scholarly journals Analisis Histogram Steganografi Least Significant Bit Pada Citra Grayscale

2020 ◽  
Vol 11 (1) ◽  
pp. 20-29
Author(s):  
Nur Fitrianingsih Hasan ◽  
Christin Nandari Dengen ◽  
Dony Ariyus

Kesadaran pentingnya keamanan data pada era digital saat ini ditandai dengan berkembangnya aplikasi keamanan data. Pada penelitian ini akan dilakukan analisis histogram terhadap suatu aplikasi keamanan data. Tujuan dari analisa ini adalah mengetahui perubahan histogram yang dilakukan penyisipan pesan. Hasilnya penyisipan pesan pada citra menggunakan Least Significant Bit secara visual tidak terlihat perubahan. Analisis histogram menunjukkan perubahan grafik terlihat lebih signifikan pada file gambar .tif, .png dan .jpg sementara .bmp tidak signifikan. Jumlah karakter yang disisipkan mempengaruhi grafik histogram. Stego image yang dihasilkan memenuhi syarat imperceptibility. Dibuktikan dari nilai PSNR yang dihasilkan yaitu PSNR >40db. Perubahan ekstensi image menjadi salah satu faktor hasil nilai PSNR. Dibuktikan dengan ekstensi image .bmp memiliki nilai MSE paling rendah dan PSNR paling tinggi yaitu, MSE=0,66141 dan PSNR=49,9601.   Kata kunci: Histogram, Steganografi, LSB, Grayscale, PSNR   Abstract Awareness of the importance of data security in the current digital era is marked by the development of data security applications. In this study a histogram analysis of a data security application will be performed. The purpose of this analysis is to determine the histogram changes made by message insertion. The result is the insertion of messages in the image using Least Significant Bit visually does not change. Histogram analysis shows that graph changes are more significant in .tif, .png and .jpg image files while .bmp is not significant. The number of characters inserted affects the histogram graph. The resulting stego image meets the requirements of imperceptibility. Proven from the PSNR value generated is PSNR>40dB. The change in image extension is one of the factors resulting from the PSNR value. Evidenced by the extension .bmp image has the lowest MSE value and the highest PSNR, namely, MSE=0.66141 andPSNR=49.9601. Keywords: Histogram, Steganography, LSB, Grayscale, PSNR.

2019 ◽  
Vol 8 (4) ◽  
pp. 3369-3373

In present world data transfer using the internet is growing. It is very easy and fast way to transfer information like confidential documents, economic transactions, business applications and other covert information over internet. With the advent and growth of internet, people are more concerned about security of information. Data Security is important while data is transferred over internet because any illegal user can access important and private data also make it worthless. Research in data security area will help government agencies, military organization and private companies to securely transmit their confidential data over internet. From past few years various steganography techniques have been developed to hide secret message using various multimedia objects having large amount of redundant data to support steganography. In this paper introduction about steganography, related concepts and implementation of commonly used spatial domain techniques like LSB(Least Significant Bit Technique) with modulus, PVD(Pixel Value Difference) with LSB replacement and adaptive data hiding over edges with LSB are considered. It is observed(while visual, statistical analysis and experiments were carried out) with benchmark cover and stego objects that embedding same amount of secret data in each pixel leads to more visible distortions in a stego image because all pixels do not bear same amount of changes and this effect is more observed in smooth area then edges. Improving stego image imperceptibility and adjusting hiding capacity adaptively are major related research challenges about spatial domain techniques.


2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Nizirwan Anwar

Steganography (steganography) is the science or technique of art to hide secret messages in other messages so that the existence of such secret messages can not be accessed by others who have no authority. In terms of data security (, text or audio) should follow the appropriate 5 (five) main rules is the factor of confidentiality, integrity, availability, authenticity, and non-repudiation. LSB algorithm method is a method used steganography where the process of combining messages containing text stored in a particular in this format made this research JPG and BMP with a certain pixel size. This research resulted after the process of testing and analyzing using matrix based application (M-File, Matlab) there is no significant change in quality (cover and stego) and text.<br />Keywords:  Steganography, Cover-Image, Stego-Image, LSB Method<br /><br />


Author(s):  
Musa. M. Yahaya ◽  
Aminat Ajibola

Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.


2004 ◽  
Vol 04 (02) ◽  
pp. C1-C5 ◽  
Author(s):  
LASZLO B. KISH ◽  
SWAMINATHAN SETHURAMAN

Secure encryption of data is one of the most important parts of information technology and major concern of data security, military, defense and homeland security applications. The main aim of the paper is to propose a new way of approach to encryption. We propose a new possible approach [1] to encryption, which could be a fast, simple, inexpensive, robust, flexible, and mobile way of data encryption for absolutely secure data transmission by using classical digital information. The Eavesdropper is allowed to know the received signal thus the method has a higher level of protection than that of quantum encryption. Factorization algorithms do not help to break the code. Proper scrambling operators, which are necessary for the method, are study of current research.


2018 ◽  
Vol 3 (2) ◽  
pp. 92-98
Author(s):  
Dian Novianto

AbstractData security is an important factor in an electronic transaction, because the data sent must only be known to the person who is entitled to receive the information. There are several security aspects of the data that must be maintained, such as: authentication, integrity, non repudiation, authority, confidentialty, privacy and access control. Therefore we are need for a system that is capable of carrying out some of these aspects. One technique that can be used in maintaining data security is steganography with the LSB (Least Significant Bit) method. In addition, to strengthen the confidentiality of the hidden information in steganography needed Additional techniques in the form of cryptography namely RC4 (Rivest Code 4). In this research,, the researcher  used a software development model is a prototype. And for the tools used in developing this application is an Unified Modeling Language. The results of the research conducted by researchers are the application of steganography using the LSB (Least Significant Bit) method combined with RC4 cryptography (Rivest Code 4) proven to be able to hide and secure important information from people who do not have access rights to that information. Keywords: Steganography, Criptography, Data Security


Author(s):  
Nurmi Hidayasari ◽  
Febi Yanto

The method of steganography commonly used to hide data or information is Least Significant Bit (LSB) method. One of the relevant research is LSB using sequential Encoding - Decoding by David Pipkorn and Preston Weisbrot. In this research, an analysis of the LSB method using Sequential Encoding - Decoding by doing some testing. The tests are on the aspect of message security using tools StegSpy and enhanced LSB algorithm, testing on image quality by calculating the Peak Signal to Noise Ratio (PSNR) value and see the image histogram, testing on robustness of message by doing some image processing operations on stego image, like cropping, rotating, and etc, and then testing on capacity to check size of cover image and stego image and calculates the maximum size of data that can be hidden. From the testing process, we know that there are deficiencies in the aspects of security, robustness and capacity of a message. And then in this research we try to change the location of messages that are hidden in the image bits, which previous research used the 8th bit of each bytes, changed to the 7th bit. To be able to correct deficiencies in the security aspect. After repairing and testing like before, obtained better results in the security aspect. This can be seen from the image of the enhanced LSB algorithm process, the message is not detected, but unfortunately the image quality is reduced, with the low PSNR value generated.


Techno Com ◽  
2020 ◽  
Vol 19 (1) ◽  
pp. 97-102
Author(s):  
Wildan Mahmud ◽  
Ery Mintorini

Perkembangan Internet dan aplikasi berbasis jaringan telah menjangkau ke berbagai macam aplikasi yang memungkinkan seseorang untuk saling berkirim pesan dan informasi tanpa dibatasi jarak dan waktu. Seiring dengan perkembangan itu pula, kerentanan akan aspek keamanan sebuah system juga semakin meningkat. Dalam penelitian ini, peneliti mencoba menerapkan kombinasi antara metode kriptografi dan steganografi yang bertujuan untuk meningkatkan upaya pengamanan sebuah pesan. Kriptografi Cipher Block Chaining (CBC) merupakan kriptografi yang sudah umum digunakan contohnya pada protocol internet TLS dan IPsec. Proses enkripsi dan dekripsi CBC memerlukan waktu yang relatif singkat karena mode CBC memiliki kecepatan dan efisiensi lebih tinggi dan dinilai lebih mudah diimplementasikan. Metode berikutnya yang digunakan adalah Steganografi Least Significant Bit (LSB) yang bekerja secara sederhana namun sangat efektif dalam menyisipkan pesan tersembunyi. Namun, beberapa penelitian menemukan kelemahan LSB yang dapat menemukan keberadaan pesan tersembunyi menggunakan algoritma steganalytic pada tingkat embedding yang rendah. Untuk itu, LSB harus dikembangkan lagi dengan menerapkan deteksi tepi sobel yang dapat bekerja untuk mendeteksi keypoint penyembunyian pesan sehingga LSB tidak lagi bekerja secara standar. Kombinasi metode CBC dan LSB-Sobel telah terbukti dan berhasil merahasiakan pesan dengan baik dan menghasilkan stego-image yang berkualitas tinggi setelah dilakukan pengujian PSNR dan MSE. Kata kunci: Kriptografi, steganografi, CBC, LSB, Deteksi Tepi Sobel


2019 ◽  
Vol 5 (1) ◽  
pp. 6-17
Author(s):  
Aldo Aldo ◽  
Lukman Hakim

Pertukaran informasi sangatlah mudah dengan mengunakan internet sebagai penghubung dari pihak yang mengirim informasi ke pihak yang menerima informasi tersebut. Semakin mudah juga bagi pihak yang tidak berwenang untuk mendapatkan informasi yang akan dikirimkan dari pihak pengirim ke pihak penerima melalui internet. Maka itu informasi tersebut memerlukan fitur keamanan. Penyandian merupakan sebuah teknik keamanan untuk mengubah sebuah informasi berupa text, citra digital, suara, video menjadi sebuah informasi yang tidak memiliki arti tertentu atau teracak. Jika pihak yang memiliki informasi yang telah di sandikan ini tidak memiliki kunci untuk membuka enkripsi tersebut maka informasi tersebut tidak dapat dibaca dikarenakan tidak memiliki makna tertentu. Penyisipan merupakan sebuah fitur keamanan dimana sebuah informasi akan dimasukan kedalam sebuah media penampung atau informasi tersebut disembunyikan didalam media penampung. Pada penulisan ini akan difokuskan untuk membuat sebuah sistem yang dapat menyandikan , mendekripsi sandi , menyisipkan sebuah informasi ke dalam sebuah media penampung dan mengekstraksi informasi dari media tampung yang dapat berupa citra digital dengan format : jpeg, bitmap, dan png yang berguna untuk meningkatkan tingkat keamanan dari sebuah informasi.Algoritma penyandian merupakan algoritma yang mengubah sebuah informasi (plain text) menjadi sebuah informasi yang telah teracak (ciphertext) mengunakan kunci yang telah ditentukan dari pihak pengirim dan penerima. Algoritma penyandian yang digunakan adalah algoritma Hill Cipher. Yang akan dikombinasikan dengan metode Least Significant Bit sebagai metode pada proses penyisipan informasi. LSB akan mengubah setiap nilai bit terakhir dari setiap piksel pada citra tampung (cover) sesuai dengan nilai biner pesan secara berurutan, sehingga menyebaban hasil akhir dari penyisipan (stego image) tidak akan mengalami perubahan secara signifikan jika dilihat oleh mata manusia.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Roseline Oluwaseun Ogundokun ◽  
Oluwakemi Christiana Abikoye

Safe conveyance of medical data across unsecured networks nowadays is an essential issue in telemedicine. With the exponential growth of multimedia technologies and connected networks, modern healthcare is a huge step ahead. Authentication of a diagnostic image obtained from a specialist at a remote location which is from the sender is one of the most challenging tasks in an automated healthcare setup. Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. Therefore, this study proposed a modified least significant bit (LSB) technique capable of protecting and hiding medical data to solve the crucial authentication issue. The application was executed and established by utilizing MATLAB 2018a, and it used a logical bit shift operation for execution. The investigational outcomes established that the proposed technique can entrench medical information without leaving a perceptible falsification in the stego image. The result of this implementation shows that the modified LSB image steganography outperformed the standard LSB technique with a higher PSNR value and lower MSE value when compared with previous research works. The number of shifts was added as a new performance metric for the proposed system. The study concluded that the proposed secured medical information system was evidenced to be proficient in secreting medical information and creating undetectable stego images with slight entrenching falsifications when likened to other prevailing approaches.


2017 ◽  
Vol 7 (1) ◽  
pp. 09-15
Author(s):  
Rikip Ginanjar ◽  
Ridho Utomo

Since the first Android smartphones were released, many applications have been developed until today. One of them is security application. Security applications consist of several types of applications such as Antivirus, SIM Card Change Alarm, and Applocker. SIM Card Changed Alarm is a security application that has capability to monitor SIM Card change in Android smartphones. Although there are many SIM Card Change Alarm applications which are available in Google Playstore, there are many people who are not satisfied with this applications. It happens due to them only sends the SMS alert to the owner without locking the phone to prevent other people using it. The outcome of this research will have the same feature as SIM Card Change Alarm but with additional features such as locking the smartphone if the SIM Card has been changed, locking and unlocking remotely using SMS, triggering loud alarm, and calling-back to owner when the smartphone has been lost or stolen. The outcome expected for the Prifone Application is a userfriendly application which could be used by many people around the world and also is able to secure Android smartphones. Index Terms – android, sim card alarm, security application


Sign in / Sign up

Export Citation Format

Share Document