Analisa Perbandingan LSB Steganografi antara Shifting dan Random Color
Main Article Content
Abstract
Steganografi merupakan teknik untuk menyembunyikan keberadaan data ke dalam data lain sehingga keberadaannya tidak diketahui. Sehingga selain pengirim dan penerima tidak ada yang mengetahui isi dari pesan tersebut dan tidak mudah untuk dicurigai. Beberapa algoritma yang cocok dengan teknik steganography, salah satunya yaitu algoritma LSB (Least Significant Bit). Algoritma LSB sendiri sudah dikembangkan oleh beberapa penelitian sebelumnya, yaitu menjadi algoritma LSB Random Color dan algoritma LSB Shifting. Dua algoritma tersebut merupakan algoritma yang terbaru dari algoritma LSB. Beberapa penelitian sebelumnya melakukan pengujian algoritma LSB random color dan algoritma LSB shifting dengan menggunakan data yang berbeda, dan hasil penelitian sebelumnya tidak melakukan perbandingan mana yang lebih baik dari dua algoritma tersebut. Dalam penelitian ini penulis membuat penelitian dengan judul analisa perbandingan LSB steganografi antara shifting dan random color. Pengujian diukur dengan menghitung nilai MSE dan PSNR pada file stegano image. Penelitian ini menggunakan 2 jenis file cover image yaitu berwarna dan hitam putih dengan jumlah masing-masing 3 file yang berbeda, dan menggunakan 1 file secret image yang sama. Sehingga diperoleh hasil perbandingan bahwasannya algoritma LSB random color memiliki performa lebih baik, meskipun mengunakan jenis file berwarna atau hitam putih
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
W. Yuntian and Y. Wei, “Information Based on Strengthening the Awareness and Promotion of Information Technology,” in 2010 3rd International Conference on Information Management, Innovation Management and Industrial Engineering, 2010, vol. 4, pp. 88–90.
L. Li, R. Ge, S. Zhou, and R. Valerdi, “Guest EditorialIntegrated Healthcare Information Systems,” IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 4, pp. 515–517, Jul. 2012.
X. Dong, Q. Liu, and D. Yin, “Business performance, business strategy, and information system strategic alignment: An empirical study on Chinese firms,” Tsinghua Sci. Technol., vol. 13, no. 3, pp. 348–354, Jun. 2008.
B. Karabacak and I. Sogukpinar, “ISRAM: information security risk analysis method,” Comput. Secur., vol. 24, no. 2, pp. 147–159, 2005.
M. A. Alia, K. A. Maria, M. A. Alsarayreh, E. A. Maria, and S. Almanasra, “An Improved Video Steganography: Using Random Key-Dependent,” in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 2019, pp. 234–237.
T. Jamil, “Steganography: the art of hiding information in plain sight,” IEEE Potentials, vol. 18, no. 1, pp. 10–12, Feb. 1999.
S. Tan and B. Li, “Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting,” IEEE Signal Process. Lett., vol. 19, no. 6, pp. 336–339, 2012.
A. Kumar and K. Pooja, “Steganography-A Data Hiding Technique,” Int. J. Comput. Appl., vol. 975, p. 8887.
N. Hopper, L. von Ahn, and J. Langford, “Provably Secure Steganography,” IEEE Trans. Comput., vol. 58, no. 5, pp. 662–676, May 2009.
A. Ranjan and M. Bhonsle, “Advanced technics to shared amp; protect cloud data using multilayer steganography and cryptography,” in 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016, pp. 35–41.
P. Jayaram, H. Ranganatha, and H. Anupama, “Information hiding using audio steganography–a survey,” Int. J. Multimed. Its Appl. IJMA Vol, vol. 3, pp. 86–96, 2011.
E. Emad, A. Safey, A. Refaat, Z. Osama, E. Sayed, and E. Mohamed, “A secure image steganography algorithm based on least significant bit and integer wavelet transform,” J. Syst. Eng. Electron., vol. 29, no. 3, pp. 639–649, Jun. 2018.
H. Ghasemzadeh and M. H. Kayvanrad, “Comprehensive review of audio steganalysis methods,” IET Signal Process., vol. 12, no. 6, pp. 673–687, 2018.
R. Balaji and G. Naveen, “Secure data transmission using video Steganography,” in 2011 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2011, pp. 1–5.
M. H. Shirali-Shahreza and Mohammad Shirali-Shahreza, “Text Steganography in chat,” in 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 2007, pp. 1–5.
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Process., vol. 90, no. 3, pp. 727–752, 2010.
K. Thangadurai and G. S. Devi, “An analysis of LSB based image steganography techniques,” in Computer Communication and Informatics (ICCCI), 2014 International Conference on, 2014, pp. 1–4.
S. K. Bandyopadhyay, D. Bhattacharyya, D. Ganguly, S. Mukherjee, and P. Das, “A tutorial review on steganography,” in International conference on contemporary computing, 2008, vol. 101, pp. 105–114.
N. Akhtar, P. Johri, and S. Khan, “Enhancing the security and quality of LSB based image steganography,” in Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on, 2013, pp. 385–390.
K. Joshi and R. Yadav, “A new LSB-S image steganography method blend with Cryptography for secret communication,” in Image Information Processing (ICIIP), 2015 Third International Conference on, 2015, pp. 86–90.
X. Zhou, W. Gong, W. Fu, and L. Jin, “An improved method for LSB based color image steganography combined with cryptography,” in Computer and Information Science (ICIS), 2016 IEEE/ACIS 15th International Conference on, 2016, pp. 1–4.