Digital Data Security: Integration of RSA and Pseudo-Random Prime Number Generator in Steganography Engineering
DOI:
https://doi.org/10.32628/IJSRST251245Keywords:
Steganography, RSA Algorithm, Pseudo-Random Prime Number Generator, Data Security, Digital Image EncryptionAbstract
The increasing reliance on digital data exchange has raised critical concerns regarding information security and confidentiality. This research proposes a secure data hiding technique by integrating the RSA algorithm and a Pseudo-Random Prime Number Generator (PRPNG) into steganography. The objective is to enhance both the encryption efficiency and the robustness of hidden data. The method involves converting secret messages into numeric form limited to digits 0-9 to optimize the Least Significant Bit (LSB) substitution process within digital images. The encryption utilizes asymmetric RSA keys generated from dynamically selected pseudo-random prime numbers, which adds a layer of complexity and security. The experiment compared conventional and optimized steganographic approaches by measuring encryption-decryption time and the imperceptibility of the modified images. Results indicate that the optimized steganography method significantly reduces encryption time while embedding a greater amount of data without affecting visual quality. Moreover, the decryption process, while slightly slower, benefits from enhanced security due to the requirement of specific private keys, correct prime pair identification, and precise padding. This integration proves to be a viable and secure approach for embedding sensitive data in digital images, contributing to improved digital data protection in various applications, especially those requiring confidentiality, such as secure communications and digital watermarking.
Downloads
References
A. M. A. Saputra, L. P. I. Kharisma, A. A. Rizal, M. I. Burhan, and N. W. Purnawati, TEKNOLOGI INFORMASI: Peranan TI dalam berbagai bidang. PT. Sonpedia Publishing Indonesia, 2023.
I. W. Redhana, Literasi Digital: Pedoman Menghadapi Society 5.0. Samudra Biru, 2024.
V. Kumalasari, “Etika Profesi, Dalam Bidang Teknologi Informasi,” Penerbit Yayasan Prima Agus Tek., pp. 1–75, 2021.
D. Darwis, W. Wamiliana, and A. Junaidi, “Proses Pengamanan Data Menggunakan Kombinasi Metode Kriptografi Data Encryption Standard dan Steganografi End Of File,” in Prosiding Seminar Nasional METODE KUANTITATIF, 2017.
H. Putri, L. Virna, T. Febrianti, and T. Sutabri, “Pengamanan Data Transmisi Aplikasi Web Menggunakan Algoritma Kriptografi RSA: Studi Kasus dan Analisis,” J. Manaj. Inform. Teknol., vol. 5, no. 1, pp. 153–170, 2025.
N. B. N. Putra, F. A. Raihana, W. M. A. Mondong, and A. R. Kardian, “Analisis Enkripsi Kriptografi Asimetris Algoritma RSA Berbasis Pemrograman Batch pada Media Flashdisk,” Jurasik (Jurnal Ris. Sist. Inf. dan Tek. Inform., vol. 8, no. 1, pp. 142–154, 2023.
N. A. Fauzi, “Analisis Pengembangan Aplikasi Menggunakan Algoritma RSA dan El-Gamal Pada Teknik Steganografi Dengan Metode Least Significant Bit (LSB),” eProceedings Eng., vol. 12, no. 2, pp. 1–12, 2025.
A. Siahaan, “High Complexity Bit-Plane Security Enchancement in BPCS Steganography,” 2016.
L. P. Malese, “Penyembunyian Pesan Rahasia Pada Citra Digital dengan Teknik Steganografi Menggunakan Metode Least Significant Bit (LSB),” J. Ilm. Wahana Pendidik., vol. 7, no. 5, pp. 343–354, 2021.
R. P. Harahap and A. H. Hasugian, “Teknik Keamanan Data Menggunakan Metode Vigenere Cipher Dan Steganografi Dalam Penyisipan Pesan Teks Pada Citra,” J. FASILKOM, vol. 13, no. 3, pp. 570–577, 2023.
G. M. Fahmi, K. N. Isnaini, and D. Suhartono, “Implementation of Steganography on Digital Image With Modified Vigenere Cipher Algorithm and Least Significant Bit (Lsb) Method,” J. Tek. Inform., vol. 4, no. 2, pp. 333–344, 2023.
A. W. Laksono, S. Suhada, and A. Zakaria, “Implementasi Metode Least Significant Bit (Lsb) Dalam Teknik Steganografi Pada Citra Digital Menggunakan Matlab,” Diffus. J. Syst. Inf. Technol., vol. 4, no. 1, 2024.
M. A. Verdiana, I. Suarjaya, and A. Wiranatha, “Implementasi Algoritma PRNG pada Aplikasi Port Knocking Sebagai Perlindungan Server,” vol, vol. 8, p. 12, 2020.
A. P. U. Siahaan, “Factorization Hack of RSA Secret Numbers,” 2016.
A. P. U. Siahaan, B. O. Elviwani, and B. Oktaviana, “Comparative analysis of rsa and elgamal cryptographic public-key algorithms,” in Proceedings of the Joint Workshop KO2PI and The 1st International Conference on Advance & Scientific Innovation, 2018, pp. 162–171.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0