The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit

Nurul Khairina(1*), Muhammad Khoiruddin Harahap(2), Juanda Hakim Lubis(3),

(1) Universitas Medan Area
(2) Politeknik Ganesha Medan
(3) Politeknik Ganesha Medan
(*) Corresponding Author


A creation can be considered as belonging to someone if they have a valid proof. An original creation that have been changed for certain purposes will definitely eliminate proof of ownership of the creation. A hash function is one method used to test the authenticity of data, while steganography is one method used to maintain the security of confidential data from outside parties. In this study, the Hash MD5 method will be combined with the Least Significant Bit method to test the authenticity of an image. The purpose of testing the authenticity is to find out the truth of ownership of a creation, in this case, we are testing the image. The results of this test are the status of an image that will be declared valid or invalid. Measurement of validity depends on whether there is a similarity between the value of the Hash that has been implanted and the value of the Hash obtained during the test. If the tested image has the same Hash value, then the image will be declared valid, but instead ai image is declared invalid if the image has been modified or ownership status has been changed. From the result of testing the authenticity with several images, it can prove that the combination of the Hash MD5 method with LSB has a good level of security and suitable to authenticity testing.

Full Text:



S. K. R. Suman, "A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 6, no. 8, pp. 1268-1273, 2017.

H. L. Hussein, "Hiding Data in Color Image Using Least Significant Bits of Blue Sector," Ibn Al-Haitham J. for Pure & Appl. Sci., vol. 31, no. 2, pp. 193-198, 2018.

R. Gaur, R. Vig and AmanpreetKaur, "An Effectual Hybrid Approach Using Data Encryption Standard (DES) and Secured Hash Algorithm (SHA) for Image Steganography," International Journal on Recent and Innovation Trends in Computing and Communication, vol. 6, no. 5, pp. 44-53, 2018.

M. Wahid, N. Ahmad, M. H. Zafar, and S. Khan, "On Combining MD5 for Image Authentication using LSB Substitution in Selected Pixels," in International Conference on Engineering and Emerging Technologies (ICEET), Lahore, 2018.

D. Rachmawati, J. T. Tarigan, and A. B. C. Ginting, "A comparative study of Message Digest 5(MD5) and SHA256," Journal of Physics: Conference Series, vol. 978, pp. 1-6, 2018.

K. K. Prasad and P. S. Aithal, "A Study on Fingerprint Hash Code Generation Based on MD5 Algorithm and Freeman Chain Code," International Journal of Computational Research and Development (IJCRD), vol. 3, no. 1, pp. 13-22, 2018.

S. Hakim and M. Fouad, "Improving Data Integrity in Communication Systems by Designing a New Security Hash Algorithm," Journal of Information Sciences and Computing Technologies(JISCT), vol. 6, no. 2, pp. 638-647, 2017.

G. K. Sodhi and G. S. Gaba, "An Efficient Hah Algorithm to Preserve Data Integrity," Journal of Engineering Science and Technology, vol. 13, no. 3, pp. 778-789, 2018.

M. Kumari and R. Nath, "A Secure and Flexible One Way Hash Function for Data Integrity Veri fi cation in Cloud Computing Environment," in International Conference on Next Generation Computing Technologies, Dehradun, 2018.

A. Kumar and R. Sharma, "A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 7, pp. 363-372, 2013.

N. Singh and J. Bhardwaj, "Comparative Analysis for Steganographic LSB Variants," in International Conference on Computing, Communication and Signal Processing (ICCASP), Maharashtra, 2018.

E. Emad, A. Safe, A. Refaat, Z. Osama, E. Sayed, and E. Mohamed, "A secure image steganography algorithm based on a least significant bit and integer wavelet transform," Journal of Systems Engineering and Electronics, vol. 29, no. 3, pp. 639-649, 2018.

J. Bhadra, M.K.Banga and M. Murthy, "Securing Data Using Elliptic Curve Cryptography and Least Significant Bit Steganography," in International Conference on Smart Technology for Smart Nation, Bangalore, 2017.

Hendra Pasaribu, "Combination of advanced encryption standard 256 bits with md5 to secure documents on android smartphone," Journal of Physics: Conference Series, vol. 1007, pp. 1-8, 2018.

A. Menezes, O. P.V. and S.Vanstone, Handbook of Applied Cryptography, CRC Press,1996.

B. Schneier, Applied Cryptography Protocols, Algorithms, and Source Code in C. Second Edition, Jhon Wiley & Sons, Inc: California, 1996.

A. Bhandari, M. Bhuiyan and P. W. C. Prasad, "Enhancement of MD5 Algorithm for Secured Web Development," Journal of Software, vol. 12, no. 4, pp. 240-252, 2017.

S. M. Klim, "Selected Least Significant Bit Approach for Hiding Information Inside Color Image Steganography by using Magic Square," Journal of Engineering and Sustainable Development, vol. 21, no. 1, pp. 74-88, 2017.



  • There are currently no refbacks.

Jumlah Kunjungan:

View My Stats

Published Papers Indexed/Abstracted By: