An Implementation of MMS Steganography With The LSB Method

  • Universitas Merdeka Pasuruan
  • Universitas Merdeka Pasuruan
  • Universitas Merdeka Pasuruan
Abstract views: 227 , PDF downloads: 179
Ethical Statement downloads: 0
Copyright Transfer Agreement downloads: 0
Plagiarism Checker downloads: 0
Keywords: Steganography, mobile, Least Significant Bit (LSB).

Abstract

Around the world, the internet (interconnection network) has developed into one of the most popular data communication media. With a variety of illegal information retrieval techniques that are developing, many people are trying to access information that is not their right. Various techniques to protect confidential information from unauthorized persons have been carried out to secure important data. Steganography is a science and art for writing hidden messages so that no other party knows the existence of the message. The three results of tests conducted by the LSB method can be used to hide messages into images. The first test was successful by writing a message that less than 31 characters stored in the picture, the second succeeded in writing a message equal to 31 characters stored in the picture, the third failed to write a message of more than 31 characters stored in the picture.

Downloads

Download data is not yet available.

References

[1] Adiria, “Analisis dan perancangan aplikasi steganografi pada citra digital menggunakan metode LSB (Least Significant Bit),” pp. 1–264, 2010.
[2] D. Darwis, “Implementasi Teknik Steganografi Least Significant Bit (LSB) dan Kompresi untuk Pengamanan Data Pengiriman Surat Elektronik,” vol. 10, no. 2, pp. 1–7, 2016.
[3] Ainurrizan, “Implementasi steganografi pada file image menggunakan teknik spread spectrum skripsi,” 2014.
[4] E. H. Nurkifli and E. Winarko, “Implementasi Skema Steganografi Dengan Metode Select Least Significant Bits (SLSB) Pada Pesan Terenkripsi Untuk Pengiriman MMS,” vol. 2012, no. SemnasIF, pp. 9–16, 2012.
[5] S. Syam and A. S. Wahyuningsih, “Pengolahan citra dan steganografi dengan metode LSB,” no. April, pp. 31–35, 2014.
[6] E. R. Djuwitaningrum and M. Apriyani, “Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit dan Algoritma Linear Congruential Generator (Text Message Steganography Using Least Significant Bit Method and Linear Congruential Generator Algorithm),” Endang, vol. IV, no. November, pp. 79–85, 2016.
[7] L. Diyo and W. Yustanti, “RANCANG BANGUN E – VOTING BERBASIS WEBSITE DI UNIVERSITAS NEGERI SURABAYA,” Ranc. BANGUN E – VOTING Berbas. WEBSITE DI Univ. NEGERI SURABAYA, vol. 6, pp. 72–81, 2016.
[8] D. Hamdani, “Security network - encrypt - decrypt,” Security network encrypt - decrypt, 2013.
[9] A. A. Putra, Buku Praktis Belajar Pemrograman Android. 2012.
[10] Munir, Rinaldi. (2004). Pengolahan Citra Digital dengan Pendekatan Algoritmik. Bandung : Informatika.
[11] Munir, Rinaldi. (2006). Kriptografi. Bandung: Informatika.