Keywords:
Steganography, mobile, Least Significant Bit (LSB).
Abstract
Around the world, the internet (interconnection network) has developed into one of the most popular data communication media. With a variety of illegal information retrieval techniques that are developing, many people are trying to access information that is not their right. Various techniques to protect confidential information from unauthorized persons have been carried out to secure important data. Steganography is a science and art for writing hidden messages so that no other party knows the existence of the message. The three results of tests conducted by the LSB method can be used to hide messages into images. The first test was successful by writing a message that less than 31 characters stored in the picture, the second succeeded in writing a message equal to 31 characters stored in the picture, the third failed to write a message of more than 31 characters stored in the picture.
Downloads
Download data is not yet available.
References
[1] Adiria, “Analisis dan perancangan aplikasi steganografi pada citra digital menggunakan metode LSB (Least Significant Bit),” pp. 1–264, 2010.
[2] D. Darwis, “Implementasi Teknik Steganografi Least Significant Bit (LSB) dan Kompresi untuk Pengamanan Data Pengiriman Surat Elektronik,” vol. 10, no. 2, pp. 1–7, 2016.
[3] Ainurrizan, “Implementasi steganografi pada file image menggunakan teknik spread spectrum skripsi,” 2014.
[4] E. H. Nurkifli and E. Winarko, “Implementasi Skema Steganografi Dengan Metode Select Least Significant Bits (SLSB) Pada Pesan Terenkripsi Untuk Pengiriman MMS,” vol. 2012, no. SemnasIF, pp. 9–16, 2012.
[5] S. Syam and A. S. Wahyuningsih, “Pengolahan citra dan steganografi dengan metode LSB,” no. April, pp. 31–35, 2014.
[6] E. R. Djuwitaningrum and M. Apriyani, “Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit dan Algoritma Linear Congruential Generator (Text Message Steganography Using Least Significant Bit Method and Linear Congruential Generator Algorithm),” Endang, vol. IV, no. November, pp. 79–85, 2016.
[7] L. Diyo and W. Yustanti, “RANCANG BANGUN E – VOTING BERBASIS WEBSITE DI UNIVERSITAS NEGERI SURABAYA,” Ranc. BANGUN E – VOTING Berbas. WEBSITE DI Univ. NEGERI SURABAYA, vol. 6, pp. 72–81, 2016.
[8] D. Hamdani, “Security network - encrypt - decrypt,” Security network encrypt - decrypt, 2013.
[9] A. A. Putra, Buku Praktis Belajar Pemrograman Android. 2012.
[10] Munir, Rinaldi. (2004). Pengolahan Citra Digital dengan Pendekatan Algoritmik. Bandung : Informatika.
[11] Munir, Rinaldi. (2006). Kriptografi. Bandung: Informatika.
, , & . (2020). An Implementation of MMS Steganography With The LSB Method. International Journal of Artificial Intelligence & Robotics (IJAIR), 2(1), 8-12. https://doi.org/10.25139/ijair.v2i1.2653
Authors who publish with International Journal of Artificial Intelligence & Robotics (IJAIR) agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.