An Implementation of MMS Steganography With The LSB Method

Dian Ahkam Sani, Mohammad Zoqi Sarwani, Muhamad Agus Setiawan

Abstract


Around the world, the internet (interconnection network) has developed into one of the most popular data communication media. With a variety of illegal information retrieval techniques that are developing, many people are trying to access information that is not their right. Various techniques to protect confidential information from unauthorized persons have been carried out to secure important data. Steganography is a science and art for writing hidden messages so that no other party knows the existence of the message. The three results of tests conducted by the LSB method can be used to hide messages into images. The first test was successful by writing a message that less than 31 characters stored in the picture, the second succeeded in writing a message equal to 31 characters stored in the picture, the third failed to write a message of more than 31 characters stored in the picture.

Keywords


Steganography, mobile, Least Significant Bit (LSB).

Full Text:

PDF

References


Adiria, “Analisis dan perancangan aplikasi steganografi pada citra digital menggunakan metode LSB (Least Significant Bit),” pp. 1–264, 2010.

D. Darwis, “Implementasi Teknik Steganografi Least Significant Bit (LSB) dan Kompresi untuk Pengamanan Data Pengiriman Surat Elektronik,” vol. 10, no. 2, pp. 1–7, 2016.

Ainurrizan, “Implementasi steganografi pada file image menggunakan teknik spread spectrum skripsi,” 2014.

E. H. Nurkifli and E. Winarko, “Implementasi Skema Steganografi Dengan Metode Select Least Significant Bits (SLSB) Pada Pesan Terenkripsi Untuk Pengiriman MMS,” vol. 2012, no. SemnasIF, pp. 9–16, 2012.

S. Syam and A. S. Wahyuningsih, “Pengolahan citra dan steganografi dengan metode LSB,” no. April, pp. 31–35, 2014.

E. R. Djuwitaningrum and M. Apriyani, “Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit dan Algoritma Linear Congruential Generator (Text Message Steganography Using Least Significant Bit Method and Linear Congruential Generator Algorithm),” Endang, vol. IV, no. November, pp. 79–85, 2016.

L. Diyo and W. Yustanti, “RANCANG BANGUN E – VOTING BERBASIS WEBSITE DI UNIVERSITAS NEGERI SURABAYA,” Ranc. BANGUN E – VOTING Berbas. WEBSITE DI Univ. NEGERI SURABAYA, vol. 6, pp. 72–81, 2016.

D. Hamdani, “Security network - encrypt - decrypt,” Security network encrypt - decrypt, 2013.

A. A. Putra, Buku Praktis Belajar Pemrograman Android. 2012.

Munir, Rinaldi. (2004). Pengolahan Citra Digital dengan Pendekatan Algoritmik. Bandung : Informatika.

Munir, Rinaldi. (2006). Kriptografi. Bandung: Informatika.




DOI: http://dx.doi.org/10.25139/ijair.v2i1.2653

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Dian Ahkam Sani

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

____________________________________________________________
International Journal of Artificial Intelligence & Robotics (IJAIR)
ISSN 2686-6269 (Online)
Published By Universitas Dr. Soetomo
Managed By Informatics Department, Universitas Dr Soetomo
Address Jl. Semolowaru no 84, Surabaya, 60118, (031) 5944744
Website https://ejournal.unitomo.ac.id/index.php/ijair/index
Email [email protected]

Inform is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.