Enhanced Data Security in Video Media using RSA-LSB Hybrid Technique
DOI:
https://doi.org/10.29408/edumatic.v9i2.31030Keywords:
data security, digital video, file embedding, lsb steganography, rsa cryptographyAbstract
Securing structured documents in dynamic digital media such as video remains a challenge, especially under threats like unauthorized access, format conversion, and compression. This research aims to build a secure and hidden digital document insertion system into video media using a hybrid approach between RSA cryptography algorithm and Least Significant Bit (LSB) steganography. This research developed a steganography system using the prototype method to embed complex documents into video media securely. It uses Python with libraries like OpenCV and PyCryptodome, embedding data into the blue channel's LSB bit to maintain visual quality. The system was tested using various video samples and documents to ensure error-free embedding and 100% accurate extraction, with no file corruption. Robustness against compression and format conversion was also evaluated using metrics like PSNR, SSIM, and BER. The study successfully created a secure system for embedding complex digital documents into video media. Evaluation confirmed high visual quality (PSNR 45.3-63.2 dB), 100% data recovery, and resilience to post-processing, a significant advance over methods that handle only simple payloads.
References
Al-Chaab, W., Abduljabbar, Z. A., Abood, E. W., Nyangaresi, V. O., Mohammed, H. M., & Ma, J. (2023). Secure and low-complexity medical image exchange based on compressive sensing and lsb audio steganography. Informatica, 47(6), 65-74. https://doi.org/10.31449/inf.v47i6.4628
Al-Rekaby, S. N., Khodher, M. A. A. A., & Adday, L. K. (2025). A Hybrid Security System for Text Encryption and Steganography in Video Using Multi-Level Chaotic Maps. International Journal of Safety & Security Engineering, 15(3). 521-532. https://doi.org/10.18280/ijsse.150311
Chang, Q., Ma, T., & Yang, W. (2025). Low power IoT device communication through hybrid AES-RSA encryption in MRA mode. Scientific Reports, 15(1), 1-15. https://doi.org/10.1038/s41598-025-98905-0
Chen, B., Hong, Y., & Nie, Y. (2024). Deep video steganography using temporal-attention-based frame selection and spatial sparse adversarial attack. Journal of Visual Communication and Image Representation, 104, 104311. https://doi.org/10.1016/j.jvcir.2024.104311
Haverkamp, I., & Sarmah, D. K. (2024). Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis. International Journal of Information Security, 23(4), 2607-2635. https://doi.org/10.1007/s10207-024-00853-9
Imam, R., Areeb, Q. M., Alturki, A., & Anwer, F. (2021). Systematic and critical review of rsa based public key cryptographic schemes: Past and present status. IEEE access, 9, 155949-155976. https://doi.org/10.1109/ACCESS.2021.3129224
Kautsar, A., & Ikhsan, M. (2025). Implementation of the Advanced Encryption Standard (AES) Algorithm and Bit Plane Complexity Segmentation (BPCS) Steganography Technique for Enhancing Text File Security. SISTEMASI, 14(2), 956-968. https://doi.org/10.32520/stmsi.v14i2.5097
Kunhoth, J., Subramanian, N., Al-Maadeed, S., & Bouridane, A. (2023). Video steganography: recent advances and challenges. Multimedia Tools and Applications, 82(27), 41943-41985. https://doi.org/10.1007/s11042-023-14844-w
Kuppuswamy, P., Al, S. Q. Y. A. K., John, R., Haseebuddin, M., & Meeran, A. A. S. (2023). A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm. Bulletin of Electrical engineering and Informatics, 12(2), 1148-1158. https://doi.org/10.11591/eei.v12i2.4967
Mido, A. R & Ujianto, E. I. H. (2022). Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan Steganografi LSB. Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), 9(2), 279-286. https://doi.org/10.25126/jtiik.2022914852
Nurulita, S., & Ridwan, R. (2025). Political Will of The Indonesian Government in Addressing Data Leakage and Cybersecurity in the Era of Digital Transformation. JHSS (Journal of Humanities and Social Studies), 9(1), 028-039.
Olayiwola, A. A., Oladosu, J. B., Oyeleye, C. A., & Alade, O. M. (2023). Balancing Security, Capacity and Quality: Leveraging RSA Cryptography and DWT-GSA Steganography for Securing Medical Data. Adeleke University Journal of Engineering and Technology, 6(2), 315-322.
Panigrahi, R., & Padhy, N. (2025). An effective steganographic technique for hiding the image data using the LSB technique. Cyber Security and Applications, 3, 100069. https://doi.org/10.1016/j.csa.2024.100069
Pilania, U., Tanwar, R., Gupta, P., & Choudhury, T. (2021). A roadmap of steganography tools: conventional to modern. Spatial Information Research, 29(5), 761-774. https://doi.org/10.1007/s41324-021-00393-7
Prayogo, A. I., Nugraha, A., & Kurniawan, J. C. (2024). Enhancing Least Significant Bit Steganography Image Fidelity Using Brotli Compression. Sinkron: jurnal dan penelitian teknik informatika, 8(1), 285-295. https://doi.org/10.33395/sinkron.v9i1.13186
Putra, Y. P., Mufizar, T., & Alfiyani, E. (2022). Implementasi Super Enkripsi Aes Dan Rsa Pada Pengamanan Data Rekam Medis Pasien. Jurnal VOI (Voice Of Informatics, 11(2), 37–46.
Sari, C. A., & Sari, W. S. (2022). Kombinasi Least Significant Bit (LSB-1) Dan Rivest Shamir Adleman (RSA) Dalam Kriptografi Citra Warna. Jurnal Masyarakat Informatika, 13(1), 45-58. https://doi.org/10.14710/jmasif.13.1.43314
Sharma, K., Agrawal, A., Pandey, D., Khan, R. A., & Dinkar, S. K. (2022). RSA based encryption approach for preserving confidentiality of big data. Journal of King Saud University-Computer and Information Sciences, 34(5), 2088-2097. https://doi.org/10.1016/j.jksuci.2019.10.006
Shehab, D. A., & Alhaddad, M. J. (2022). Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research. Symmetry, 14(1), 117. https://doi.org/10.3390/sym14010117
Shtayt, B. A., Zakaria, N. H., & Harun, N. H. (2021). A comprehensive review on medical image steganography based on LSB technique and potential challenges. Baghdad Science Journal, 18(2), 957-974. https://doi.org/10.21123/bsj.2021.18.2(Suppl.).0957
Song, S., Yang, S., Yoo, C. D., & Kim, J. (2024, September). Implicit Steganography Beyond the Constraints of Modality. In European Conference on Computer Vision, 289-304. Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-73016-0_17
Syed, F., Alsamhi, S. H., Gupta, S. K., & Saif, A. (2024). LSB‐XOR technique for securing captured images from disaster by UAVs in B5G networks. Concurrency and Computation: Practice and Experience, 36(12), e8061. https://doi.org/10.1002/cpe.8061
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Nafis Artaruna Putra, Muhammad Fajar Sidiq, Arif Amrulloh

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Semua tulisan pada jurnal ini adalah tanggung jawab penuh penulis. Edumatic: Jurnal Pendidikan Informatika bisa diakses secara free (gratis) tanpa ada pungutan biaya, sesuai dengan lisensi creative commons yang digunakan.

This work is licensed under a Lisensi a Creative Commons Attribution-ShareAlike 4.0 International License.