Combination of XOR Binary Algorithm and Steganography Using Least Significant Bit (LSB) Method for Data Security

Yulius Nahak Tetik, Friden Elefri Neno, Dony Ariyus


Along with the development of technology and information today, data security is a problem that needs to be done to maintain the confidentiality of data or information both personally and within an organization. Cryptography is one of the sciences or arts that learns about how to secure data or information from irresponsible parties who want to destroy important data in the form of text and image files. This research, data security technique uses two algorithms, namely steganography to enter text in image media using LSB (Least Significant Bit) method and Binary XOR used to convert messages to binary with XOR keywords and generate pixel values of messages from 8 bits of images with LSB (Least Significant Bit). After encrypted the image will be sent to the user, and to view the original data, the user must decrypt the data with the message key and retrieve the LSB (Least Significant Bit) value, from the encrypted image.


XOR, LSB, Cryptography, Steganography


Darwis, D. (2016). Implemetasi Teknik Steganografi Least Significant Bit (LSB) dan Kompresi untuk Pengamanan Data Pengiriman Surat Elektronik. TEKNOINFO, 10(2), 1-7.

T, O. E., & A, A. O. (2014). An Approach to Improve Data Security using Modified XOR Encryption Algorithm. IJCRCE, 1(2), 1-9.

Sitorus, M. (2015). Teknik Steganografi dengan Metode Least Significant Bit (LSB). Jurnal Ilmiah Fakultas Teknik LIMIT'S, 11(2), 54-59.

Suhardi. (2016). Aplikasi Kriptografi Sederhana dengan Metode Excluve-OR (XOR). Teknovasi, 3(2), 23-31.

Kumar, P., Jangra, S., & Singh, S. (2017). Exclusive or (XOR) Based Enhanced Data Security Algorithm For Cloud Environment. IJARCS, 8(5), 1482-1485.

Lubis, J. H. (2018). Implementasi Keamanan Data dengan Metode Kriptografi XOR. JSIK, 2(2), 1-4.

Pratama, G. M., & Tamatjita, E. N. (2015). Modifikasi Algoritma Vigenere Cipher menggunakan Metode Catalan Number dan Double Columnar Transportation. Compiler, 4(1), 31-40.

Muttaqin, S. H., & Dewi, N. (2014). Penerapan Sistem Keamanan menggunakan Cryptography pada Aplikasi Chatting dengan Memodifikasi Algoritma Rivest Shamir Adleman (RSA). Compiler, 3(1), 61-74.

Anita, F. (2018). Implementasi Algoritma Modular Multiplication Based Block Cipher dalam mengamankan Data Teks. MEANS, 3(2), 121-125.

Wintolo, H., Retnowati, N. D., & Fendriyanto, P. (2013,). Penerapan Algoritma Lipat pada Steganografi yang Memanfaatkan RMS (Record Management System) di J2M2. SENATIK STT Adisutjipto Yogyakarta, Vol.1, pp. 76-84.

Article Metrics

Abstract view: 582 times
Download     : 228   times

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


  • There are currently no refbacks.