Implementation Of Least Significant Bit (LSB) Algorithm For Data Security In Digital Imagery
DOI:
https://doi.org/10.54209/infosains.v10i2.31Keywords:
LSB, Citra Digital, SecurityAbstract
In this study, a software was built that can insert text messages into image files (steganography) and steganalisis or detect the presence or absence of secret messages in an image. Imagery is the most commonly used medium for inserting secret messages, as it can hide messages very well and is widely available. The built software implements steganalisis with the Least Significant Bit (LSB) algorithm which is the most widely used message insertion algorithm. Steganlysis software is built using LSB algorithms to perform insertion and extract insertion messages on image files. The LSB algorithm in this study used the microsoft Visual Basic 6.0 programming language tools. Based on the software tests conducted, it can be seen that the software can run well on insertion and detect the presence or absence of secret messages on image files.
Downloads
References
D. Hu, L. Wang, W. Jiang, S. Zheng, and B. Li, “A novel image steganography method via deep convolutional generative adversarial networks,” IEEE Access, vol. 6, 2018, doi: 10.1109/ACCESS.2018.2852771.
D. Novianto, “IMPLEMENTASI KEAMANAN BERKAS MENGGUNAKAN TEKNIK STEGANOGRAFI DAN ALGORITMA KRIPTOGRAFI MENGGUNAKAN METODE LEAST SIGNIFICANT BIT (LSB) DAN ALGORITMA RIVEST CODE 4 (RC4),” JUTIM (Jurnal Tek. Inform. Musirawas), vol. 3, no. 2, 2018, doi: 10.32767/jutim.v3i2.340.
O. Soleh, F. Alfiah, and B. Yusuf, “Perancangan Aplikasi Steganografi Dengan Teknik LSB dan AlgoritmaRC4 & Base64 Encoding,” Technomedia J., vol. 3, no. 1, 2018, doi: 10.33050/tmj.v3i1.493.
M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K. H. Jung, “Image steganography in spatial domain: A survey,” Signal Process. Image Commun., vol. 65, 2018, doi: 10.1016/j.image.2018.03.012.
S. S. Baawi, M. R. Mokhtar, and R. Sulaiman, “A comparative study on the advancement of text steganography techniques in digital media,” ARPN J. Eng. Appl. Sci., vol. 13, no. 5, 2018.
E. A. Abbood, R. M. Neamah, and S. Abdulkadhm, “Text in image hiding using developed LSB and random method,” Int. J. Electr. Comput. Eng., vol. 8, no. 4, 2018, doi: 10.11591/ijece.v8i4.pp2091-2097.
I. Gunawan, Sumarno, E. Irawan, and H. S. Tambunan, “Pengamanan Berkas Dokumen Menggunakan Fungsi Algoritma Steganografi LSB,” Algoritm. J. Ilmu Komput. dan Inform., vol. 02, no. 01, 2018.
M. Douglas, K. Bailey, M. Leeney, and K. Curran, “An overview of steganography techniques applied to the protection of biometric data,” Multimed. Tools Appl., vol. 77, no. 13, 2018, doi: 10.1007/s11042-017-5308-3.
P. Wu, Y. Yang, and X. Li, “StegNet: Mega Image steganography capacity with deep convolutional network,” Futur. Internet, vol. 10, no. 6, 2018, doi: 10.3390/FI10060054.
M. Cem kasapbaşi and W. Elmasry, “New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check,” Sadhana - Acad. Proc. Eng. Sci., vol. 43, no. 5, 2018, doi: 10.1007/s12046-018-0848-4.
Z. Fachrina, H. A. Humansyah, I. Fitri, and A. Rubhasy, “No Title,” vol. 5, no. 2, doi: 10.35870/jtik.v5i2.203.