: 10.1109/CONMEDIA46929.2019.8981842.

M. K. Harahap and N. Khairina, “Dynamic Steganography Least Significant Bit with Stretch on Pixels Neighborhood,” Journal of Information Systems Engineering and Business Intelligence, vol. 6, no. 2, p. 151, Oct. 2020, doi: 10.20473/jisebi.6.2.151-158.

S. Pargaonkar, “A Comprehensive Research Analysis of Software Development Life Cycle (SDLC) Agile & Waterfall Model Advantages, Disadvantages, and Application Suitability in Software Quality Engineering,” International Journal of Scientific and Research Publications, vol. 13, no. 8, pp. 120–124, Aug. 2023, doi: 10.29322/IJSRP.13.08.2023.p14015.

R. Mokhtar and M. Khayyat, “A Comparative Case Study of Waterfall and Agile Management,” SAR Journal - Science and Research, pp. 52–62, Mar. 2022, doi: 10.18421/SAR51-07.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Nearest Neighbor Interpolation and AES Encryption for Enhanced Least Significant Bit (LSB) Steganography

Dimensions Badge
Article History
Submitted: 2025-03-01
Published: 2025-03-27
Abstract View: 213 times
PDF Download: 195 times
How to Cite
Anggraini, N., Wardhani, L., Assyahid, M., Hakiem, N., Yusuf, M., & Setyawan, O. (2025). Nearest Neighbor Interpolation and AES Encryption for Enhanced Least Significant Bit (LSB) Steganography. Building of Informatics, Technology and Science (BITS), 6(4), 2756-2765. https://doi.org/10.47065/bits.v6i4.7079
Issue
Section
Articles