scholarly journals Implementation of LSB Steganography on Embedding Messages in Digital Image

2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

The development of information technology today, makes it easier for perpetrators of computer crime, by abusing technology to support its activities, where their activities significantly disrupt someone's privacy. In this paper the insertion of text messages with the least significant bit method. Therefore the administrator needs a system or application that is safe so that it can make it difficult for computer criminals to carry out their activities, and help technology users regarding securing the accessed data bit, which is expected to increase the security of a secret text message. To increase the security of the data to be stored, the data stored is embedded in other media. Least Significant Bit is one method that can be used to hide confidential data on images or media. With this method, the confidentiality of information will be more secure.

Author(s):  
Randi Rian Putra ◽  
Meika Sari ◽  
Andysah Putera Utama Siahaan ◽  
Muhammad Iqbal

The development of information technology today, makes it easier for perpetrators of computer crime, by abusing technology to support its activities, where their activities significantly disrupt someone's privacy. In this paper the insertion of text messages with the least significant bit method. Therefore the administrator needs a system or application that is safe so that it can make it difficult for computer criminals to carry out their activities, and help technology users regarding securing the accessed data bit, which is expected to increase the security of a secret text message. To increase the security of the data to be stored, the data stored is embedded in other media. Least Significant Bit is one method that can be used to hide confidential data on images or media. With this method, the confidentiality of information will be more secure.


2019 ◽  
Vol 7 (4) ◽  
pp. 254
Author(s):  
Nada E. Tawfiq

Image files can hide text without their size being affected too much. This process called steganography which allows hiding text in images without any suspicions from intruders. This paper addresses an improved LSB substitution algorithm for hiding Kurdish text information written in text file into digital image as steganography technique. The algorithm consists of two main phases, the first phase holds the encryption of the Kurdish text message and the embedded technique while the second phase hold the message extraction followed by decryption to get the original code of each character. The algorithm contains many procedures to enhance this process. Least Significant Bit method is used to hide the Kurdish text, in order to keep the features and characteristics of the original image. Applying the proposed approach shows that it seems work in a best case by hiding and retrieving text from the digital image which is used as a carrier of this text. Delphi 2010 was used to simulate both encrypt-embedded phase and extract-decrypt phase, and the results were obtained with high and security which proved the efficiency of the algorithm, where the hidden Kurdish text didn’t make any distortion or change over the cover image.


2018 ◽  
Vol 1 (2) ◽  
pp. 197
Author(s):  
Reno Supardi

Abstrack - Information and communication technology has developed rapidly, giving a great influence to human life. The development of network and internet technology allows everyone to exchange data, information, or messages to others without limitation of distance and time. Security and confidentiality are important aspects needed in the process of exchanging messages / information. The author uses steganography with the Bit Matching method that will hide information in the form of text into other digital image media. After being analyzed and implemented using the Visual Basic 2010 programming language, it was found that the text that was inserted into the image still looked normal so that it did not raise suspicion for those who saw it. The size of the capacity of a digital image affects how many characters a text message can be hidden. The greater the number of text message characters that will be hidden, the greater the size of the digital image. It is expected that this application of steganography can be useful in the fields of education and science especially in concealing text messages and can be continued for future research. Keywords - Digital Image, Bit Matching, Visual Basic 2010


Author(s):  
Ibnu Utomo Wahyu Mulyono ◽  
Ajib Susanto ◽  
Tiara Anggraeny ◽  
Christy Atika Sari

 The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096.


2019 ◽  
Vol 1 (1) ◽  
pp. 73
Author(s):  
Siti Nur’aini

<span lang="SV">Steganography is a way to hide messages or confidential data in a medium called a carrier file. Embedding is done by the Least Significant Bit Insertion method, which is to replace the lowest bit of Red Green Blue (RGB) each pixel with the data bit you want to insert. With this method the difference between pixels that have not been pasted by messages and pixels that have been pasted by messages cannot be distinguished by human eye sight. Because the LSB insertion method is used, it is necessary to consider the type of digital image format used, this is necessary to avoid the loss of messages when extracting. And the best digital image format used is the 24-bit BMP because the BMP format is lossless compression</span>


Respati ◽  
2018 ◽  
Vol 13 (3) ◽  
Author(s):  
Achmad Ardiansyah ◽  
Mepa Kurniasih

INTISARI Pesan merupakan hasil dari pengolahan data menjadi bentuk yang lebih berguna bagi yang menerimanya yang menggambarkan suatu fakta yang digunakan sebagai alat bantu untuk pengambilan suatu keputusan. Sangat pentingnya isi pesan yang menyebabkan pesan hanya boleh diakses oleh orang-orang tertentu. Pesan yang merupakan aset bernilai seharusnya dilindungi agar aman. Steganografi adalah seni dan ilmu menulis pesan tersembunyi atau menyembunyikan pesan dengan suatu cara sehingga selain si pengirim dan si penerima, tidak ada seorangpun yang mengetahui atau menyadari bahwa ada suatu pesan rahasia. Pesan yang dapat disembunyikan berupa teks, gambar, suara, dan video.Melindungi pesan yang dirahasiakan dari orang yang tidak berhak salah satunya adalah teknik steganografi yang dapat menyembunyikan data rahasia. Teknik steganografi menggunakan metode Least Significant Bit (LSB) untuk memodifikasi bit-bit yang termasuk bit LSB pada setiap byte warna pada sebuah pixel citra digital. Bit-bit LSB ini akan dimodifikasi dengan menggantikan setiap LSB yang ada dengan bit-bit informasi lain yang ingin disembunyikan. Dengan adanya citra digital kita bisa memanfaatkan utuk menyisipkan pesan pada citra digital tersebut. Hasil penelitian menunjukkan bahwa semakin besar ukuran pixel citra dan jumlah karakter, maka akan semakin lama proses penyisipan dan ekstraksinya. Dengan stego-image yang diperoleh secara citra digital memiliki tampilan hampir sama sehingga tidak terlihat oleh sistem penglihatan manusia.Kata Kunc – Citra Digital, Least Significant Bit (LSB),  Steganografi , Pesan ABSTRACTMessage is the result of processing data into a form that is more useful for those who receive it which describes a fact that is used as a tool for making a decision. The importance of the contents of messages causes messages to only be accessed by certain people. Messages that are valuable assets should be protected to be safe. Steganography is the art and science of writing hidden messages or hiding messages in a way so that in addition to the sender and the recipient, no one knows or realizes that there is a secret message. Messages that can be hidden are in the form of text, images, sounds, and videos.Protecting confidential messages from unauthorized people is one of the Steganography Techniques that can hide confidential data. The steganography technique uses the LSB (Least Significant Bit) method to modify the bits including the LSB bit on each color byte in a digital image pixel. These LSB bits will be modified by replacing each existing LSB with other bits of information that you want to hide. With the presence of digital images we can use to insert messages in the digital image. The results of the study show that the larger the pixel size of the image and the number of characters, the longer the insertion process and its extraction will be. With stego-image obtained by digital imagery it has almost the same appearance so it is not visible to the human visual system.Keywords — Digital Image, Least Significant Bit (LSB), Steganography, Message


Crisis ◽  
2010 ◽  
Vol 31 (2) ◽  
pp. 109-112 ◽  
Author(s):  
Hui Chen ◽  
Brian L. Mishara ◽  
Xiao Xian Liu

Background: In China, where follow-up with hospitalized attempters is generally lacking, there is a great need for inexpensive and effective means of maintaining contact and decreasing recidivism. Aims: Our objective was to test whether mobile telephone message contacts after discharge would be feasible and acceptable to suicide attempters in China. Methods: Fifteen participants were recruited from suicide attempters seen in the Emergency Department in Wuhan, China, to participate in a pilot study to receive mobile telephone messages after discharge. All participants have access to a mobile telephone, and there is no charge for the user to receive text messages. Results: Most participants (12) considered the text message contacts an acceptable and useful form of help and would like to continue to receive them for a longer period of time. Conclusions: This suggests that, as a low-cost and quick method of intervention in areas where more intensive follow-up is not practical or available, telephone messages contacts are accessible, feasible, and acceptable to suicide attempters. We hope that this will inspire future research on regular and long-term message interventions to prevent recidivism in suicide attempters.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2019 ◽  
Author(s):  
Megan Partch ◽  
Cass Dykeman

Mental health treatment providers seek high-impact and low-cost means of engaging clients in care. As such, text messaging is becoming more frequently utilized as a means of communication between provider and client. Research demonstrates that text message interventions increase treatment session attendance, decrease symptomology, and improve overall functioning. However, research is lacking related to the linguistic make up of provider communications. Text messages were collected from previously published articles related to the treatment of mental health disorders. A corpus of 39 mental health treatment text message interventions was composed totaling 286 words. Using Linguistic Inquiry and Word Count (LIWC) software, messages were analyzed for prevalence of terminology thought to enhance client engagement. Clout, demonstrating the writer’s confidence and expertise, and positive Emotional Tone were found to be at a high level within the corpus. Results demonstrated statistical significance for five linguistic variables. When compared with national blog norms derived from Twitter, Clout, Emotional Tone, and use of Biological terminology were found to be at higher rates than expected. Authenticity and Informal terminology were found at significantly lesser rates.


Sign in / Sign up

Export Citation Format

Share Document