Implementation and Performance Analysis of PVD Method in Concealing Encrypted Data on Images
pdf

Keywords

cryptography
LSB
steganography
XOR
vigenère cipher

How to Cite

Hanif, A. ., Astuti, N. R. D. P., & Aribowo, E. . (2025). Implementation and Performance Analysis of PVD Method in Concealing Encrypted Data on Images. IJID (International Journal on Informatics for Development), 14(1), 559–574. Retrieved from https://ejournal.uin-suka.ac.id/saintek/ijid/article/view/4984

Abstract

This research aims to secure text data by combining steganography and cryptography. The Pixel Value Differencing (PVD) method allows for higher data insertion capacity with minimal distortion, thereby increasing resistance to steganalysis. However, the PVD steganography method is vulnerable to variation in image areas and to the accuracy of Pixel Difference Histogram (PDH) analysis. In addition, this method is susceptible to statistical tools such as the chi-square and RS, which can be used to analyze the distribution of pixel value differences, allowing data to be detected. To address the limitations of the PVD method, we employed a cryptographic technique called XOR-VLSB, which combines XOR as the primary encryption method, Vigenère Cipher for key generation, and Least Significant Bit (LSB) for key embedding. The results showed that the fully encrypted data could be recovered and had good image quality, as indicated by the metric results, which included a low MSE value, a PSNR above 35 dB, and an SSIM value close to 1. In this study, the process of encrypting text data still uses a simple encryption algorithm, namely XOR. Future research may involve replacing cryptographic algorithms with AES, which offers stronger protection and better resistance to advanced security threats.

pdf

References

A. Nikiforova, “Data Security as a Top Priority in the Digital World: Preserve Data Value by Being Proactive and Thinking Security First,” Springer Proceedings in Complexity, pp. 3–15, 2023, doi: 10.1007/978-3-031-19560-0_1.

N. Pamungkas, B. V. Indriyono, and I. Setiarso, “Concept of Data Security in Digital Image Media Using Spread Spectrum Steganography and Playfair Cipher Cryptography,” Explore: Jurnal Sistem Informasi dan Telematika, vol. 15, no. 1, p. 79, 2024, doi: 10.36448/jsit.v15i1.3517.

V. Himthani, V. S. Dhaka, M. Kaur, G. Rani, M. Oza, and H. N. Lee, “Comparative performance assessment of deep learning based image steganography techniques,” Sci Rep, vol. 12, no. 1, pp. 1–16, 2022, doi: 10.1038/s41598-022-17362-1.

C. A. Buckner et al., “We are IntechOpen , the world ’ s leading publisher of Open Access books Built by scientists , for scientists TOP 1 %,” Intech, vol. 11, no. tourism, p. 13, 2016.

S. Ghoul, R. Sulaiman, and Z. Shukur, “A Review on Security Techniques in Image Steganography,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 6, pp. 361–385, 2023, doi: 10.14569/IJACSA.2023.0140640.

A. Gustiawan, J. Wahyudi, and E. Suryana, “Perancangan Aplikasi Steganografi Pada Citra Digital Menggunakan Metode Pixel Value Differencing,” JUKI: Jurnal Komputer dan Infromatika, vol. 5, pp. 151–163, 2023.

D. C. Wu, Z. N. Shih, and J. H. Wu, “Modified Multiway Pixel-Value Differencing Methods Based on General Quantization Ranges for Image Steganography,” IEEE Access, vol. 10, pp. 8824–8839, 2022, doi: 10.1109/ACCESS.2021.3138895.

T. Cevik, N. Cevik, J. Rasheed, T. Asuroglu, S. Alsubai, and M. Turan, “Reversible Logic-Based Hexel Value Differencing - A Spatial Domain Steganography Method for Hexagonal Image Processing,” IEEE Access, vol. 11, no. October, pp. 118186–118203, 2023, doi: 10.1109/ACCESS.2023.3326857.

C. T. Huang, N. S. Shongwe, and C. Y. Weng, “Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology,” Electronics (Switzerland), vol. 12, no. 5, 2023, doi: 10.3390/electronics12051200.

M. Sahu, N. Padhy, and S. S. Gantayat, “Multi-directional PVD steganography avoiding PDH and boundary issue,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 10, pp. 8838–8851, 2022, doi: 10.1016/j.jksuci.2021.10.007.

R. Yadav, “Analysis of Cryptography in Information Technology,” Interantional Journal of Scientific Research in Engineering and Management, vol. 07, no. 03, pp. 1–6, 2023, doi: 10.55041/ijsrem18379.

A. Ihsan and N. Doğan, “Improved affine encryption algorithm for color images using LFSR and XOR encryption,” Multimed Tools Appl, vol. 82, no. 5, pp. 7621–7637, 2023, doi: 10.1007/s11042-022-13727-w.

L. Ludyawati, M. Khudzaifah, and E. Herawati, “Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia,” Jurnal Riset Mahasiswa Matematika, vol. 2, no. 6, pp. 247–256, 2023, doi: 10.18860/jrmm.v2i6.22041.

Purwanti, S. D. Nurcahya, and D. Nazelliana, “Message Security in Classical Cryptography Using the Vigenere Cipher Method,” International Journal Software Engineering and Computer Science (IJSECS), vol. 4, no. 1, pp. 350–357, 2024, doi: 10.35870/ijsecs.v4i1.2263.

I. Riadi, A. Fadlil, and F. A. Tsani, “Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512,” Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, vol. 13, no. 2, p. 84, 2022, doi: 10.24843/lkjiti.2022.v13.i02.p02.

K. Khairani and M. Z. Siambaton, “Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker,” sudo Jurnal Teknik Informatika, vol. 2, no. 4, pp. 176–187, 2023, doi: 10.56211/sudo.v2i4.401.

S. Alam, N. Shukla, K. Asifuzzaman, and A. Aziz, “CMOS-based Single-Cycle In-Memory XOR / XNOR,” pp. 1–12.

M. I. Harahap, S. Suherman, and R. W. Sembiring, “Three Pass Protocol for Key Security Using Affine Cipher Algortima and Exclusive-or (Xor) Combination,” Sinkron, vol. 8, no. 4, pp. 2602–2614, 2023, doi: 10.33395/sinkron.v8i4.13051.

S. Camtepe et al., “ANS-based compression and encryption with 128-bit security,” Int J Inf Secur, vol. 21, no. 5, pp. 1051–1067, 2022, doi: 10.1007/s10207-022-00597-4.

D. P. Sabaya, A. A. Semlambo, and J. K. Simon, “Data Security Through Crypto-Stegano Systems,” International Journal of Computational Science, Information Technology and Control Engineering, vol. 10, no. 1/2/3, pp. 1–23, 2023, doi: 10.5121/ijcsitce.2023.10301.

S. E. Naffouti, A. Kricha, and A. Sakly, “A sophisticated and provably grayscale image watermarking system using DWT-SVD domain,” Visual Computer, vol. 39, no. 9, pp. 4227–4247, 2023, doi: 10.1007/s00371-022-02587-y.

E. Fragoso-Navarro, F. Garcia-Ugalde, and M. Cedillo-Hernandez, “Protecting the Distribution of Color Images via Inverse Colorization, Visible-Imperceptible Watermarking and Reversible Data Hiding,” IEEE Access, vol. 11, pp. 61025–61048, 2023, doi: 10.1109/ACCESS.2023.3286865.

G. Miftakhul Fahmi, K. N. Isnaini, and D. Suhartono, “Implementation of Steganography on Digital Image With Modified Vigenere Cipher Algorithm and Least Significant Bit (Lsb) Method,” Jurnal Teknik Informatika (Jutif), vol. 4, no. 2, pp. 333–344, 2023, doi: 10.52436/1.jutif.2023.4.2.340.

R. I. Adam, M. Garno, and M. Roba’i, “Interpolasi Dalam Proses Penyisipan Pesan Dengan Metode Pixel Value Differencing (Pvd),” JIKO (Jurnal Informatika dan Komputer), vol. 6, no. 2, p. 148, 2022, doi: 10.26798/jiko.v6i2.275.

Patrisius Batarius, Alfry Aristo Sinlae, and Elisabeth F. Fahik, “Analysis of the Quality of Natural Dyes in Weaving Exposed to Sunlight Using MSE and PSNR Parameters,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 6, no. 5, pp. 797–802, 2022, doi: 10.29207/resti.v6i5.4339.

I. M. A., M. M. B., A. A. E., and S. B. O, “An Extensive Survey of Digital Image Steganography: State of the Art,” Journal of Science Technology and Education, vol. 8, no. 2, pp. 40–54, 2024.

H. Caballero, V. Muñoz, and M. A. Ramos-Corchado, “A comparative study of steganography using watermarking and modifications pixels versus least significant bit,” International Journal of Electrical and Computer Engineering, vol. 13, no. 6, pp. 6335–6350, 2023, doi: 10.11591/ijece.v13i6.pp6335-6350.

R. F. Faizal, “Steganografi Pengukuran Akurasi Dan Kualitas File Multimedia Menggunakan Algoritma Low Bit Coding,” Technologia : Jurnal Ilmiah, vol. 15, no. 3, p. 361, 2024, doi: 10.31602/tji.v15i3.14844.

A. P. Purnacandra and S. Subektiningsih, “Anti-Forensics with Steganographic File Embedding in Digital Image Using Genetic Algorithm,” Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, vol. 8, no. 2, p. 326, 2022, doi: 10.26555/jiteki.v8i2.24208.

M. S. Abuali, C. B. M. Rashidi, R. A. A. Raof, K. N. F. K. Azir, S. S. Hussein, and A. Q. Abd-Alhasan, “Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach,” Mathematical Modelling of Engineering Problems, vol. 11, no. 6, pp. 1403–1416, 2024, doi: 10.18280/mmep.110602.

S. Rahman et al., “Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats,” Sustainability (Switzerland), vol. 15, no. 5, 2023, doi: 10.3390/su15054252.

X. Xue et al., “Modelling and Analysis of Hybrid Transformation for Lossless Big Medical Image Compression,” Bioengineering, vol. 10, no. 3, 2023, doi: 10.3390/bioengineering10030333.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.