Steganography in Digital Marketing Using the Least Significant Bit Method
Keywords:
Digital Catalog, Data Security, Least Significant Bit, Digital Media, SteganographyAbstract
Advances in information and communication technology have significantly increased the accessibility of cyberspace, enabling data exchange to occur anytime and anywhere. However, this convenience also increases the risk of unauthorized access and manipulation of confidential information. Therefore, effective data protection mechanisms are required to maintain information security in digital systems. One technique that can be utilized to enhance data protection is steganography, which hides secret messages within digital media so that their existence is not easily detected. This study aims to implement a steganography technique in a digital catalog system to secure product description data by embedding the information within image files. The system was developed as a web-based application using the PHP programming language, while the message hiding process employed the Least Significant Bit (LSB) method on image media in JPG format. The research involved designing and implementing an embedding and extraction mechanism that allows product data to be hidden and retrieved from digital images. The testing results indicate that the system successfully embeds and extracts text messages without causing visible differences between the original image and the stego image, thus fulfilling the fidelity and recovery criteria. However, the embedded data cannot be maintained when the image undergoes manipulation such as cropping, rotation, or contrast modification, indicating that the robustness criterion is not achieved. Overall, the LSB-based steganography approach is effective for concealing product information in digital catalog images, although further development is required to improve resistance to image manipulation.
References
Ade Dwi Harisna. (2009). Image Processing. https://ndoware.com/image-processing.html.
Akhsanu Ridlo, I. (2017). Panduan pembuatan flowchart. Fakultas Kesehatan Masyarakat.
Abbas, W. (2013). Analisa Kepuasan Mahasiswa Terhadap Website Universitas Negeri Yogyakarta (Uny). Manajemen, 1–6.
Aboalsamh, H., Mathkour, H., Dokheekh, S., Mursi, M., & Ghazyassassa. (2008). An improved steganalysis approach for breaking the F5 algorithm. WSEAS Transactions on Computers, 7(9), 1447–1456.
Aditya, D., Panchadria, P. A., & Setiyanto, R. (2017). Application Development Method Steganography Least Significant Bit ( Lsb ) With Combination Cryptographic Algorithm Rc4 and Base64 Based on Php Pengembangan Aplikasi Steganografi Metode Least Significant Bit ( Lsb ) Dengan Kombinasi Algoritma Kriptografi . April, 350–359.
Apriyansyah, Unik, M., & Mukhtar, H. (2020). Implementasi Sistem Keamanan Pesan Text Dengan Teknik Steganografi Menggunakan Metode Least Significant Bit ( LSB ). 1(1), 8–12.
Atoum, M. S., Suleiman, M., Rababaa, A., Ibrahim, S., & Ahmed, A. (2011). A Steganography Method Based on Hiding secrete data in MPEG / Audio Layer III. Journal of Computer Science, 11(5), 184–188.
Bandyopadhyay, S. K., Bhattacharyya, D., Ganguly, D., Mukherjee, S., & Das, P. (n.d.). A Tutorial Review on Steganography.
Baritha Begum, M., & Venkataramani, Y. (2012). LSB based audio steganography based on text compression. Procedia Engineering, 30(2011), 703–710. https://doi.org/10.1016/j.proeng.2012.01.917
Cox, I., Miller, M., Bloom, J., & Fridrich, J. (2008). Digital Watermarking and Steganography 2nd Ed. Morgan Kauffman., MA.
Dewi, L. P., Indahyanti, U., & S, Y. H. (2017). Pemodelan Proses Bisnis Menggunakan Activity Diagram Uml Dan Bpmn ( Studi Kasus Frs Online ). Informatika, 1–9.
Dutta, P., Bhattacharyya, D., & Kim, T. (2009). Data Hiding in Audio Signal : A Review. International Journal of Database Theory and Application, 2(2), 1–8. http://www.sersc.org/journals/IJDTA/vol2_no2/1.pdf
Edy Winarno ST, M.Eng, Ali Zaki, SmitDev Community. (2014). Pemrograman Web Berbasis HTML5, PHP, dan Javascript. PT. Elex Media Komputindo, Jakarta.
Hariri, M., Karimi, R., & Nosrati, M. (2011). An introduction to steganography methods. World Applied Programming, 13, 191–195.
Hendini, A. (2016). Pemodelan Uml Sistem Informasi Monitoring Penjualan Dan Stok Barang. Jurnal Khatulistiwa Informatika, 2(9), 107–116. https://doi.org/10.1017/CBO9781107415324.004.
Hidayat Rahmat. (2010). Cara Praktis Membangun Website Gratis. PT. Elex Media Komputindo, Jakarta.
Kaur, N., & Behal, S. (2014). A Survey on various types of Steganography and Analysis of Hiding Techniques. International Journal of Engineering Trends and Technology, 11(8), 388–392. https://doi.org/10.14445/22315381/ijett-v11p276
Kipper, G. (n.d.). (2004). Investigator's Guide to Steganography, Florida: CRC Press LLC.
Munir, R. (2015). Bahan Kuliah Kriptografi IF4020. diakses dari https://informatika/stei.itb.ac.id/~rinaldi.munir/Kriptografi/2020-2021/kripto2021.htm
Reddy Karunakar, D. & Dr. T. Satya Savithri. (2013). Area Efficient Rapid Signal Acquistionscheme For High Doppler DSSS Signals. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013.
Saefullah, A., Himawan, & Agani, N. (2012). Aplikasi Steganografi Untuk Menyembunyikan Teks Dalam Media Image Dengan Menggunakan Metode LSB. Seminar Nasional Teknologi Informasi & Komunikasi Terapan 2012 (Semantik 2012), 2012(Semantik), 151–157.
Sidik, A., Hakim, Z., & Permana, E. A. (2014). Analisis Dan Implementasi Teknik Steganografi Sebagai Fasilitas Pengamanan Proses Pengiriman File Secara Online. Jurnal Sisfotek Global, 4(1), 1–4.
Singh, H., Singh, P.K., & Saroha, K. (2009). A Survey on Text Based Steganography. Proceedings, 3(3), 332-335. http://bvicam.ac.in/news/INDIACom/2009/Proceedings/pdfs/papers/119.pdf
Sunyoto Andi. (2007). Pemrograman Database dengan Visual Basic dan Microsoft SQL 2000. Yogyakarta: Andi Offset.
Syawal, M. F., Fikriansyah, D. C., & Agani, N. (2016). Implementasi Teknik Steganografi Menggunakan Algoritma Vigenere Cipher Dan Metode LSB. Jurnal TICOM, 4(3), 91–99.
Wiryawan, I Gede., Sariyasa., & I Gede Aris Gunadi. (2019). Steganografi Berdasarkan Metode Least Significant Bit (LSB). Jurnal Ilmu Komputer Indonesia (JIKI), 1, 34–40.
B. C. Putra and M. I. Khoir, "DETEKSI HELM PADA PENGGUNA SEPEDA MOTOR MENGGUNAKAN METODE YOLO SECARA REALTIME," SPIRIT: Journal Of Computing and Cybernetic System, vol. 17, no. 2, pp. 148-157, 2025.
B. C. Putra and Y. N. Afifah, “Gaussian Mixture Model untuk Penghitungan Tingkat Kebersihan Sungai Berbasis Pengolahan Citra,” Teknika: Engineering and Sains Journal, vol. 2, no. 1, pp. 53–58, 2018.
B. C. Putra, B. Setiyono, D. R. Sulistyaningrum, Soetrisno, and I. Mukhlash, “Moving Vehicle Classification Using Pixel Quantity Based on Gaussian Mixture Models,” Proc. 2018 3rd Int. Conf. Comput. Commun. Syst. (ICCCS), pp. 27–30, 2018, doi: 10.1109/CCOMS.2018.8463218.
B. C. Putra and R. A. J. Firdaus, “Storm Detection Application on Satellite Image Using the Hough Circle Method Based on Digital Image Processing,” J. Inf. Comput. Technol. Educ. (JICTE), vol. 4, no. 2, pp. 1–8, 10.21070/jicte.v4i2.1018.











