Information Resilience Test Against Digital Image Manipulation and Online Media Sending in Steganography Using Least Significant Bit Algorithm

Authors

  • Adit Student in Master of Information Technology Departement, Faculty of Engineering, Malikussaleh University
  • Aynun Student in Master of Information Technology Departement, Faculty of Engineering, Malikussaleh University.
  • Nurdin Master of Information Technology Departement, Faculty of Engineering, Malikussaleh University.

Keywords:

steganography, least significant bit, image processing

Abstract

Steganography is a method of hiding information, which can be text, images, or videos, in a cover image, secret information is hidden in a way that is invisible to the eye. Steganography is designed to maintain hiding capacity while still considering security and insensitivity to steganalysis. One of the characteristics of steganography is robustness, which can maintain the information in it. So that robustness testing is very important in determining the effectiveness of the steganography algorithm used. This paper aims to test the resilience of information or messages hidden after inserting secret messages in stego images. In this study, the tests carried out include digital image manipulation and the process of sending stego image files. Various types of manipulation such as resizing, compression, and other visual effects. Then it will be explored to assess the extent to which the integrity of the message is maintained. This study resulted in tests carried out related to testing the storage capacity of the cover image greatly affecting each size, the process of sending stego images in PNG format on online media E-Mail, WhatsApp, and Telegram experienced changes in the size of the files received on each platform. However, the file extension does not change, which means there is no file format conversion on the three platforms. In terms of file size, there is a difference in file size on the three online media, but the difference does not affect the extraction of secret messages, which means the message extraction process is 100% successful. The digital image manipulation test carried out, namely crop, resize, brightness, rotate, and flip, most of the tests carried out failed in extracting text messages.

References

[1] M. Kailani Ridwan, W. Frado Pattipeilohy, and Sanwani, “Aplikasi Keamanan Document Digital Menggunakan Algoritma Steganografi Discrete Cosine Transform (DCT) Pada Perusahan Alat Berat,” JURNALILMU PENGETAHUAN DAN TEKNOLOGI KOMPUTER, no. 2, 2020, doi: https://doi.org/10.33480/jitk.v5i2.1033.

[2] A. Aziz Fikhri and Hendrawaty, “Implementasi Steganografi Text To Image Menggunakan Metode One Bit Least Significant Bit Berbasis Android,” Jurnal Infomedia, vol. 3, no. 1, 2018, doi: http://dx.doi.org/10.30811/jim.v3i1.623.

[3] N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.

[4] A. Ikram, I. Warman, and G. Yoga Swara, “Implementasi Algoritma Vigenere Cipher Dan End Of File Pada Steganografi Video,” Jurnal Minfo Polgan, vol. 12, no. 2, 2023, doi: 10.33395/jmp.v12i2.12418.

[5] F. Şahin, T. Çevik, and M. Takaoğlu, “Review of the Literature on the Steganography Concept,” Int J Comput Appl, vol. 183, no. 2, pp. 38–46, May 2021, doi: 10.5120/ijca2021921298.

[6] Y. Xu, C. Mou, Y. Hu, J. Xie, and J. Zhang, “Robust Invertible Image Steganography,” in CVPR Open Access, 2022.

[7] D. Darwis, A. Junaidi, D. A. Shofiana, and Wamiliana, “A New Digital Image Steganography Based on Center Embedded Pixel Positioning,” Cybernetics and Information Technologies, vol. 21, no. 2, pp. 89–104, Jun. 2021, doi: 10.2478/cait-2021-0021.

[8] J. Zhang, X. Zhao, and X. He, “Robust JPEG steganography based on the robustness classifier,” EURASIP J Inf Secur, vol. 2023, no. 1, Dec. 2023, doi: 10.1186/s13635-023-00148-x.

[9] A. Aziz Fikhri, “Analisis Perbandingan Histogram dan Kualitas Citra Pada Image Steganografi Menggunakan Metode One Bit Least Significant Bit,” Proceeding Seminar Nasional Politeknik Negeri Lhokseumawe, vol. 2, no. 1, 2018.

[10] S. Hiremath and A. Shobha Rani, “A Concise Report on Image Types, Image File Format and Noise Model for Image Preprocessing,” International Research Journal of Engineering and Technology, 2020, [Online]. Available: www.irjet.net

Downloads

Published

2024-12-27