Facial image protection with visual cryptography and random least significant bit (LSB) steganography
DOI:
https://doi.org/10.35335/mandiri.v13i4.392Keywords:
Cryptography, Photographs, PSNR, Random LSB, SteganographyAbstract
The confidentiality of sensitive data—such as personal information of individuals who may pose security threats to client assets—must be strictly maintained. This data includes personal details such as name, ID number, address, date of birth, occupation, and photographs (images). The data protection process involves combining textual data (ID number, name, date of birth) with a photo into a single image, which is then processed using visual cryptography. The visual cryptography technique applied is the (k, n) scheme with a 2-out-of-k configuration. To enhance data security and confidentiality through dual-layer protection, the output from the visual cryptography process is further secured using steganography with the random LSB (Least Significant Bit) method, applied to one of the shares obtained from the previous step. The best result achieved during testing was a PSNR of 71.9977 and an MSE of 0.0041. It is expected that the combination of visual cryptography and steganography methods will significantly enhance the security of data storage to protecting it from unauthorized access.
References
Al Ghifary Sujono, S., Marwati, R., Kustiawan Program Studi Matematika, C., & Pendidikan dan Ilmu Pengetahuan Alam, F. (2024). Pengamanan Citra Grayscale menggunakan Penggabungan Kriptografi Visual Secret Sharing dan Steganografi Enhanced Least Significant Bit. Jurnal EurekaMatika, 12(2), 67–78. https://doi.org/10.17509/JEM.V12I2.72580
Al Najjar, Y. (2024). Comparative Analysis of Image Quality Assessment Metrics: MSE, PSNR, SSIM and FSIM. International Journal of Science and Research (IJSR), 13(3), 110–114. https://doi.org/10.21275/sr24302013533
Aszalós, L. (2021). Decompose boolean matrices with correlation clustering. Entropy, 23(7), 1–12. https://doi.org/10.3390/e23070852
Bhawna, B., & Malik, S. K. (2023). Triple Layered Security for Data Hiding Using Steganography and Visual Cryptography. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10s), 335–345. https://doi.org/10.17762/IJRITCC.V11I10S.7634
Biswal, M., Shao, T., Rose, K., Yin, P., & Mccarthy, S. (2024). StegaNeRV: Video Steganography using Implicit Neural Representation (pp. 888–898).
Dutta, A., & Zisserman, A. (2019). The VIA annotation software for images, audio and video. MM 2019 - Proceedings of the 27th ACM International Conference on Multimedia, 2276–2279. https://doi.org/10.1145/3343031.3350535
Ediriweera, S., Dilhara, B., & Disanayake, C. (2023). Web-Based Data Hiding: A Hybrid Approach Using Steganography and Visual Cryptography. Proceedings - International Research Conference on Smart Computing and Systems Engineering, SCSE 2023, 6(October 2024), 1–7. https://doi.org/10.1109/SCSE59836.2023.10214994
Ehsan Ali, U. A. M., Ali, E., Sohrawordi, M., & Sultan, M. N. (2021). A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload. International Journal of Mathematical Sciences and Computing, 7(3), 24–31. https://doi.org/10.5815/ijmsc.2021.03.03
Elmurod, A., Ogli, T., Элмурод, А., & Угли, Т. (2021). RASTER AND VECTOR FORMATS OF ELECTRONIC DOCUMENT OF TECHNICAL DOCUMENTATION. Universum: Технические Науки, 7-3 (88). https://doi.org/10.32743/UniTech.2021.78.8-3.12088
Eze, P., Parampalli, U., Evans, R., & Liu, D. (2019). Integrity verification in medical image retrieval systems using spread spectrum steganography. ICMR 2019 - Proceedings of the 2019 ACM International Conference on Multimedia Retrieval, 29, 53–57. https://doi.org/10.1145/3323873.3325020
Francis, N., & Monoth, T. (2023). Security enhanced random grid visual cryptography scheme using master share and embedding method. International Journal of Information Technology (Singapore), 15(7), 3949–3955. https://doi.org/10.1007/S41870-023-01381-W/METRICS
Georgi, P., Wei, Q., Sain, B., Schlickriede, C., Wang, Y., Huang, L., & Zentgraf, T. (2021). Optical secret sharing with cascaded metasurface holography. Science Advances, 7(16), 9718–9732. https://doi.org/10.1126/SCIADV.ABF9718/SUPPL_FILE/ABF9718_SM.PDF
Hasugian, P. S. H., & Simangunsong, A. (2020). Implementation Of Least Significant Bit (LSB) Algorithm For Data Security In Digital Imagery. Jurnal Info Sains : Informatika Dan Sains, 10(2), 6–12. https://doi.org/10.54209/INFOSAINS.V10I2.31
Hu, O. R. T., Zuffo, M. K., Kurashima, C. S., & Lopes, R. de D. (2007). Panoramic Images Composition with Positioning Maps for Virtual Telepresence. 2007 IX Symposium on Virtual and Augmented Reality, March 2014.
Jena, D., & Jena, S. K. (2009). A novel visual cryptography scheme. Proceedings - International Conference on Advanced Computer Control, ICACC 2009, January 2009, 207–211. https://doi.org/10.1109/ICACC.2009.109
Kumar, M., Aggarwal, J., Rani, A., Stephan, T., Shankar, A., & Mirjalili, S. (2022). Secure video communication using firefly optimization and visual cryptography. Artificial Intelligence Review, 55(4), 2997–3017.
Mahdi, M. H., Abdulrazzaq, A. A., Mohd Rahim, M. S., Taha, M. S., Khalid, H. N., & Lafta, S. A. (2019). Improvement of Image Steganography Scheme Based on LSB Value with Two Control Random Parameters and Multi-level Encryption. IOP Conference Series: Materials Science and Engineering, 518(5). https://doi.org/10.1088/1757-899X/518/5/052002
Pandey, B. K., Pandey, D., Wairya, S., Agarwal, G., Dadeech, P., Dogiwal, S. R., & Pramanik, S. (2022). Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission. Cyber Security and Network Security, 169–191. https://doi.org/10.1002/9781119812555.CH8
Ryden, T., Van Essen, M., Marin, I., Svensson, J., & Bernhardt, P. (2021). Deep-Learning Generation of Synthetic Intermediate Projections Improves 177Lu SPECT Images Reconstructed with Sparsely Acquired Projections. Journal of Nuclear Medicine, 62(4), 528–535. https://doi.org/10.2967/JNUMED.120.245548
Şahin, F., Çevik, T., & Takaoğlu, M. (2021). Review of the Literature on the Steganography Concept. International Journal of Computer Applications, 183(2), 38–46. https://doi.org/10.5120/ijca2021921298
Sansone, E. (2022). LSB: Local Self-Balancing MCMC in Discrete Spaces. Proceedings of Machine Learning Research, 162, 19205–19220.
Sara, U., Akter, M., Uddin, M. S., Sara, U., Akter, M., & Uddin, M. S. (2019). Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study. Journal of Computer and Communications, 7(3), 8–18. https://doi.org/10.4236/JCC.2019.73002
Sharma, K., Aggarwal, A., Singhania, T., Gupta, D., & Khanna, A. (2019). Hiding Data in Images Using Cryptography and Deep Neural Network. Journal of Artificial Intelligence and Systems, 1(1), 143–162. https://doi.org/10.33969/AIS.2019.11009
Vanitha, M., & Mangayarkarasi, R. (2020). Comparative Study of Different Cryptographic Algorithms. Journal of Information Security, 11(3), 138–148. https://doi.org/10.4236/JIS.2020.113009
Wu, X., & Yao, P. (2023). Boolean-based Two-in-One Secret Image Sharing by Adaptive Pixel Grouping. ACM Transactions on Multimedia Computing, Communications and Applications, 19(1). https://doi.org/10.1145/3517140/ASSET/CCD9168E-86EC-4FB3-B4D8-AF7DD618E7E8/ASSETS/GRAPHIC/TOMM-2021-0149-F10.JPG
Yu, J., Zhang, X., Xu, Y., & Zhang, J. (2023). CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography. Advances in Neural Information Processing Systems, 36. https://arxiv.org/abs/2305.16936v1
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Panser Karo Karo, Simon Simarmata , Novianti Madhona Faizah, Luky Fabrianto

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.