Information Resilience Test Against Digital Image Manipulation and Online Media Sending in Steganography Using Least Significant Bit Algorithm
Keywords:
steganography, least significant bit, image processingAbstract
Steganography is a method of hiding information, which can be text, images, or videos, in a cover image, secret information is hidden in a way that is invisible to the eye. Steganography is designed to maintain hiding capacity while still considering security and insensitivity to steganalysis. One of the characteristics of steganography is robustness, which can maintain the information in it. So that robustness testing is very important in determining the effectiveness of the steganography algorithm used. This paper aims to test the resilience of information or messages hidden after inserting secret messages in stego images. In this study, the tests carried out include digital image manipulation and the process of sending stego image files. Various types of manipulation such as resizing, compression, and other visual effects. Then it will be explored to assess the extent to which the integrity of the message is maintained. This study resulted in tests carried out related to testing the storage capacity of the cover image greatly affecting each size, the process of sending stego images in PNG format on online media E-Mail, WhatsApp, and Telegram experienced changes in the size of the files received on each platform. However, the file extension does not change, which means there is no file format conversion on the three platforms. In terms of file size, there is a difference in file size on the three online media, but the difference does not affect the extraction of secret messages, which means the message extraction process is 100% successful. The digital image manipulation test carried out, namely crop, resize, brightness, rotate, and flip, most of the tests carried out failed in extracting text messages.
References
[1] M. Kailani Ridwan, W. Frado Pattipeilohy, and Sanwani, “Aplikasi Keamanan Document Digital Menggunakan Algoritma Steganografi Discrete Cosine Transform (DCT) Pada Perusahan Alat Berat,” JURNALILMU PENGETAHUAN DAN TEKNOLOGI KOMPUTER, no. 2, 2020, doi: https://doi.org/10.33480/jitk.v5i2.1033.
[2] A. Aziz Fikhri and Hendrawaty, “Implementasi Steganografi Text To Image Menggunakan Metode One Bit Least Significant Bit Berbasis Android,” Jurnal Infomedia, vol. 3, no. 1, 2018, doi: http://dx.doi.org/10.30811/jim.v3i1.623.
[3] N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.
[4] A. Ikram, I. Warman, and G. Yoga Swara, “Implementasi Algoritma Vigenere Cipher Dan End Of File Pada Steganografi Video,” Jurnal Minfo Polgan, vol. 12, no. 2, 2023, doi: 10.33395/jmp.v12i2.12418.
[5] F. Şahin, T. Çevik, and M. Takaoğlu, “Review of the Literature on the Steganography Concept,” Int J Comput Appl, vol. 183, no. 2, pp. 38–46, May 2021, doi: 10.5120/ijca2021921298.
[6] Y. Xu, C. Mou, Y. Hu, J. Xie, and J. Zhang, “Robust Invertible Image Steganography,” in CVPR Open Access, 2022.
[7] D. Darwis, A. Junaidi, D. A. Shofiana, and Wamiliana, “A New Digital Image Steganography Based on Center Embedded Pixel Positioning,” Cybernetics and Information Technologies, vol. 21, no. 2, pp. 89–104, Jun. 2021, doi: 10.2478/cait-2021-0021.
[8] J. Zhang, X. Zhao, and X. He, “Robust JPEG steganography based on the robustness classifier,” EURASIP J Inf Secur, vol. 2023, no. 1, Dec. 2023, doi: 10.1186/s13635-023-00148-x.
[9] A. Aziz Fikhri, “Analisis Perbandingan Histogram dan Kualitas Citra Pada Image Steganografi Menggunakan Metode One Bit Least Significant Bit,” Proceeding Seminar Nasional Politeknik Negeri Lhokseumawe, vol. 2, no. 1, 2018.
[10] S. Hiremath and A. Shobha Rani, “A Concise Report on Image Types, Image File Format and Noise Model for Image Preprocessing,” International Research Journal of Engineering and Technology, 2020, [Online]. Available: www.irjet.net
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Adit, Aynun, Nurdin
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright Notice
Authors published in this journal agree to the following terms:
1. The copyright of each article is retained by the author (s).
2. The author grants the journal the first publication rights with the work simultaneously licensed under the Creative Commons Attribution License, allowing others to share the work with an acknowledgment of authorship and the initial publication in this journal.
3. Authors may enter into separate additional contractual agreements for the non-exclusive distribution of published journal versions of the work (for example, posting them to institutional repositories or publishing them in a book), with acknowledgment of their initial publication in this journal.
4. Authors are permitted and encouraged to post their work online (For example in the Institutional Repository or on their website) before and during the submission process, as this can lead to productive exchanges, as well as earlier and larger citations of published work.
5. Articles and all related material published are distributed under a Creative Commons Attribution-ShareAlike 4.0 International License.