Nearest Neighbor Interpolation and AES Encryption for Enhanced Least Significant Bit (LSB) Steganography
Abstract
The increasing use of digital communication raises concerns about data security, especially when transmitting sensitive information. Steganography conceals messages within digital media to prevent detection. However, conventional methods face storage limitations, leading to message truncation or distortion, making hidden messages more detectable. This study proposes a combination of Nearest Neighbor Interpolation (NNI) and Least Significant Bit (LSB) steganography to dynamically expand the cover image, allowing larger encrypted messages to be embedded while maintaining image integrity. NNI was chosen over other interpolation techniques such as Bilinear and Bicubic due to its lower computational complexity and preservation of sharp edges, which minimizes blurring artifacts that could make steganographic alterations more noticeable. AES-128 encryption ensures message confidentiality before embedding. The system was developed as a web-based application to improve usability. The research followed the Waterfall Software Development Life Cycle (SDLC), and Black Box Testing validated system functionality. Testing results showed that the method successfully embedded and extracted messages without data loss, maintaining PSNR values above 40 dB, ensuring minimal perceptual distortion. However, the maximum interpolation limit was 5310 × 5310 pixels, beyond which system constraints caused failures. The stego-images retained original aspect ratios, reducing suspicion. Despite its success, the system remains vulnerable to modifications such as color changes, cropping, rotation, and compression, which can disrupt the message.
Downloads
References
N. Anggraini, S. H. Ramadhani, L. K. Wardhani, N. Hakiem, I. M. Shofi, and M. T. Rosyadi, “Development of Face Mask Detection using SSDLite MobilenetV3 Small on Raspberry Pi 4,” in 2022 5th International Conference of Computer and Informatics Engineering (IC2IE), IEEE, Sep. 2022, pp. 209–214. doi: 10.1109/IC2IE56416.2022.9970078.
E. P. Setiawan and I. Ismurjanti, “Penggunaan Internet sebagai sumber informasi dalam penyusunan karya ilmiah Siswa SMA Negeri 8 Yogyakarta,” Jurnal Kajian Informasi dan Perpustakaan, vol. 6, no. 2, Dec. 2018, doi: 10.24198/jkip.v6i2.18590.
R. Irawan, D. Wijaya, I. Prana, and I. K. Dewi, “Pelatihan Internet Sebagai Media Informasi dan Komunikasi Untuk Santri Pada Pondok Pesantren Daarul Hasanah Bogor,” Abditeknika Jurnal Pengabdian Masyarakat, vol. 1, no. 2, pp. 113–119, Oct. 2021, doi: 10.31294/abditeknika.v1i2.633.
I. Darmayanti, D. N. Astrida, and D. Ariyus, “Penerapan Keamanan Pesan Teks Menggunakan Modifikasi Algoritma Caisar Chiper Kedalam Bentuk Sandi Morse,” Jurnal Ilmiah IT CIDA, vol. 4, no. 1, Jul. 2019, doi: 10.55635/jic.v4i1.78.
R. N. Fuad, “PERANCANGAN APLIKASI PENYISIPAN PESAN MELALUI METODE MIXING (PARITY CODING DAN ENKRIPSI ADVANCED ENCRYPTION STANDARD/AES) PADA FILE MP3,” Jurnal TIMES, vol. 10, no. 2, pp. 12–21, Jan. 2022, doi: 10.51351/jtm.10.2.2021653.
E. R. Sardju, R. Magdalena, and R. D. Atmaja, “Implementasi Algoritma Rsa Untuk Enkripsi Dan Dekripsi Sms (short Message Service) Pada Ponsel Berbasis Android,” eProceedings of Engineering, vol. 2, no. 2, 2015, doi: 10.22441/fifo.v9i2.2566.
S. Ratna, “PENGOLAHAN CITRA DIGITAL DAN HISTOGRAM DENGAN PHYTON DAN TEXT EDITOR PHYCHARM,” Technologia: Jurnal Ilmiah, vol. 11, no. 3, p. 181, Jul. 2020, doi: 10.31602/tji.v11i3.3294.
B. Hardiansyah, A. P. Armin, and A. B. Yunanda, “REKONSTRUKSI CITRA PADA SUPER RESOLUSI MENGGUNAKAN INTERPOLASI BICUBIC,” INTEGER: Journal of Information Technology, vol. 4, no. 2, Oct. 2019, doi: 10.31284/j.integer.2019.v4i2.684.
S. Nur’aini, “Steganografi Pada Digital Image Menggunakan Metode Least Significant Bit Insertion,” Walisongo Journal of Information Technology, vol. 1, no. 1, p. 73, Nov. 2019, doi: 10.21580/wjit.2019.1.1.4025.
I. G. N. B. Pramana Putra, I. K. G. Suhartana, I. K. A. Mogi, C. R. A. Pramartha, I. P. G. H. Suputra, and I. G. A. Wibawa, “Penerapan Steganography Untuk Perlindungan Hak Cipta Menggunakan Metode Least Significant Bit (LSB),” JELIKU (Jurnal Elektronik Ilmu Komputer Udayana), vol. 10, no. 4, p. 329, Jun. 2022, doi: 10.24843/JLK.2022.v10.i04.p03.
S. Lutfi and R. Rosihan, “PERBANDINGAN METODE STEGANOGRAFI LSB (LEAST SIGNIFICANT BIT) DAN MSB (MOST SIGNIFICANT BIT) UNTUK MENYEMBUNYIKAN INFORMASI RAHASIA KEDALAM CITRA DIGITAL,” JIKO (Jurnal Informatika dan Komputer), vol. 1, no. 1, pp. 34–42, Apr. 2018, doi: 10.33387/jiko.v1i1.1169.
R. Herteno, W. Ramadansyah, O. Soesanto, R. A. Nugroho, and A. Rusadi, “Steganografi Untuk Pesan Terenkripsi Menggunakan Algoritma Kriptografi Rsa-Crt Di Android,” KLIK-KUMPULAN JURNAL ILMU KOMPUTER, vol. 6, no. 1, pp. 16–26, 2019, doi: dx.doi.org/10.20527/klik.v6i1.246.
M. N. Alenezi, H. Alabdulrazzaq, and N. Q. Mohammad, “Symmetric encryption algorithms: Review and evaluation study,” International Journal of Communication Networks and Information Security, vol. 12, no. 2, pp. 256–272, 2020, doi: doi.org/10.17762/ijcnis.v12i2.4698.
C.-L. Chen, Z.-Y. Lim, X. Xue, and C.-H. Chen, “Special Issue: Symmetric and Asymmetric Encryption in Blockchain,” Symmetry (Basel), vol. 15, no. 2, p. 458, Feb. 2023, doi: 10.3390/sym15020458.
T. D. A. P. Wardhani and Y. Asriningtias, “Implementasi Algoritma AES-256 Dalam Perancangan Aplikasi Pengamanan Dokumen Digital Perusahaan Berbasis Android,” INTECOMS: Journal of Information Technology and Computer Science, vol. 6, no. 2, pp. 1289–1293, Jan. 2024, doi: 10.31539/intecoms.v6i2.8027.
Uray Ristian, Jatrya, and Sampe Hotlan Sitorus, “PERBANDINGAN STEGANOGRAFI METODE LEAST SIGNIFICANT BIT+3 (LSB+3) DENGAN MOST SIGNIFICANT BIT (MSB),” Coding Jurnal Komputer dan Aplikasi, vol. 8, no. 1, Jan. 2020, doi: 10.26418/coding.v8i1.39195.
N. Sofian, A. Wicaksana, and S. Hansun, “LSB Steganography and AES Encryption for Multiple PDF Documents,” in 2019 5th International Conference on New Media Studies (CONMEDIA), IEEE, Oct. 2019, pp. 100–105. doi: 10.1109/CONMEDIA46929.2019.8981842.
M. K. Harahap and N. Khairina, “Dynamic Steganography Least Significant Bit with Stretch on Pixels Neighborhood,” Journal of Information Systems Engineering and Business Intelligence, vol. 6, no. 2, p. 151, Oct. 2020, doi: 10.20473/jisebi.6.2.151-158.
S. Pargaonkar, “A Comprehensive Research Analysis of Software Development Life Cycle (SDLC) Agile & Waterfall Model Advantages, Disadvantages, and Application Suitability in Software Quality Engineering,” International Journal of Scientific and Research Publications, vol. 13, no. 8, pp. 120–124, Aug. 2023, doi: 10.29322/IJSRP.13.08.2023.p14015.
R. Mokhtar and M. Khayyat, “A Comparative Case Study of Waterfall and Agile Management,” SAR Journal - Science and Research, pp. 52–62, Mar. 2022, doi: 10.18421/SAR51-07.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Nearest Neighbor Interpolation and AES Encryption for Enhanced Least Significant Bit (LSB) Steganography
Pages: 2756-2765
Copyright (c) 2025 Nenny Anggraini, Luh Kesuma Wardhani, Muhammad Hudzaifah Assyahid, Nashrul Hakiem, Muhammad Yusuf, Okky Bagus Setyawan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).