IMPLEMENTASI HILL CHIPER DAN STEGANOGRAFI GAMBAR BERBASIS WEB
DOI:
https://doi.org/10.62671/jikum.v2i2.208Keywords:
Hill chiper, steganography, LSB, Data Security, WebAbstract
Information security is an important requirement in digital communications, especially in webbased systems that are vulnerable to interception. This study aims to implement the Hill Cipher algorithm and image steganography as methods of securing web-based messages. The Hill Cipher is used to encrypt text messages, while the Least Significant Bit (LSB) method is applied to insert encrypted messages into digital images. The research methodology includes the stages of encryption, message insertion, extraction, and decryption. The test results show that messages are successfully encrypted and inserted into images without causing significant visual changes. This system enhances message security because messages are not only encrypted but also hidden. Thus, the combination of Hill Cipher and image steganography is effective as a web-based data security solution.
References
A. K. Mandal and S. Banerjee, “A Review on the Integration of Cryptography and Steganography for Enhanced Infor-mation Security,” International Journal of Scientific Research in Mathematical and Statistical Sciences (IJSRMS), vol. 12, no. 1, pp. 1–7, 2025.
M. K. Jha, R. Kumar, and P. Singh, “A Comprehensive Overview of Digital Image Steganography for Secure Commu-nication,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 2, pp. 45–55, 2025.
R. K. Sharma and A. Verma, “Implementation of Image Steganography Using Least Significant Bit (LSB) Method,” International Journal of Computer Applications, vol. 179, no. 25, pp. 6–10, 2024.
S. N. Huda, A. Fauzan, and R. Pratama, “Analysis of Hill Cipher Algorithm for Text Encryption,” Jurnal Informatika dan Sistem Informasi, vol. 10, no. 2, pp. 112–119, 2024.
D. P. Sari and M. A. Nugroho, “Web-Based Secure Communication Using Cryptography and Image Steganography,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 11, no. 1, pp. 33–41, 2025.
A. Rahman, I. Maulana, and F. Hidayat, “Evaluation of Steganography Image Quality Using LSB Method,” Jurnal RESTI, vol. 9, no. 3, pp. 487–494, 2025.
P. K. Das and S. Mukherjee, “Performance Analysis of Classical Cryptographic Algorithms for Data Security,” Interna-tional Journal of Computer Science and Network Security, vol. 24, no. 4, pp. 98–104, 2024.



