STEGANOGRAFI PADA CITRA BITMAP MENGGUNAKAN METODE LEAST SIGNIFICANT BIT BERSILANG UNTUK TEKS TERENKRIPSI BASE64
DOI:
https://doi.org/10.30646/sinus.v17i1.384Keywords:
Base64, Encrypt, Least Significant Bit, SteganographyAbstract
The development of internet has become one of the most popular data communication media. The ease of use and complete facilities are the advantages possessed by the internet. However, along with the development of internet media and applications that use the Internet, Â crime on information system increases as well. With various illegal information-gathering techniques developing, many are trying to access information that is not their right. There are several security techniques for sending messages confidentially and securedly, one of which is known as steganography. This study combined steganography and cryptography. The message was encrypted first using base64 then inserted using the LSB Crossed method. This method was aimed at making the process of extracting messages by unauthorized ones not easy. Embedding message into images was using the last binary number of the RGB value of an image by randomizing the placement of binary numbers by integrating base64 coding so that it combined base64 messages which next the text messages would be encrypted. The measurement results in the stego image using PSNR (Peak Signal to Noise Ratio) showed that the image quality after the insertion process was > 50 db
References
Farid, N., Nurhadiyono, B., & Rahayu, Y. (2016). Implementasi Metode Steganografi Least Significant Bit Dengan Algoritma Hill Cipher Pada Citra Bitmap. Techno.COM, 15(2), 109–116.
Gupta, S., Gujral, G., & Aggarwal, N. (2012). Enhanced Least Significant Bit algorithm For Image Steganography. IJCEM International Journal of Computational Engineering & Management ISSN, 15(4).
Mukharrom, E., Riza, I. R., & Maman, S. (2013). Aplikasi Steganografi Pada Citra Berformat Bitmap Dengan Menggunakan Metode End of File. Transien, 2(3), 1–9.
Nugraha, A. P., & Gunadhi, E. (2016). Penerapan Kriptografi Base 64 Untuk Keamanan Url ( Uniform Resource Locator ) Website Dari Serangan Sql Injection, 491–498.
S. Gupta, S., Gujral, G., & Aggarwal, N. (2012). Enhanced Least Significant Bit algorithm For Image Steganography. IJCEM Int. J. Comput. Eng. Manag., 15(4).
Saptomo, W. L. Y. (2008). Modifikasi Least Significant Bit dalam Steganografi. Jurnal Ilmiah Sinus, 6, 1–8.
Zamani, M., Manaf, A., & Abdullah, S. (2012). Correlation between PSNR and bit per sample rate in audio steganography. Conference on Signal …, 163–168.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Â

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.









