PENERAPAN STEGANOGRAFI LSB DAN KRIPTOGRAFI AES-256 DALAM KEAMANAN FILE GAMBAR

Authors

  • Suhada S. Yunus STIKOM UYELINDO Kupang
  • Yohanes Suban Belutowe STIKOM UYELINDO Kupang
  • Benyamin Jago Belalawe suhadayunus4@gmail.com

DOI:

https://doi.org/10.55606/jupumi.v5i2.6743

Keywords:

AES-256, Cryptography, Data Security, LSB, Steganography.

Abstract

Digital data security has become a crucial aspect in an era where information exchange is increasingly open, especially within government institutions that handle sensitive internal documents and messages. In the context of the Military Court III-15 Kupang, a security mechanism is required to ensure the confidentiality and integrity of messages during internal data transmission. This study applies a combination of the Least Significant Bit (LSB) steganography method and the Advanced Encryption Standard 256-bit (AES-256) cryptographic algorithm to enhance the security of text messages. The text message is first encrypted using AES-256 to generate ciphertext, which is then embedded into a Portable Network Graphics (PNG) image by manipulating the least significant bits of its pixels using the LSB method. The result of this research is a web-based application implementing LSB steganography and AES-256 cryptography for securing image files, specifically designed to support the internal information security needs of the Military Court III-15 Kupang. The combination of both methods provides a dual-layer security mechanism, ensuring that the hidden message remains protected even if the image file is transferred or accessed by unauthorized parties.

References

Festi, S., Jaya, B., Kuway, S. M., & Syarifudin, G. (2020). Perancangan Perangkat Lunak Steganografi Menggunakan Least Significant Bit Dengan Enkripsi Vigenere Cipher. E-Jurnal JUSITI (Jurnal Sistem Informasi Dan Teknologi Informasi), 9(1), 52–64.

https://ejurnal.undipa.ac.id/index.php/jusiti/article/view/643/559

Firdaus, M. A., & Rahmatulloh, A. (2025). Implementasi Steganografi Citra Digital Lsb Menggunakan Enkripsi Aes-256 Dan Embedding Pseudorandom. Jurnal Informatika Dan Teknik Elektro Terapan, 13(1).

https://journal.eng.unila.ac.id/index.php/jitet/article/view/5620/2268

Halim, M., & Wulan Sri Lestari. (2023). Steganography Menggunakan Advanced Encryption Standard dan Metode Least Significant Bit pada File Bitmap 24-bit. Jurnal Armada Informatika, 7(2), 295–300.

https://jurnal.stmikmethodistbinjai.ac.id/jai/article/view/76/74

Islami, L., Akbar, H. P., & Rizal, R. G. (2024). Sistem Keamanan Informasi Di Era Digital. 1(11),1174–1177. https://jurnalmahasiswa.com/index.php/jriin/article/view/1150/735

Kurniawan, M. I., Maryanto, E., & Rahayu, S. P. (2024). Implementation of a Combination of Advanced Encryption Standard Cryptography With Subbytes Modification and Steganography Based on a Website. Jurnal Teknik Informatika (Jutif), 5(5), 1375–1384. https://jutif.if.unsoed.ac.id/index.php/jurnal/article/view/2665/654

Mulyono, I. U. W., Kusumawati, Y., & Ningrum, N. K. (2023). Analisa Visual Citra Hasil Kombinasi Steganografi dan Kriptografi Berbasis Least Significant Bit Dalam Cipher. Jurnal Masyarakat Informatika, 14(1), 16–28. https://ejournal.undip.ac.id/index.php/jmasif/article/view/51484/23965

R.M. Hilmy Hernandi, & Joko Christian Chandra. (2024). Implementasi Algoritme AES-256 dan AES-GCM untuk Mengamankan Dokumen Pada Sistem Data Rekam Medis Klinik Mulya. KRESNA: Jurnal Riset Dan Pengabdian Masyarakat, 4(1), 12–22.

https://jurnaldrpm.budiluhur.ac.id/index.php/Kresna/article/view/131/138

Wisnu, A., Prasetya, Y., Suhardjo, B., & Munir, R. (2023). Penggunaan Kombinasi Kriptografi Triple DES dan Teknik Steganografi LSB dalam Mengamankan Pesan Militer. Jurnal SISTEM INFORMASI Dan TEKNOLOGI INFORMASI, 12(2), 193–199.

https://ejurnal.undipa.ac.id/index.php/jusiti/article/view/1431/1066

Downloads

Published

2026-04-07

How to Cite

Suhada S. Yunus, Yohanes Suban Belutowe, & Benyamin Jago Belalawe. (2026). PENERAPAN STEGANOGRAFI LSB DAN KRIPTOGRAFI AES-256 DALAM KEAMANAN FILE GAMBAR. Jurnal Publikasi Manajemen Informatika, 5(2), 104–119. https://doi.org/10.55606/jupumi.v5i2.6743