scholarly journals KONSEP PENYANDIAN FILE JPEG DENGAN MENGGUNAKAN METODE LSB

Author(s):  
Haikal Nando Winata ◽  
Raja Nasrul Fuad

Steganography is a technique to hide text or messages that other people do not know the contents of the text or the secret message. Steganography technique is often used to avoid suspicion and to avoid other people desire to know the contents of the text or the secret message. Digital image is one of the most well-known media and the public by the author. Digital image acts as a medium or a text container you want to hide a secret message. Methods LSB (Least Significant Bit) that hides the bytes of text or message you want to hide into the last byte in the digital image. LSB method has the advantage of not changing the size and shape of the digital image by naked eye, text data or messages hidden can be restored without any change in size and shape

Author(s):  
Mohamad Tariq Barakat ◽  
Rushdi Abu Zneit ◽  
Ziad A. Alqadi

Multiple methods are used to hide secret messages in digital color images, and the most important and most common is the least significant bit (LSB) method. The LSB method is a known and exposed method, and anyone with programming experience can retrieve the secret message embedded in the digital image. In this paper research we will add some enhancements to improve the security level of LSB method to protect the embedded secret message from being hacked. A simple method of secret message cryptography will be used to encrypt the secret message before bedding it using LSB method. The method will be based on using color image as an image_key; this image_key will be resized to generate the needed secret private key used to encrypt-decrypt secret message. The length and the contents of the generated private key will dynamically change depending on the message length and the selected image_key. The selected image_key will be kept in secret without transmission and will be known only by the sender and receiver and it can be changed any time when needed. The proposed crypto_steganographic method will be implemented to show how it will increase the level o secret message protection.


2020 ◽  
Vol 2 (4) ◽  
pp. 193-200
Author(s):  
Michael Sitorus ◽  
Deki Satria

Exchanging information does not realize that is important information. Circulates often important information insignificant but such as account bank customer information. The threat of security to information such as interruption, interception, modification, and fabrication. Thefts of information data by irresponsible parties. This research aims to secure information data in the form file digital image to be inserted with a secret message on building application for a secret message security system in the Bank with applying steganography using the End Of File (EOF) method. Steganography application capable of inserting secret messages in digital image data files. The results of the research are able to keep the existence of the message hidden. When other people receive image files, they can only see the images with the naked eye. So all messages are invisible and will not be read for hackers or other people before knowing the security side and open of password or reading the secret message.


2018 ◽  
Author(s):  
Taronisokhi Zebua

There are several approaches to secure a data techniques that are still used by some circles among them by applying cryptographic techniques, steganography techniques, watermarks and other techniques. One technique that can be done to optimize the security of text data is to combine cryptographic techniques with steganography techniques. Cryptographic techniques serve to encrypt the text data is concealed through the process of encryption, while steganography techniques serve to hide (embedded) encrypted text data into a media such as images, video or audio. The algorithm of cryptographic techniques used in this case is the Cipher Block Chaining (CBC) algorithm invented by IBM in 1976 that implements a feedback mechanism on a block wherein the previous block will be fed back with the current block. The method used to hide encrypted messages on a medium is one of the modifications to the Least Significant Bit method, Least Significant Bit-1 (LSB-1). The LSB-1 algorithm works by replacing each of the 7th bits of the container medium with encrypted text bits. The collecting media (cover image) used in this case is a true color digital image.


Respati ◽  
2018 ◽  
Vol 13 (3) ◽  
Author(s):  
Achmad Ardiansyah ◽  
Mepa Kurniasih

INTISARI Pesan merupakan hasil dari pengolahan data menjadi bentuk yang lebih berguna bagi yang menerimanya yang menggambarkan suatu fakta yang digunakan sebagai alat bantu untuk pengambilan suatu keputusan. Sangat pentingnya isi pesan yang menyebabkan pesan hanya boleh diakses oleh orang-orang tertentu. Pesan yang merupakan aset bernilai seharusnya dilindungi agar aman. Steganografi adalah seni dan ilmu menulis pesan tersembunyi atau menyembunyikan pesan dengan suatu cara sehingga selain si pengirim dan si penerima, tidak ada seorangpun yang mengetahui atau menyadari bahwa ada suatu pesan rahasia. Pesan yang dapat disembunyikan berupa teks, gambar, suara, dan video.Melindungi pesan yang dirahasiakan dari orang yang tidak berhak salah satunya adalah teknik steganografi yang dapat menyembunyikan data rahasia. Teknik steganografi menggunakan metode Least Significant Bit (LSB) untuk memodifikasi bit-bit yang termasuk bit LSB pada setiap byte warna pada sebuah pixel citra digital. Bit-bit LSB ini akan dimodifikasi dengan menggantikan setiap LSB yang ada dengan bit-bit informasi lain yang ingin disembunyikan. Dengan adanya citra digital kita bisa memanfaatkan utuk menyisipkan pesan pada citra digital tersebut. Hasil penelitian menunjukkan bahwa semakin besar ukuran pixel citra dan jumlah karakter, maka akan semakin lama proses penyisipan dan ekstraksinya. Dengan stego-image yang diperoleh secara citra digital memiliki tampilan hampir sama sehingga tidak terlihat oleh sistem penglihatan manusia.Kata Kunc – Citra Digital, Least Significant Bit (LSB),  Steganografi , Pesan ABSTRACTMessage is the result of processing data into a form that is more useful for those who receive it which describes a fact that is used as a tool for making a decision. The importance of the contents of messages causes messages to only be accessed by certain people. Messages that are valuable assets should be protected to be safe. Steganography is the art and science of writing hidden messages or hiding messages in a way so that in addition to the sender and the recipient, no one knows or realizes that there is a secret message. Messages that can be hidden are in the form of text, images, sounds, and videos.Protecting confidential messages from unauthorized people is one of the Steganography Techniques that can hide confidential data. The steganography technique uses the LSB (Least Significant Bit) method to modify the bits including the LSB bit on each color byte in a digital image pixel. These LSB bits will be modified by replacing each existing LSB with other bits of information that you want to hide. With the presence of digital images we can use to insert messages in the digital image. The results of the study show that the larger the pixel size of the image and the number of characters, the longer the insertion process and its extraction will be. With stego-image obtained by digital imagery it has almost the same appearance so it is not visible to the human visual system.Keywords — Digital Image, Least Significant Bit (LSB), Steganography, Message


2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance


2021 ◽  
Vol 83 (1) ◽  
pp. 72-79
Author(s):  
O.A. Kan ◽  
◽  
N.A. Mazhenov ◽  
K.B. Kopbalina ◽  
G.B. Turebaeva ◽  
...  

The main problem: The article deals with the issues of hiding text information in a graphic file. A formula for hiding text information in image pixels is proposed. A steganography scheme for embedding secret text in random image pixels has been developed. Random bytes are pre-embedded in each row of pixels in the source image. As a result of the operations performed, a key image is obtained. The text codes are embedded in random bytes of pixels of a given RGB channel. To form a secret message, the characters of the ASCII code table are used. Demo encryption and decryption programs have been developed in the Python 3.5.2 programming language. A graphic file is used as the decryption key. Purpose: To develop an algorithm for embedding text information in random pixels of an image. Methods: Among the methods of hiding information in graphic images, the LSB method of hiding information is widely used, in which the lower bits in the image bytes responsible for color encoding are replaced by the bits of the secret message. Analysis of methods of hiding information in graphic files and modeling of algorithms showed an increase in the level of protection of hidden information from detection. Results and their significance: Using the proposed steganography scheme and the algorithm for embedding bytes of a secret message in a graphic file, protection against detection of hidden information is significantly increased. The advantage of this steganography scheme is that for decryption, a key image is used, in which random bytes are pre-embedded. In addition, the entire pixel bits of the container image are used to display the color shades. It can also be noted that the developed steganography scheme allows not only to transmit secret information, but also to add digital fingerprints or hidden tags to the image.


2019 ◽  
Vol 7 (4) ◽  
pp. 254
Author(s):  
Nada E. Tawfiq

Image files can hide text without their size being affected too much. This process called steganography which allows hiding text in images without any suspicions from intruders. This paper addresses an improved LSB substitution algorithm for hiding Kurdish text information written in text file into digital image as steganography technique. The algorithm consists of two main phases, the first phase holds the encryption of the Kurdish text message and the embedded technique while the second phase hold the message extraction followed by decryption to get the original code of each character. The algorithm contains many procedures to enhance this process. Least Significant Bit method is used to hide the Kurdish text, in order to keep the features and characteristics of the original image. Applying the proposed approach shows that it seems work in a best case by hiding and retrieving text from the digital image which is used as a carrier of this text. Delphi 2010 was used to simulate both encrypt-embedded phase and extract-decrypt phase, and the results were obtained with high and security which proved the efficiency of the algorithm, where the hidden Kurdish text didn’t make any distortion or change over the cover image.


Author(s):  
Shruti Rajkumar Choudhary

<p>Opinion mining is extract subjective information from text data using tools such as NLP, text analysis etc. Automated opinion mining often uses machine learning, a type of artificial intelligence (AI), to mine text for sentiment. Opinion mining, which is also called sentiment analysis, involves building a system to collect and categorize opinions about a product.In this project the problem of sentiment analysis in twitter; that is classifying tweets according to the sentiment expressed in terms of positive, negative or neutral. Twitter is an online micro-blogging and social-networking platform which allows users to write short status updates of maximum length 140 characters. It is a rapidly expanding service with over 200 million registered users out of which 100 million are active users and half of them log on twitter on a daily basis - generating nearly 250 million tweets per day. Due to this large amount of usage we hope to achieve a reflection of public sentiment by analysing the sentiments expressed in the tweets. Analysing the public sentiment is important for many applications such as firms trying to find out the response of their products in the market, predicting political elections and predicting socioeconomic phenomena like stock exchange.</p>


2020 ◽  
Vol 29 (1) ◽  
pp. 30-39 ◽  
Author(s):  
Farah Deeba ◽  
She Kun ◽  
Fayaz Ali Dharejo ◽  
Hira Memon

Sign in / Sign up

Export Citation Format

Share Document