Text Insertion By Utilizing Masking-Filtering Algorithms As Part of Text Message Security
DOI:
https://doi.org/10.54209/infosains.v11i1.18Keywords:
Steganography, masking, filtering, ImageryAbstract
For a secret message to be read and understood by a specific person only, a way is needed to hide the message, namely by steganography. Steganography is the concealment of secret messages in other media, such as images, audio, or video, so that the media inserted into the message looks as usual. Digital photos are one of the container media that are widely used for data hiding. However, when processing images such as compression, rotation, noise, and so on, confidential messages in the picture are prone to damage or loss. Then it takes the correct steganography method to hide secret messages into images to keep messages safe, not damaged even if the container image is manipulated, and the hidden message can be extracted again. on this thesis, applied masking method – filtering. Masking-filtering is included in the spatial domain. Message hiding is done by manipulating the luminance value of the image. Its use is applied to color or grayscale images. Masking serves as a tagging place on the picture that can be inserted message. Filtering passes a value to the marked section. the result is a stego image where the news is integrated with the container image, more robust to image processing when compared to methods that are also classified in the spatial domain, such as the least significant bit.
Downloads
References
K. R. Ilaga and C. A. Sari, "Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit," J. Appl. Intell. Syst., vol. 3, no. 1, pp. 28–38, 2018.
A. A. Mahesh and K. B. Raja, "Design of an efficient steganography model using lifting based
DWT and Modified-LSB Method on FPGA," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 10, pp. 226–231, 2019.
B. Williges, M. Dietz, V. Hohmann, and T. Jürgens, "Spatial Release From Masking in Simulated Cochlear Implant Users With and Without Access to Low-Frequency Acoustic Hearing," Trends Hear., vol. 19, 2015, DOI: 10.1177/2331216515616940.
S. Lanfranco, L. H. Mazzini, A. E. Dominguez, and J. L. Naguil, "Watermark detector based on stochastic resonance phenomenon," IEEE Lat. Am. Trans., vol. 11, no. 1, pp. 396–401, 2013, DOI: 10.1109/TLA.2013.6502836.
M. Cem kasapbaşi and W. Elmasry, "New LSB-based color image steganography method to enhance the efficiency in payload capacity, security and integrity check," Sadhana - Acad. Proc. Eng. Sci., vol. 43, no. 5, 2018, DOI: 10.1007/s12046-018-0848-4.
Sembiring Sandro, “Perancangan Aplikasi Steganografi Untuk Menyisipkan Pesan Teks Pada Gambar Dengan Metode End of File,” Pelita Inform. Budi Darma, 2013.
U. Amri, I. G. P. S. Wijaya, and F. Bimantoro, “Steganografi Menggunakan Metode Pencocokan LSB dan Karakter Non-Breaking Space Sebagai Penanda Pesan,” J. Comput. Sci. Informatics Eng., vol. 1, no. 1, p. 23, 2018, doi: 10.29303/jcosine.v1i1.18.
M. F. Syawal, D. C. Fikriansyah, and N. Agani, “Implementasi Teknik Steganografi Menggunakan Algoritma Vigenere Cipher Dan Metode LSB,” J. TICOM, vol. 4, no. 3, pp. 91–99, 2016.
G. Tarawneh et al., "Invisible noise obscures visible signal in insect motion detection," Sci. Rep., vol. 7, no. 1, 2017, doi: 10.1038/s41598-017-03732-7.
R. L. Goldsworthy, L. A. Delhorne, L. D. Braida, and C. M. Reed, "Psychoacoustic and phoneme identification measures in cochlear-implant and normal-hearing listeners," Trends Amplif., vol. 17, no. 1, pp. 27–44, 2013, doi: 10.1177/1084713813477244.
T. M. Bücking, P. J. van den Berg, and S. Balaban, "Processing methods for photoacoustic Doppler flowmetry with a clinical ultrasound scanner," J. Biomed. Opt., vol. 23, no. 2, p. 1, 2018, doi: 10.1117/1.jbo.23.2.026009.
H. C. Rustamaji, M. Mariani, and B. Yuwono, “APLIKASI KOMPRESI DATA MENGGUNAKAN METODE HUFFMAN STATIK PADA PERANGKAT MOBILE BERBASIS ANDROID,” Telematika, vol. 11, no. 1, 2015, doi: 10.31315/telematika.v11i1.311.
A. P. U. Siahaan, “IMPLEMENTASI TEKNIK KOMPRESI TEKS HUFFMAN,” J. Inform., vol. 10, no. 2, 2016, doi: 10.26555/jifo.v10i2.a5070.