tal steganography has created an atmosphere where
companies develop attractive applications, so the evo-
lution of this field is guaranteed. One of the early
methods of discussing digital steganography was put
forward (Kurak and McHugh, 1992). They proposed
a method which breaks down and adds information at
least significant bits (LSB). They study images at the
lower level and insert new information now known as
image-based steganography.
LSB is a technique commonly used in encryp-
tion and decryption of confidential information. LSB
works by changing the redundant bits of the cover im-
age that have no significant effect on the bits of the
secret message (Pelosi et al., 2018). Figure 1 below
shows the mechanism of the LSB method in 8-bit im-
ages by utilizing 4 bits LSB.
Figure 1: LSB Mechanism
In this paper, the Playfair Cipher method imple-
mented to encode a text message into a form of an
image to maintain secrecy with the increasingly broad
composition of cybercrime. Then the ciphertext will
be processed with LSB Steganography.
2 RELATED RESEARCH
Hatta, Ardi, and Maharani (2017) researched how
to maintain message security when sent via an SMS
(Short Message Service) network. The problem in
this study is that someone who carries a message to
the other person wants it can be read-only by the legal
person. Encryption is needed to solve this problem
to maintain message confidentiality. The researcher
proposed an SMS cryptographic application on an
Android-based Smart Phone using the Playfair cipher
method. It can be sent cipher SMS messages and re-
ceive encrypted text messages then also can be de-
crypted in the receiver side. This application performs
cryptography in the form of text letters. The key used
is in the way of letters. The results of this study is
an Android-based application that can send encrypted
SMS messages using the Playfair cipher method so
that the confidentiality of the message can be pro-
tected .
Then MU’MI (2017) proposed a cryptographic
application to counteract the dangers of theft and mes-
sage manipulation. The method used is hybrid Play-
fair cipher and caesar cipher method and steganogra-
phy on message insertion. The Playfair cipher method
is used in the encryption process, followed by the
Caesar cipher method. The results of encryption
from a combination of the two ways are inserted into
the image (embedding process). Insertion Simulation
The encrypted message is simulated with MATLAB
as a computing aid. The simulated image is saved in
the bitmap (.bmp) format. The results of this study
indicate that by using a combination of Playfair ci-
pher and Caesar cipher in encryption, encrypted mes-
sages are increasingly difficult to return to original
messages by unauthorized parties. Inserting it into the
image makes the observer not aware of the informa-
tion embedded in the image that acts as a message.
Furthermore, Simbolon (2016) discussed how to
keep the secret of the student academic transcript.
The problem in this study is that someone who sends
a message wants the message to be secure and reaches
the right person. To solve this problem, an encryption
system is needed that can maintain the confidentiality
of the message by using Playfair cipher cryptography
and LSB steganography technique. A combination
of cryptography and steganography can enhance the
message security. In this study, Playfair ciphers are
included in the Polygram Cipher. This algorithm en-
crypts the alphabet pair (bigram) in the plaintext. In
their research, they proposed the Playfair matrix table
used is a 6x6 matrix. Steganography used is a spatial
domain method with the Least Significant Bit (LSB)
technique which consists of 2 parts, namely LSB Em-
bedding Process and LSB Extracting Process. This
research used a quantitative research method. The re-
sults obtained from this study are in the form of 8-bit
grayscale bitmap image files per pixel with a scale of
0 to 255, or with the binary format. The successful se-
cret message is fully returned to the original message
with the decryption process.
3 RESEARCH METHOD
Playfair Cipher, and LSB Steganography algorithms
are implemented using the PHP programming lan-
guage. The encryption process is done step by step
for each message that will be embedded in various
media. The first step is the text message will be en-
crypted with the Playfair Cipher method, and then the
text cipher will be steganography on 8-bit grayscale
ICoSET 2019 - The Second International Conference on Science, Engineering and Technology
126