Implementation of Least Significant Bit Steganography with Caesar Cipher Layout Dvorak web-based

Ridhwan Nadif Kurnia, Al Diras Pradiptha, Muhammad Fajar Jati Permana, Kimberly Alfa Dipradja, Rizki Afrizal, Deden Pradeka, Zahra Khaerunnisa

Abstract


Secure data communication is an essential requirement in the digital age, especially in the exchange of confidential information. One of the main problems is the potential for eavesdropping by unauthorised parties who can access open messages. To overcome this, this research aims to develop a website-based system that combines the Least Significant Bit (LSB) method steganography technique and the Caesar cipher method cryptography with the Dvorak keyboard layout to increase data security. The research method used is prototype method with the stages of concept formulation, prototype design, and continuous evaluation. The system was tested by inserting the word ‘TEKKOM’ into a digital image and measuring the quality using Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). The test results show an MSE value of 0.0001466049 and PSNR of 86.47 dB, which means that the visual quality of the image does not decrease significantly and the message is successfully inserted and extracted without errors. The Dvorak keyboard layout adds a layer of security through uncommon input patterns, making it difficult for outsiders to analyse. Thus, the system is able to provide a secure, efficient, and practical solution for web-based information hiding without the need for a database and is still user-friendly.

Keywords: Dvorak, Steganography, Caesar Cipher, Least Significant Bit, Website


Full Text:

PDF

References


A. R. Putri, “Image processing using a webcam on a moving vehicle on the highway,” JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika)., vol. 1, no. 1, pp. 1–6, 2016. [Online]. Available: https://doi.org/10.29100/jipi.v1i01.18.

S. Siaulhak, S. Kasma, and Suparman, “File delivery system using digital image processing steganography based on laboratory matrix,” Bandwidth: J. Inform. dan Rekayasa Komputer., vol. 1, no. 2, pp. 75–81, 2023. [Online]. Doi: https://doi.org/10.53769/bandwidth.v1i2.522

A. S. Joel, F. Abdussalaam, and Y. Yunengsih, “Medical record management based on information technology in handling patient data confidentiality and security using cryptographic methods,” J. Indones. Manajemen Inform. dan Komunikasi., vol. 4, no. 3, pp. 837–848, 2023. Doi: https://doi.org/10.35870/jimik.v4i3.287

S. D. Sari, “Privacy and data security in official statistics: challenges and solutions in protecting individual data,” Madani: J. Ilmiah Multidisiplin., vol. 1, no. 11, pp. 700–703, 2023. [Online]. Available: https://doi.org/10.5281/zenodo.10371661

A. L. Maryanto, M. N. Al Azam, and A. Nugroho, “Evaluation of information security management in technology-based startup companies using the KAMI Index.,” J. Simantec, vol. 11, no. 1, pp. 1–12, 2022. Doi: https://doi.org/10.21107/simantec.v11i1.14099

B. Anwar, N. B. Nugroho, J. Prayudha, and Azanuddin, “Implementation of the RSA algorithm for data security in savings and loan systems,” Sains dan Komputer (SAINTIKOM)., vol. 18, no. 1, pp. 30–34, 2019. [Online]. Available: https://doi.org/10.53513/jis.v18i1.100.

S. Magdy, S. Youssef, K. M. Fathalla, and S. ElShehaby, “DeepSteg: Integerating new paradigms of cascaded deep video steganography for securing digital data,” Alexandria Eng. J., vol. 116, pp. 483-501, 2025, doi: https://doi.org/10.1016/j.aej.2024.12.034.

L. F. Adhimah, I. Nurhafiyah, A. A. Muntahar, F. Kristiaji, and D. Mustofa, “Implementation of a web-based steganography application using the LSB and BPCS algorithms,” KOMPUTA: J. Ilmiah Komputer dan Informatika., vol. 12, no. 2, pp. 100–108, 2023. Doi: https://doi.org/10.34010/komputa.v12i2.10319

D. Pradeka, A. Adiwilaga, D. A. R. Agustini, A. Suheryadi, and R. Nuriman, “Design and build an assessment platform by inserting Moodle-based cryptographic methods,” TEKNOSI., vol. 9, no. 3, pp. 264–270, Jan. 2024. Doi: https://doi.org/10.25077/TEKNOSI.v9i3.2023.264-270

S. Solera-Cotanilla, M. Álvarez-Campana, C. Sánchez-Zas, and M. Vega-Barbas, “Proposal for a security and privacy enhancement system for private smart environments,” Internet of Things, vol. 31, p. 101585, 2025, doi: https://doi.org/10.1016/j.iot.2025.101585

I. U. W. Mulyono, Y. Kusumawati, and N. K. Ningrum, “Visual analysis of images resulting from the combination of steganography and cryptography based on the Least Significant Bit in cipher,” J. Masyarakat Informatika., vol. 14, no. 1, pp. 16–28, 2023. [Online]. Doi: https://doi.org/10.14710/jmasif.14.1.51484

A. Supardi, A. A. Alkodri, and B. Isnanto, “Steganography technique for hiding secret text messages in digital images using the Least Significant Bit method,” J. Sisfotek Global., vol. 11, no. 1, pp. 70–74, 2021. [Online]. Doi: https://doi.org/10.38101/sisfotek.v11i1.351

A. R. Mido and E. I. H. Ujianto, “Analysis of the impact of images on the combination of RSA cryptography and LSB steganography,” JTIIK., vol. 9, no. 2, pp. 279–286, 2022. Doi: http://dx.doi.org/10.25126/jtiik.201743299.

A. M. Ramadhani and T. Hassanuddin, “Modification of Least Significant Bits in images for data hiding in steganography,” IJODAS., vol. 2, no. 2, pp. 91–102, 2021. Doi: https://doi.org/10.25126/jtiik.201743299

A. Alenizi, M. S. Mohammadi, A. A. Al-Hajji, and A. S. Ansari, “A Review of Image Steganography Based on Multiple Hashing Algorithm,” Comput. Mater. Contin., vol. 80, no. 2, pp. 2463-2494, 2024, Doi: https://doi.org/10.32604/cmc.2024.051826.

Y. D. Cahyono, A. Suryanta, and I. P. Wardani, “Implementation of AJAX for a Dynamic Interface in a Website Builder with Hidden Message Embedding Capability,” JATI., vol. 9, no. 1, pp. 9–14, 2023. Doi: https://doi.org/10.36040/jati.v9i1.12129

G. M. Fahmi, K. N. Isanini, and D. Suhartono, “Image Steganography Implementation Using the Generative Adversarial Network (GAN) Algorithm,” SINTECH J., vol. 6, no. 1, pp. 47–57, 2023. Doi: https://doi.org/10.31598/sintechjournal.v6i1.1258

G. Zhao, Y. Huang, B. Jia, J. Ji, and P. Cheng, “A prototype low-pressure assisted microwave plasma ionization mass spectrometry for on-line monitoring of organic and inorganic hazardous compounds simultaneously: Design and feasibility validation,” Anal. Chim. Acta, vol. 1354, p. 344004, 2025, doi: https://doi.org/10.1016/j.aca.2025.344004

GeeksforGeeks, “Caesar cipher in cryptography,” GeeksforGeeks., [Online]. Available: https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/. [Accessed: 9-Jan-2025].

B. Purnama and A. H. H. Rohayani, “A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext From a Message to Be Encrypted,” Procedia Comput. Sci., vol. 59, pp. 195-204, 2015, Doi: https://doi.org/10.1016/j.procs.2015.07.552




DOI: https://doi.org/10.21107/simantec.v14i1.28794

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Ridhwan Nadif Kurnia, Muhammad Fajar Jati Permana, Al Diras Pradiptha, Rizki Afrizal, Kimberly Alfa Dipradja, Deden Pradeka, Zahra Khaerunnisa

laetoto

slot gacor

QQ188

slot gacor

Presidenslot

bonus new member

slot

batmantoto

slot gacor

slot gacor

slot gacor

slot olympus

slot demo

slot deposit 1000

slot gacor

slot88

rokokbet

slot88

slot gacor

rokokbet

slot resmi

rokokbet

https://sandiegohills.org/

Situs Toto

Situs Toto

Dana4d

Situs Toto

Pan4D

Toto 4d

slot777

https://lppm.stba-jia.ac.id/

slot88

https://ppki.stba-jia.ac.id/

https://pmb.iainkudus.id/

https://jim.iainkudus.id/

slot777

Situs Toto

Slot777

SITUS TOTO

PAN4D

PAN4D

Slot88

Toto 4d

situs toto

slot88

https://iboninternational.org/about-us

https://jurnalkommas.com/docs/Jurnal

https://www.wulaguda.com.au/gallery

slot thailand

bonus new member

togelin

situs toto

hokijp168

paris88

slot gacor

vegas123

situs slot

miya4d

slot gacor

mahjong ways 2

DPRBET

dollar4d

levis4d

buku mimpi

laetoto

Slot Gacor

slot pulsa

slot777

slot gacor gampang menang

Indexed By

slot

slot777

slot gacor maxwin

slot777

slot gacor

slot gacor

slot777

merahtoto

merahtoto

slot777

hijautoto

kuningtoto

game slot

kuningtoto slot

kuningtoto

link kuningtoto

birutoto

birutoto

slot gacor

ungutoto

link ungutoto

slot gacor

ungutoto

togel online 4d

tototogel

bandar togel

game online

slot gacor

situs gacor

merahtoto

kuningtoto

kuningtoto

merahtoto

hijautoto

hijautoto

hijautoto

hijautoto

birutoto

slot88

merahtoto

merahtoto

merona4d

merona4d

merona4d

merona4d

merona4d

merona4d

merona4d

merona4d

slot gacor maxwin

birutoto

birutoto

hijautoto

kuningtoto

slot777

slot88

scatter hitam

rokokbet

rokokbet

rokokbet

paito hk

raja togel

toto macau

https://global-jws.com/ojs/

situs toto

slot gacor

merahtoto

merona4d

Slot Gacor

merona4d

hijautoto

slot gacor

merahtoto

merona4d

merona4d

birutoto

situs togel

birutoto

slot88

merahtoto

merona4d

kuningtoto

hijautoto

birutoto

kuningtoto