Enhanced Data Security in Video Media using RSA-LSB Hybrid Technique

Authors

  • Nafis Artaruna Putra Department of Informatics, Telkom University Purwokerto
  • Muhammad Fajar Sidiq Department of Informatics, Telkom University Purwokerto
  • Arif Amrulloh Department of Informatics, Telkom University Purwokerto

DOI:

https://doi.org/10.29408/edumatic.v9i2.31030

Keywords:

data security, digital video, file embedding, lsb steganography, rsa cryptography

Abstract

Securing structured documents in dynamic digital media such as video remains a challenge, especially under threats like unauthorized access, format conversion, and compression. This research aims to build a secure and hidden digital document insertion system into video media using a hybrid approach between RSA cryptography algorithm and Least Significant Bit (LSB) steganography. This research developed a steganography system using the prototype method to embed complex documents into video media securely. It uses Python with libraries like OpenCV and PyCryptodome, embedding data into the blue channel's LSB bit to maintain visual quality. The system was tested using various video samples and documents to ensure error-free embedding and 100% accurate extraction, with no file corruption. Robustness against compression and format conversion was also evaluated using metrics like PSNR, SSIM, and BER. The study successfully created a secure system for embedding complex digital documents into video media. Evaluation confirmed high visual quality (PSNR 45.3-63.2 dB), 100% data recovery, and resilience to post-processing, a significant advance over methods that handle only simple payloads.

References

Al-Chaab, W., Abduljabbar, Z. A., Abood, E. W., Nyangaresi, V. O., Mohammed, H. M., & Ma, J. (2023). Secure and low-complexity medical image exchange based on compressive sensing and lsb audio steganography. Informatica, 47(6), 65-74. https://doi.org/10.31449/inf.v47i6.4628

Al-Rekaby, S. N., Khodher, M. A. A. A., & Adday, L. K. (2025). A Hybrid Security System for Text Encryption and Steganography in Video Using Multi-Level Chaotic Maps. International Journal of Safety & Security Engineering, 15(3). 521-532. https://doi.org/10.18280/ijsse.150311

Chang, Q., Ma, T., & Yang, W. (2025). Low power IoT device communication through hybrid AES-RSA encryption in MRA mode. Scientific Reports, 15(1), 1-15. https://doi.org/10.1038/s41598-025-98905-0

Chen, B., Hong, Y., & Nie, Y. (2024). Deep video steganography using temporal-attention-based frame selection and spatial sparse adversarial attack. Journal of Visual Communication and Image Representation, 104, 104311. https://doi.org/10.1016/j.jvcir.2024.104311

Haverkamp, I., & Sarmah, D. K. (2024). Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis. International Journal of Information Security, 23(4), 2607-2635. https://doi.org/10.1007/s10207-024-00853-9

Imam, R., Areeb, Q. M., Alturki, A., & Anwer, F. (2021). Systematic and critical review of rsa based public key cryptographic schemes: Past and present status. IEEE access, 9, 155949-155976. https://doi.org/10.1109/ACCESS.2021.3129224

Kautsar, A., & Ikhsan, M. (2025). Implementation of the Advanced Encryption Standard (AES) Algorithm and Bit Plane Complexity Segmentation (BPCS) Steganography Technique for Enhancing Text File Security. SISTEMASI, 14(2), 956-968. https://doi.org/10.32520/stmsi.v14i2.5097

Kunhoth, J., Subramanian, N., Al-Maadeed, S., & Bouridane, A. (2023). Video steganography: recent advances and challenges. Multimedia Tools and Applications, 82(27), 41943-41985. https://doi.org/10.1007/s11042-023-14844-w

Kuppuswamy, P., Al, S. Q. Y. A. K., John, R., Haseebuddin, M., & Meeran, A. A. S. (2023). A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm. Bulletin of Electrical engineering and Informatics, 12(2), 1148-1158. https://doi.org/10.11591/eei.v12i2.4967

Mido, A. R & Ujianto, E. I. H. (2022). Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan Steganografi LSB. Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), 9(2), 279-286. https://doi.org/10.25126/jtiik.2022914852

Nurulita, S., & Ridwan, R. (2025). Political Will of The Indonesian Government in Addressing Data Leakage and Cybersecurity in the Era of Digital Transformation. JHSS (Journal of Humanities and Social Studies), 9(1), 028-039.

Olayiwola, A. A., Oladosu, J. B., Oyeleye, C. A., & Alade, O. M. (2023). Balancing Security, Capacity and Quality: Leveraging RSA Cryptography and DWT-GSA Steganography for Securing Medical Data. Adeleke University Journal of Engineering and Technology, 6(2), 315-322.

Panigrahi, R., & Padhy, N. (2025). An effective steganographic technique for hiding the image data using the LSB technique. Cyber Security and Applications, 3, 100069. https://doi.org/10.1016/j.csa.2024.100069

Pilania, U., Tanwar, R., Gupta, P., & Choudhury, T. (2021). A roadmap of steganography tools: conventional to modern. Spatial Information Research, 29(5), 761-774. https://doi.org/10.1007/s41324-021-00393-7

Prayogo, A. I., Nugraha, A., & Kurniawan, J. C. (2024). Enhancing Least Significant Bit Steganography Image Fidelity Using Brotli Compression. Sinkron: jurnal dan penelitian teknik informatika, 8(1), 285-295. https://doi.org/10.33395/sinkron.v9i1.13186

Putra, Y. P., Mufizar, T., & Alfiyani, E. (2022). Implementasi Super Enkripsi Aes Dan Rsa Pada Pengamanan Data Rekam Medis Pasien. Jurnal VOI (Voice Of Informatics, 11(2), 37–46.

Sari, C. A., & Sari, W. S. (2022). Kombinasi Least Significant Bit (LSB-1) Dan Rivest Shamir Adleman (RSA) Dalam Kriptografi Citra Warna. Jurnal Masyarakat Informatika, 13(1), 45-58. https://doi.org/10.14710/jmasif.13.1.43314

Sharma, K., Agrawal, A., Pandey, D., Khan, R. A., & Dinkar, S. K. (2022). RSA based encryption approach for preserving confidentiality of big data. Journal of King Saud University-Computer and Information Sciences, 34(5), 2088-2097. https://doi.org/10.1016/j.jksuci.2019.10.006

Shehab, D. A., & Alhaddad, M. J. (2022). Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research. Symmetry, 14(1), 117. https://doi.org/10.3390/sym14010117

Shtayt, B. A., Zakaria, N. H., & Harun, N. H. (2021). A comprehensive review on medical image steganography based on LSB technique and potential challenges. Baghdad Science Journal, 18(2), 957-974. https://doi.org/10.21123/bsj.2021.18.2(Suppl.).0957

Song, S., Yang, S., Yoo, C. D., & Kim, J. (2024, September). Implicit Steganography Beyond the Constraints of Modality. In European Conference on Computer Vision, 289-304. Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-73016-0_17

Syed, F., Alsamhi, S. H., Gupta, S. K., & Saif, A. (2024). LSB‐XOR technique for securing captured images from disaster by UAVs in B5G networks. Concurrency and Computation: Practice and Experience, 36(12), e8061. https://doi.org/10.1002/cpe.8061

Downloads

Published

2025-08-16

How to Cite

Putra, N. A., Sidiq, M. F., & Amrulloh, A. (2025). Enhanced Data Security in Video Media using RSA-LSB Hybrid Technique. Edumatic: Jurnal Pendidikan Informatika, 9(2), 551–559. https://doi.org/10.29408/edumatic.v9i2.31030