Semi-public watermarking digital implementation in the concealment of text messages
DOI:
https://doi.org/10.54209/infosains.v11i1.36Keywords:
Digital, Semi-public , Watermarking, Cover message, Step message, WatermarkingAbstract
The purpose of this study is to generate watermarking of an input image. The watermarking process will begin with the process of reading color image pixels. After that, the process will be continued by calculating the step message value inserted and inserting all the necessary values in the watermarking checking process. In the event of an attack, then at the time of watermarking formation, a specific noise value (randomly generated) will be calculated to be inserted into the image. After the process of watermarking formation, then the process can be continued with checking watermarking and extracting messages.
Downloads
References
S. R. Febriani, “Implementasi Digital Watermarking pada Citra Menggunakan Metode Least Significant Bit,” vol. 21, no. 3, pp. 8–18, 2016.
E. Y. Reva, B. Susilo, and E. P. Purwandari, “Aplikasi Watermark Pada Citra Digital Menggunakan Kombinasi Metode Discrete Cosine Transform , Discrete Wavelet Transform Dan Singular Value Decomposition,” J. Rekursif, vol. 4, no. 2, pp. 152–160, 2016, [Online]. Available: ejournal.unib.ac.id.
K. Firdausy, I. Hawariyanta, and M. Murinto, “IMPLEMENTASI WATERMARKING UNTUK PENYEMBUNYIAN DATA PADA CITRA DALAM DOMAIN FREKUENSI MENGGUNAKAN DISCRETE COSINE TRANSFORM,” TELKOMNIKA (Telecommunication Comput. Electron. Control., 2006, doi: 10.12928/telkomnika.v4i1.1240.
T. N. Turnip, J. Doloksaribu, V. Purba, and I. Saragih, “Pengaruh Kapasitas Dimensi Citra Watermark terhadap Audio Watermarking dengan Perpaduan Metode DWT (Discrete Wavelet Transform) dan SVD ( Singular Value Decomposition),” J. Teknol. Inf. dan Ilmu Komput., vol. 6, no. 2, p. 141, 2019, doi: 10.25126/jtiik.2019621269.
Y. HAFIZHANA, I. SAFITRI, L. NOVAMIZANTI, and N. IBRAHIM, “Image Watermarking pada Citra Medis menggunakan Compressive Sensing berbasis Stationary Wavelet Transform,” ELKOMIKA J. Tek. Energi Elektr. Tek. Telekomun. Tek. Elektron., vol. 8, no. 1, p. 43, 2020, doi: 10.26760/elkomika.v8i1.43.
A. Abdussalam, E. Hari Rachmawanto, A. S. Noor, D. R. Ignatius Moses Setiadi, and C. Atika Sari, “Optimasi Keamanan Watermarking pada Daubechies Transform Berbasis Arnold Cat Map,” J. Inform. J. Pengemb. IT, vol. 4, no. 1, pp. 31–37, 2019, doi: 10.30591/jpit.v4i1.911.
H. Nuryadi, “Watermarking Dengan Qrcode Digunakan Untuk Verifikasi Pada Website,” J. Sist. Inf. Univ. Suryadarma, vol. 4, no. 2, pp. 34–41, 2014, doi: 10.35968/jsi.v4i2.4.
S. Syamsuryadi and I. Aqil, “Watermarking Video Menggunakan Metode Transformasi Wavelet Diskrit,” J. Ilm. Inform. Glob., vol. 9, no. 2, pp. 90–94, 2019, doi: 10.36982/jig.v9i2.562.
A. Suheryadi, “Penerapan Digital Watermark Sebagai Validasi Keabsahan Gambar Digital Dengan Skema Blind Watermark,” JTT (Jurnal Teknol. Ter., vol. 3, no. 2, pp. 1–6, 2017, doi: 10.31884/jtt.v3i2.54.
J. Rosmiyati and T. M. S. Mulyana, “Watermark Dengan Gabungan Steganografi Dan Visible Watermarking,” J. Algoritm. Log. dan Komputasi, vol. 1, no. 1, pp. 36–43, 2018, doi: 10.30813/j- alu.v1i1.1109.